National Security - Atlantic Council https://www.atlanticcouncil.org/issue/national-security/ Shaping the global future together Fri, 16 Aug 2024 20:06:44 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.5 https://www.atlanticcouncil.org/wp-content/uploads/2019/09/favicon-150x150.png National Security - Atlantic Council https://www.atlanticcouncil.org/issue/national-security/ 32 32 Kishida has transformed Japanese foreign policy. Will his successor continue on his path? https://www.atlanticcouncil.org/blogs/new-atlanticist/kishida-htransformed-japanese-foreign-policy-successor/ Fri, 16 Aug 2024 20:06:40 +0000 https://www.atlanticcouncil.org/?p=786019 It is uncertain whether the next Japanese prime minister will follow through on the Kishida administration’s major shifts in defense policy.

The post Kishida has transformed Japanese foreign policy. Will his successor continue on his path? appeared first on Atlantic Council.

]]>
Public trust, Japanese Prime Minister Fumio Kishida said during a press conference on August 14, is the “basis of politics.” But the task of restoring public trust, he added, would fall to another, as the prime minister announced that he will not seek reelection as the leader of the ruling Liberal Democratic Party (LDP) next month. Despite establishing himself as a beacon for democracy in a period of tremendous global upheaval, several domestic scandals in his party led to his decision to step down. As the LDP has dominated both the lower and upper house of Japan’s national legislature almost continuously since 1955, his successor is all but guaranteed premiership of the country. This question instead is: Will the next prime minister be able to overcome domestic political and economic constraints to meet the high expectations Kishida has set for Japan’s contribution to global security?

Support for Ukraine

Just four months into Kishida’s term as prime minister, Russia launched its full-scale invasion of Ukraine. Under Kishida’s leadership, Japan has shown a strong commitment to Ukrainian sovereignty. In an unprecedented shift away from its self-defense-only principle, Japan has provided almost twelve billion dollars of assistance to Ukraine since February 2022, including nonlethal military aid. The 2023 Group of Seven (G7) Summit, which was held in Kishida’s hometown of Hiroshima, will also leave a mark on his foreign policy legacy. At the summit, he drew on Japan’s unique experience as the only country to have suffered wartime atomic bombing to emphasize his staunch opposition to Russian threats to use nuclear weapons. (A point he also made during his acceptance speech at the 2023 Atlantic Council Global Citizen Awards.)

The global ramifications of Russia’s invasion of Ukraine led NATO to invite likeminded partners in the Indo-Pacific (Japan, South Korea, Australia, and New Zealand) to three consecutive annual summits. Through this transatlantic-Pacific partnership, NATO succeeded in garnering widespread support for Ukraine’s defense against Russian aggression. However, in the face of rising security challenges from China, the Indo-Pacific Four are determined to ensure this newfound partnership is a two-way street. As Kishida said in March 2023 of Russia’s full-scale invasion, “Ukraine today may be East Asia tomorrow.”

Indo-Pacific security

In the South China Sea, Beijing has ramped up its dangerous and aggressive behavior, including unlawful maritime claims and the coercive use of military vessels against the Philippines, particularly around the Second Thomas Shoal. Demonstrating firm support for Manila’s right to freedom of navigation and access to supply lines within its own maritime domain, Kishida and US President Joe Biden convened a historic trilateral summit with President Ferdinand Marcos, Jr., in April 2024.

On top of Chinese attempts to unilaterally alter the maritime status quo in the Indo-Pacific, North Korea continues to pose an imminent threat to Japan’s national security through advancements in its nuclear and missile arsenal. The willingness of Kishida and South Korean President Yoon Suk Yeol to put aside longstanding and emotionally charged historical disputes between their two countries indicates the direness of the Indo-Pacific security environment. During his August 14 press conference, Kishida pointed out that the sixtieth anniversary of Japan-South Korea normalization is next year, adding that “we must make the normalization even more certain.”

Together with the United States, Kishida and Yoon ushered in a new era of enhanced US-South Korea-Japan cooperation at the historic Camp David Summit in August 2023. To better address shared regional security and economic challenges, the three countries institutionalized regular high-level consultations and working level meetings.

Kishida has also made enormous strides to bolster Japan’s defenses against an increasingly belligerent China and provocative North Korea. In December 2022, he released three new strategic documents that reflect a record-breaking 16 percent increase in defense spending. Kishida has also shifted Japan away from its postwar pacifist stance, including by easing the ban on lethal weapons exports to enable the co-development of next-generation fighter jets with Italy and the United Kingdom and the possession of counterstrike capabilities that could hit enemy targets.

What’s next?

Although Kishida has shown considerable leadership amid global uncertainty, his foreign policy stances are at significant odds with domestic sentiments in Japan. Despite vowing to nearly double Japan’s defense budget by 2027, he has not made clear how the country’s heavily indebted government plans to pay for this. The approval rating for Kishida’s government has regularly been below 20 percent since last December, with respondents pointing to dissatisfaction with his handling of the struggling economy. On top of this, he has faced intense backlash due to the LDP’s unreported political funds and longstanding ties to the Unification Church, which came to light during his term.

During his August 14 press conference, Kishida said that he hoped an LDP “dream team” would emerge to move the country forward. If the LDP continues to dominate Japanese politics, then major foreign policy stances, including the country’s alliance with the United States, will likely remain unchanged. However, the LDP is now at a crossroads as it seeks to regain the public’s trust. And the roster of candidates seeking party leadership reflects this.

Broadly speaking, the candidates can be divided into two categories: legacy party favorites lacking public support, and more progressive candidates who lack the backing of party leadership.

The former category includes LDP Secretary-General Toshimitsu Motegi, the party’s second-in-command, who also previously held the post of foreign minister from 2019-2021. In this role, he expressed interest in improving relations with Seoul for the sake of regional stability yet refused to put aside historical grievances to do so. Another candidate is Economic Security Minister Sanae Takaichi, who is a hardline nationalist under whom relations with South Korea would likely deteriorate significantly. These established candidates could previously rely on factional support for party elections but the dissolution of and mass exodus from dominant factions demonstrates an attempt by the LDP to reform and regain the public’s trust.

The latter category is made up of potential candidates like Foreign Minister Yoko Kamikawa, who, like Takaichi, would be Japan’s first female prime minister. In the current administration, she has advocated for a more gender-inclusive security policy, toed a careful line between holding China accountable for aggressive behavior while seeking areas of common interest with Beijing, and made concerted efforts to normalize ties with Seoul. Another popular candidate who has made waves in the LDP for seeking reforms to modernize Japan is Digital Minister Taro Kono. Although it is unclear how he would respond to the current geopolitical climate, he took a more dovish approach as foreign minister. For instance, he has advocated for greater territorial integrity for the Japanese Self-Defense Forces within the US-Japan alliance and vowed not to make an official visit to Yasukuni Shrine, where Japanese convicted war criminals are buried.

Kishida benefited greatly from the right combination of political will and geopolitical upheaval to secure the support necessary to shift Japan’s postwar foreign and defense policies. But with increasing domestic pressure to reduce government spending in a turbulent economic environment, it is uncertain whether Japan will be able to deliver on all the national and global security promises made under the Kishida administration.

Ultimately, if the next Japanese prime minister has any hope of continuing on this trajectory, then they must demonstrate a willingness to listen and address domestic concerns, while also effectively communicating the importance of upholding the rules-based international order to everyday Japanese citizens.  


Kyoko Imai is an assistant director with the Indo-Pacific Security Initiative of the Atlantic Council’s Scowcroft Center for Strategy and Security.

The post Kishida has transformed Japanese foreign policy. Will his successor continue on his path? appeared first on Atlantic Council.

]]>
‘We’re back to square one’ in fighting the hunger crisis, warns Cindy McCain https://www.atlanticcouncil.org/blogs/new-atlanticist/were-back-to-square-one-in-fighting-the-hunger-crisis-warns-cindy-mccain/ Fri, 26 Jul 2024 16:52:03 +0000 https://www.atlanticcouncil.org/?p=782377 At an Atlantic Council event on Thursday, the World Food Programme executive director warned that the world has lost the progress it has made over the past fifteen years on lowering global hunger levels.

The post ‘We’re back to square one’ in fighting the hunger crisis, warns Cindy McCain appeared first on Atlantic Council.

]]>
Watch the full event

“We’ve lost all the progress that we’ve made in the past fifteen years” on lowering global hunger levels, World Food Programme (WFP) Executive Director Cindy McCain warned on Thursday.

McCain spoke at an Atlantic Council event hosted on the sidelines of the Group of Twenty (G20) meeting of finance ministers and central bank governors in Rio de Janeiro. She pointed out that one in eleven people globally faced hunger last year.

On Wednesday, Brazilian President Luiz Inácio Lula da Silva announced that Brazil—which holds the G20 presidency—will later this year launch the Global Alliance Against Hunger and Poverty to bring countries together in sharing knowledge and resources.

“We have the capability as a planet to feed everybody on the planet—we grow enough food,” McCain said, “but we don’t” due to funding and other coordination issues.

With those challenges, the Global Alliance is “a great opportunity for all of us . . . to get together, exchange ideas, brainstorm” and to “develop science and technology” tools to help, McCain said.

Below are more highlights from the conversation, moderated by Valentina Sader, deputy director at the Atlantic Council’s Adrienne Arsht Latin America Center.

Food security

  • Food security is a “national security issue,” and “it should be labeled as one,” McCain argued, pointing out how access to food has shaped broader security crises in Somalia, Sudan, and Yemen.
  • Yet, food security “gets kicked down” the list of priorities every time “something else happens in the world,” McCain warned.
  • She said that the WFP and United Nations agencies, because they provide critical aid, are “on the front lines” of crises and the “first in and last out.”
  • The WFP previously got most of its grain from Ukraine. But it has had to diversify its sources in the wake of the agricultural disruptions caused by Russia’s 2022 invasion of Ukraine. WFP is also working with other countries to help them mitigate the effects of the conflict on global food supplies.
  • In the global hunger crisis, “women and children are taking the brunt,” McCain said. “You’ve never seen more of an example of it than in Gaza.”
  • She added that equity and gender inclusion are important to factor into food security efforts because “a woman will feed her family,” and while doing so, “she will make sure everybody else eats” before she does.
  • Moreover, with women making up around half of smallholder farmers, McCain argued that it is important to make sure that these women have the tools, expertise, seeds, and access to water that they need to farm effectively. “If a woman farms and can feed her family, she will wind up feeding the community,” McCain said.

Farm to negotiating table

  • McCain noted that G20 countries include not only the world’s leading economies but also some of the planet’s largest agricultural producers. That, she said, empowers these countries to work together to address the full spectrum of food-security challenges, from poverty to improvements in agriculture.
  • She added that the G20 is an optimal forum for raising the urgency around hunger because of how it brings together both governments and civil society organizations from countries that represent 85 percent of the world’s gross domestic product and over 60 percent of its population. “So the voice is huge,” she said, adding that “governments simply cannot do it all. We need everybody in on this.”
  • She urged global stakeholders to “continue to elevate the conversation” about the urgency of food security—and advised countries “most affected” by food insecurity to keep conveying the plight they face. “The problem is [that] around the world, people don’t understand what’s going on” or believe that hunger and malnutrition are only problems in Africa rather than globally, she said. “It’s all about. . . making sure that people understand.”

Katherine Walla is the associate director of editorial at the Atlantic Council. 

Watch the full event

The post ‘We’re back to square one’ in fighting the hunger crisis, warns Cindy McCain appeared first on Atlantic Council.

]]>
Leland Lazarus on the Chinese-built port in Chancay, Peru in China US Focus https://www.atlanticcouncil.org/insight-impact/in-the-news/lazarus-in-china-us-focus/ Thu, 25 Jul 2024 19:09:35 +0000 https://www.atlanticcouncil.org/?p=781987 On July 17th, Global China Hub Nonresident Fellow Leland Lazarus published an article on the potential national security concerns of the Chinese-build port in Chancay, Peru in China US Focus.

The post Leland Lazarus on the Chinese-built port in Chancay, Peru in China US Focus appeared first on Atlantic Council.

]]>

On July 17th, Global China Hub Nonresident Fellow Leland Lazarus published an article on the potential national security concerns of the Chinese-build port in Chancay, Peru in China US Focus.

The post Leland Lazarus on the Chinese-built port in Chancay, Peru in China US Focus appeared first on Atlantic Council.

]]>
Dean interviewed by Sky News on AUKUS https://www.atlanticcouncil.org/insight-impact/in-the-news/dean-interviewed-by-sky-news-on-aukus/ Thu, 25 Jul 2024 15:34:03 +0000 https://www.atlanticcouncil.org/?p=782393 On July 24, IPSI nonresident senior fellow Peter Dean appeared in an interview with Sky News discussing the AUKUS submarine deal and its potential trajectory under a Trump presidency. This interview was regenerated through the Mercury, Townsville Bulletin, and Cairns Post. 

The post Dean interviewed by Sky News on AUKUS appeared first on Atlantic Council.

]]>

On July 24, IPSI nonresident senior fellow Peter Dean appeared in an interview with Sky News discussing the AUKUS submarine deal and its potential trajectory under a Trump presidency. This interview was regenerated through the Mercury, Townsville Bulletin, and Cairns Post

The post Dean interviewed by Sky News on AUKUS appeared first on Atlantic Council.

]]>
Warrick on TRT World on assassination attempt on former US President Trump https://www.atlanticcouncil.org/insight-impact/in-the-news/warrick-on-trt-world-on-assassination-attempt-on-former-us-president-trump/ Mon, 15 Jul 2024 15:13:13 +0000 https://www.atlanticcouncil.org/?p=780188 On July 13, Thomas S. Warrick, director of the Future of DHS project in the Scowcroft Center for Strategy and Security, appeared on TRT World on the assassination attempt on former US President Donald Trump at a campaign rally in Pennsylvania. He discussed the role of the United States Secret Service, as well as the […]

The post Warrick on TRT World on assassination attempt on former US President Trump appeared first on Atlantic Council.

]]>

On July 13, Thomas S. Warrick, director of the Future of DHS project in the Scowcroft Center for Strategy and Security, appeared on TRT World on the assassination attempt on former US President Donald Trump at a campaign rally in Pennsylvania. He discussed the role of the United States Secret Service, as well as the position of the shooter during the attack.

The post Warrick on TRT World on assassination attempt on former US President Trump appeared first on Atlantic Council.

]]>
The Kremlin’s crimes will continue to escalate until Russia is defeated https://www.atlanticcouncil.org/blogs/ukrainealert/the-kremlins-crimes-will-continue-to-escalate-until-russia-is-defeated/ Tue, 09 Jul 2024 20:04:56 +0000 https://www.atlanticcouncil.org/?p=779231 The Russian bombing of a children's hospital in Kyiv is a clear signal that Kremlin war crimes will only escalate and Vladimir Putin will not stop until he is stopped, writes Serhiy Prytula.

The post The Kremlin’s crimes will continue to escalate until Russia is defeated appeared first on Atlantic Council.

]]>
Almost two and a half years since the start of Russia’s full-scale invasion, the Kremlin still retains the ability to shock with the scale of its crimes. On July 8, the targets were Ukrainian children. Not just any children, but kids being treated for cancer, whose daily lives were already full of fear and pain.

The exact number of dead and wounded as a result of Russia’s targeted missile strike on the Okhmatdyt Children’s Hospital in central Kyiv has not yet been confirmed. Nor is it possible to calculate the death and suffering that will result from lack of treatment due to the partial destruction of what is Ukraine’s biggest pediatric clinic.

In the immediate aftermath of the attack, large numbers of distressed and in some cases injured children lined the pavement around the ruins of the wrecked hospital, many still attached to drips. Providing them with the specialized medical support they so urgently require will now be extremely difficult.

Doctors were also among the victims. Those killed in Monday’s missile strikes included thirty year old Svitlana Lukyanchuk, a nephrologist from Lviv. Svitlana was an orphan who overcame challenging personal circumstances to qualify as a doctor. She dedicated herself to saving children’s lives, but will never now experience the joy of motherhood herself.

Okhmatdyt Children’s Hospital was one of three separate Ukrainian medical facilities to be struck by Russian missiles on July 8. One such attack could potentially be attributed to human error or explained as a tragic mistake. Three targeted attacks on the same day suggests a deliberate Russian strategy to destroy Ukraine’s healthcare infrastructure, just as the Kremlin has already targeted and destroyed much of Ukraine’s civilian energy infrastructure. Moscow appears intent on making large parts of the country unlivable.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

It is no doubt hard for many outside observers to fully appreciate that such horrors are taking place in the heart of twenty-first century Europe. After all, just three years ago, it would also have been difficult for most Ukrainians to believe such things were possible. Sadly, that is no longer the case.

As a result of Russia’s February 2022 invasion, Ukrainians have been confronted by an astonishing array of war crimes that recall the worst excesses of bygone eras. Entire cities have been reduced to rubble. Hundreds of thousands have been killed, abducted, or subjected to forced deportation. Large numbers of vulnerable children have been sent to Russian indoctrination camps and robbed of their Ukrainian heritage. In regions of Ukraine under Kremlin control, all traces of Ukrainian identity have been ruthlessly erased.

The evidence of Russian war crimes is now so overwhelming that the International Criminal Court in The Hague has issued arrest warrants for Vladimir Putin himself and many of his most senior officials. Nevertheless, the nightmare continues. A genocide is being live-streamed to the watching world, but Western leaders choose not to call it by its name for fear of being obliged to act.

Today’s Russia did not become a rogue regime overnight. On the contrary, the crimes we are now witnessing reflect unresolved historic issues that have been allowed to fester since the early days of Putin’s reign. Unlike all other European empires, post-Soviet Russia never rejected imperialism and was not forced to confront the crimes of the imperial era. This has allowed for a revival of Russia’s imperial identity and has helped fuel a sense of impunity that directly paved the way for the invasion of Ukraine.

Rather than address the growing threat posed by Putin’s Russia, the Western world has consistently sought to avoid confrontation. When a newly anointed Putin crushed Chechnya, Western leaders chose to look the other way. After he invaded Georgia, they scrambled to reset relations and return to business as usual.

Inevitably, this approach only emboldened the Kremlin. The West’s weak response to the 2014 seizure of Crimea led directly to Russian military intervention in eastern Ukraine. When this, too, failed to produce a decisive reaction, the stage was set for today’s full-scale invasion.

Even now, Western policy remains defined by a reluctance to provoke Putin, with Western leaders hopelessly preoccupied by fears of escalation. This has left Ukraine unable to adequately defend itself, while encouraging Russia to escalate further. As a result, we are now closer to a major global war than at any time for a generation.

It is delusional to think Russia can be stopped by appeasement, concessions, or compromise. Any ceasefire would merely provide the Kremlin with a pause to rearm before resuming the campaign to wipe Ukraine off the map entirely.

Nor are Putin’s imperial ambitions limited to Ukraine alone. He has repeatedly portrayed the invasion of Ukraine as part of a sacred mission to correct the historical injustice of the Soviet collapse and “return” historically Russian lands. If Putin achieves his goals in Ukraine, he will inevitably look to press home his advantage and “reclaim” other countries that were once part of the Russian Empire. The list of potential targets is long and includes Finland, Poland, the Baltic States, and Moldova. The only way to guarantee their security is by defeating Russia in Ukraine.

Western leaders now have a simple choice: They can provide Ukraine with the support necessary to defeat Russia, or they can prepare to face the Russians themselves in the near future. With every day of delay, the cost of stopping Putin grows. At the moment, it is the Ukrainians alone who are paying this terrible price. However, until Russia is beaten, nobody in the West can take their security for granted. Instead, the threat will only increase.

Ten years ago when the Russian invasion of Ukraine first began, a cautious Putin deployed Russian soldiers without identifying insignia in an attempt to mask his aggressive actions. A decade later, he is now bombing children’s hospitals in the center of a European capital city while his priests and propagandists preach holy war against the West. Clearly, he will not stop until he is stopped.

Vladimir Putin represents the greatest threat to European peace since Adolf Hitler. Today’s generation of Western leaders should recall the lessons of that earlier era before it is too late. They must reject the appeasement of the 1930s and embrace the mantra of “never again” that rose from the ashes of World War II. Until that happens, the Kremlin’s crimes will continue to escalate.

Serhiy Prytula is a Ukrainian volunteer fundraiser and founder of the Prytula Charity Foundation.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post The Kremlin’s crimes will continue to escalate until Russia is defeated appeared first on Atlantic Council.

]]>
Bauerle Danzman cited in Nikkei Asia on CFIUS real estate rule https://www.atlanticcouncil.org/insight-impact/in-the-news/bauerle-danzman-cited-in-nikkei-asia-on-cfius-real-estate-rule/ Tue, 09 Jul 2024 13:30:41 +0000 https://www.atlanticcouncil.org/?p=780947 Read the full article here.

The post Bauerle Danzman cited in Nikkei Asia on CFIUS real estate rule appeared first on Atlantic Council.

]]>
Read the full article here.

The post Bauerle Danzman cited in Nikkei Asia on CFIUS real estate rule appeared first on Atlantic Council.

]]>
US signals long-term support for Ukraine with new security pact https://www.atlanticcouncil.org/blogs/ukrainealert/us-signals-long-term-support-for-ukraine-with-new-security-pact/ Tue, 02 Jul 2024 17:59:59 +0000 https://www.atlanticcouncil.org/?p=777752 The United States has signaled its long-term commitment to Ukrainian security with a new pact but the agreement is not a formal treaty and does not oblige the US to defend Ukraine, writes Mykola Bielieskov.

The post US signals long-term support for Ukraine with new security pact appeared first on Atlantic Council.

]]>
The United States and Ukraine signed a bilateral security agreement on June 13 in a bid to underline Washington’s long-term support as Ukraine fights for national survival against Russia’s ongoing invasion. The agreement is the latest in a series of similar bilateral security pacts concluded by Kyiv since the start of 2024, but has attracted additional attention due to the critical role of US support for the Ukrainian war effort.

Since the onset of Russia’s full-scale invasion in February 2022, the United States has been the single biggest provider of military aid to Ukraine. Without US hardware, ammunition, training, and intelligence, Ukraine would not have been able to defend itself in a high intensity conventional war for so long. In other words, the US has emerged over the past two and a half years as an indispensable partner for Ukraine, both in terms of the country’s current military operations and long-term security.

The new US-Ukraine security agreement contains no major surprises. Rather than breaking new ground, it aims to establish a more long-term commitment to existing forms of military cooperation including training and weapons supplies, while also setting the stage for deepening partnership in defense production. “A lasting peace for Ukraine must be underwritten by Ukraine’s own ability to defend itself now, and to deter future aggression,” President Biden commented.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Crucially, the US-Ukraine bilateral security pact is not a formal treaty or military alliance and does not oblige the US to defend Ukraine. Instead, the terms of the agreement commit the United States to engage in high-level consultations with Ukraine within twenty-four hours of any future attacks on the country. This cautious approach is in line with well documented concerns within the Biden administration over the possibility of a direct clash between the US and Russia.

Critics claim the terms of the security agreement are deliberately broad and open to interpretation, reflecting what they see as Washington’s reluctance to provide Ukraine with anything approaching binding security guarantees. The absence of any official ratification procedures also leaves the ten-year agreement vulnerable to potential future changes in US foreign policy if Donald Trump wins the 2024 presidential election in November.

The Biden White House is not the first US administration to face claims of adopting an excessively cautious approach toward Russian aggression in Ukraine. Since the Russian invasion of Ukraine first began in 2014 with the seizure of Crimea, three successive US presidents have all been accused of failing to effectively deter the Kremlin.

While welcomed by both sides, this latest security initiative is unlikely to convince Moscow of any fundamental change in the US stance or persuade Putin to end his invasion. It comes weeks after the end of a prolonged pause in US military aid to Ukraine caused by political deadlock in Congress over the passage of a sixty billion dollar support bill.

Ukrainian President Volodymyr Zelenskyy sought to put an optimistic spin on the signing of the new security agreement, hailing it as “historic” and saying the pact would serve as a bridge toward his country’s future NATO membership. Others have been less generous, noting that the absence of specific military commitments underlines the limitations of Western support for Ukraine.

Ukraine remains heavily dependent on continued Western military aid and is clearly in no position to demand greater commitment from the country’s Western partners. However, many Ukrainians believe the US and other Western nations have a vital self-interest in maintaining their support for the country.

Amid mounting frustration at the failure to offer Kyiv any fully-fledged military alliances, advocates of stronger support for Ukraine argue that the West’s unprecedented material and political investment since the outbreak of hostilities in 2022 means a Ukrainian defeat would represent a massive blow to Western prestige. It would therefore make more sense for the US and other partners to back Ukraine now, rather than face the far higher costs that would follow a Russian victory.

In a best case scenario, this new security agreement could create the conditions to anchor Ukraine firmly within the Western world, and could serve as a gateway to eventual Ukrainian NATO membership. However, without the requisite political will in Washington, the pact could come to be seen as the successor to the infamous 1994 Budapest Memorandum, which saw Ukraine unilaterally surrendering the world’s third-largest nuclear arsenal in exchange for security assurances that were exposed as worthless by Russia’s subsequent invasion.

A realistic appraisal of the recently signed US-Ukraine security pact is particularly important as both countries look to strengthen their partnership amid the largest European invasion since World War II. If Kyiv and Washington wish to convince Moscow to abandon its hopes of outlasting the West, they will need to match the sentiments expressed in the security agreement with concrete steps that will set the stage for Ukrainian victory.

Mykola Bielieskov is a research fellow at the National Institute for Strategic Studies and a senior analyst at Ukrainian NGO “Come Back Alive.” The views expressed in this article are the author’s personal position and do not reflect the opinions or views of NISS or Come Back Alive.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post US signals long-term support for Ukraine with new security pact appeared first on Atlantic Council.

]]>
Garlauskas featured on VOA on RIMPAC exercise https://www.atlanticcouncil.org/insight-impact/in-the-news/garlauskas-featured-on-voa-on-rimpac-exercise/ Mon, 01 Jul 2024 19:23:00 +0000 https://www.atlanticcouncil.org/?p=777398 On June 28, Markus Garlauskas was featured on a VOA television broadcast discussing the biennial RIMPAC exercise beginning this week, its goals, and how China might view this year’s exercise.

The post Garlauskas featured on VOA on RIMPAC exercise appeared first on Atlantic Council.

]]>

On June 28, Markus Garlauskas was featured on a VOA television broadcast discussing the biennial RIMPAC exercise beginning this week, its goals, and how China might view this year’s exercise.

The post Garlauskas featured on VOA on RIMPAC exercise appeared first on Atlantic Council.

]]>
A global strategy to secure UAS supply chains https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-global-strategy-to-secure-uas-supply-chains/ Tue, 25 Jun 2024 21:09:37 +0000 https://www.atlanticcouncil.org/?p=763606 China exercises substantial control over the commercial drone market, which poses a security challenge for the United States and its allies and partners. What strategy will help the United States and its allies and partners counter China’s drone-market dominance?

The post A global strategy to secure UAS supply chains appeared first on Atlantic Council.

]]>
Foreword: A US strategy for UAVs

The United States has long been one of the world’s leading innovators, allowing it to rapidly adopt emerging technology to strengthen US national defense. This has been especially true in the field of aviation. From the first powered flight at Kitty Hawk to twenty-first-century strategic competition, the United States has made the maintenance of air superiority a major priority.

Today, however, the People’s Republic of China has built a near-insurmountable lead in the development and use of small, unmanned aerial vehicles (UAVs). Benefiting from the Chinese Communist Party’s (CCP) unfair trading practices, Chinese companies have come to dominate the global UAV market, which was valued at $31 billion in 2023.

Chinese dominance of the global UAV industry poses a number of national security challenges for the United States. On the battlefield, drones play a crucial role in intelligence, surveillance, and reconnaissance (ISR), and in conducting strikes. Chinese leadership in UAVs provides the People’s Liberation Army (PLA) with potential battlefield advantages.

At home, these devices provide critical support to law-enforcement agencies and a variety of government departments, in everything from undertaking infrastructure inspections to fulfilling vital roles in scientific research. Chinese commercial drones operating in the United States and allied countries, therefore, provide the PLA with a potential source of intelligence about personal data and critical infrastructure that can be used to identify and exploit vulnerabilities in US and allied homelands.

Finally, Chinese UAVs raise human rights concerns, as Chinese drone companies surveil Chinese citizens and assist the CCP in its mistreatment of its Muslim Uyghur minority.

Washington has begun to wake up to the challenges presented by China’s dominance of the global UAV market. Federal agencies and some states have banned the use of Chinese drones. The federal government has enacted tariffs. Recognizing UAVs’ potential benefit to defense and deterrence, the Department of Defense created the Replicator initiative, a flagship effort to promote the development and fielding of autonomous systems. Congress has also introduced legislation with new measures to protect the US market from Chinese drones and to promote the production of US-made drones.

These are good initial steps, but, to date, they have been piecemeal in nature and lack an overarching strategic framework.

This issue brief proposes a comprehensive three-part “protect-promote-align” strategy for the United States and its allies to secure their national security interests in the global UAV market. It argues that the United States and its allies should introduce new restrictions on the use of Chinese drones in their markets. They should promote the development of alternative drone manufacturers in the United States and trusted allies. Finally, they should align their policies to advance a whole-of-free-world approach to the global drone competition.

If adopted, the strategy proposed here will go a long way toward ensuring that the United States and its allies can remain secure at home, deter their adversaries, and benefit from an emerging technology that is likely to play a critical role in twenty-first-century defense.






Deborah Lee James
Atlantic Council Board Director
Former Secretary of the Air Force

Executive summary

The United States has been the world’s innovation leader since the time of Thomas Edison, and this innovation edge has provided the United States and its allies with enormous economic, military, and geopolitical benefits. China, however, aims to usurp the US position as the world’s leader in the most important technologies of the twenty-first century, including artificial intelligence (AI), quantum computing, hypersonic missiles, and unmanned aerial systems (UAS), commonly known as drones. Using a variety of unfair trade practices, including massive intellectual-property theft, China has closed the gap, and even maintains the lead, in some of these critical technologies, including UAS.

While the United States has preserved its edge in large military drones, China dominates the market for smaller and commercially available drones with dual-use civilian and military applications. China controls 90 percent of the drone market in the United States and 80 percent globally.

China’s supremacy in the commercial UAS market creates a number of national security threats for the United States and its allies. First, Chinese drones operating in the United States and its democratic allies create an intelligence vulnerability, as these drones scoop up sensitive data that can be transferred back to Beijing for a variety of national security purposes, including aiding the Chinese People’s Liberation Army (PLA) in targeting critical infrastructure for cyber and kinetic military attacks.

Second, China’s drone-manufacturing prowess provides a military edge. Russia’s war in Ukraine demonstrates that inexpensive commercial drones will be critical to intelligence, surveillance, reconnaissance, and strike in twenty-first-century warfare.

Third, and related, the free world has a supply-chain vulnerability problem, as it is dependent on an autocratic adversary for access to UAS for both civilian and military purposes, creating dangerous dependencies that China could exploit in crisis or peacetime. States increasingly utilize “drone diplomacy” to gain influence abroad. The act of selling a drone can be used to “extract concessions, exert influence, counter rivals, and strengthen military ties.” China’s artificially low prices for UAS, achieved through state subsidies, crowd out the development of a homegrown domestic drone industry in the United States and among US allies.

Fourth, Chinese-built drones threaten democratic values and human rights, as the Chinese Communist Party (CCP) and other autocracies employ Chinese drones for surveilling their populations, including in the CCP’s genocide of the Uyghur minority.

To address these challenges, the United States and its allies need a new strategy to protect against the threats posed by Chinese drones, strengthen their position in the international UAS market, and assert global leadership in this key twenty-first-century technology. To help the United States and its allies win the new tech race, the Scowcroft Center previously published a three-part “promote, protect, and coordinate” strategy. This paper updates that framework, and applies it to the issue of dual-use drones.

First, the United States and its allies should protect their countries from the national security threat posed by Chinese-made drones by prohibiting their use in sensitive areas, such as by the government and in critical infrastructure.

Specific recommendations include the following.

  • The US Congress should pass the Countering CCP Drones Act and the Drone Infrastructure Inspection Grant (DIIG) Act.
  • The US Congress should pass legislation to make US state-level bans effective and actionable by offering federal-government support for their implementation, including through targeted grant programs accelerating the transition to secure and capable systems.
  • The US State Department should, in light of increasing global restrictions on People’s Republic of China (PRC)-made drones, launch an initiative to educate allies and partners on the risks associated with those systems, and support secure and capable alternatives.
  • The US State Department should encourage allies and partners to enact tariffs and sanctions on PRC-made UAS to counter China’s unfair trade practices.

Second, the United States and its allies should promote domestic drone manufacturing to provide a secure alternative to PRC-made drones.

Specific recommendations include the following.

  • The US federal government should provide targeted grants to accelerate the transition to secure drones in the government and critical-infrastructure sectors, and should consider funding to expand domestic drone manufacturing.
  • The US State Department should encourage allied governments to do the same, providing reasonable funding measures to accelerate the transition to secure US and allied solutions.
  • The US Congress and the Department of Defense (DOD) should ensure that the Replicator initiative has the proper funding and support to achieve the ambitious goals laid out in the program.
  • The US Departments of State and Defense should encourage key allies to adopt their own versions of the Replicator initiative to ensure the free world has UAS in mass necessary to deter and defeat aggression.
  • The US Congress should pass legislation, using a public-private partnership framework, to stimulate investment in research and development of autonomous drones, and scale existing UAS-manufacturing capabilities in the United States.

Third, and finally, the United States should align with its allies and partners to forge a coherent free-world approach to the setting of policies, regulations, and norms regarding commercial UAS.

Specific recommendations include the following.

  • The US State Department should elevate drones in technology and commercial diplomacy, starting by designating an individual to lead allied cooperation on drone policies, manufacturing, and supply-chain security.
  • The United States and its allies should work with existing multilateral frameworks including the US-EU Trade and Technology Council (TTC), Group of Seven (G7), Group of Twenty (G20), Quad, Department of Commerce, and World Trade Organization (WTO) to develop regulations and norms for the responsible use of drones and autonomous systems.
  • The United States should leverage NATO and AUKUS Pillar II to improve defense coordination related to UAS.

Pursuing this strategy now will help the United States and its allies maintain their innovation edge and prevail in a new era of strategic competition against revisionist autocracies.

The threat posed by China’s dominance of the global unmanned aerial vehicle (UAV) industry

In 2023, the global UAS market was worth more than $30 billion, a number projected to increase to more than $55 billion by 2030. The market is dominated by firms based in China, with DJI controlling 80 percent of the commercial market within the United States and as much as 70 percent of the global market, and Autel, another PRC manufacturer, controlling 7 percent globally. As of 2021, estimates put Autel’s US market share at 15 percent. In comparison, Skydio, perhaps the most prominent US-based company, had only a 3 percent share of the global market, the same as Parrot, a French-based entity.

Commercial drone brand market share by country of origin

DroneAnalyst’s 2021 Drone Market Sector Report includes data from a survey of drone industry stakeholders in over 100 countries on the percentage of all new commercial drone purchases. The graph examines the percentage each company has of the global market share and sorts by the headquarter location of each company. DroneAnalyst

In 2020, 90 percent of UAS operated by US public-safety agencies were manufactured by DJI, though this number has since fallen due to a series of state and local bans. In Florida, before a recent ban was enacted, more than 1,800 of 3,000 UAS registered by the government and police departments were manufactured by DJI and Autel. However, in some states, DJI and Autel still hold a disproportionate market share among public-sector entities. In New Jersey, more than 500 of the 550 UAS registered by the state and local police departments were made by DJI or Autel.

US allies continue to rely heavily on PRC-made drones. In the United Kingdom (UK), for example, 230 out of the 337 drones operated by police forces across the country are DJI products. In Australia, a report revealed that federal agencies owned several thousand DJI drones, although the Australian military had grounded its systems and other agencies had begun to move away from them as well.

The global-market dominance of DJI and Autel has been supported by two national CCP policies, Made in China 2025 and Military-Civil Fusion, which are supported in part by industrial and corporate theft of foreign technology. The PRC has never been a market economy. Instead, it relies on a noncompetitive system of trade, bolstered by subsidies and other unfair practices.

Made in China 2025 was announced in 2015 and seeks to boost China’s manufacturing competitiveness across a variety of industries. The plan focuses on ten different sectors, including the development of UAS. Across each sector, the PRC aims to increase China’s domestic manufacturing capacity to have 70 percent of the core components and materials produced in China by 2025. To achieve this goal, the PRC uses a variety of tactics, such as creating financial and tax incentives to convince foreign-based firms to shift manufacturing and research and development (R&D) operations to China, intellectual-property theft, predatory procurement policies, and financing state-owned enterprises in their acquisitions of overseas companies.

Military-Civil Fusion (MCF) is central to Xi Jinping’s plan to allow China to modernize its military by 2035 and ensure that the PLA becomes “world-class” by 2049. At its core, MCF is a strategy that aims to break down barriers between commercial R&D and military products, allowing the PLA to rapidly identify, adopt, scale up, and leverage commercial technologies that also have a military application, such as UAS. The MCF system also encourages linkages between the state and dozens of private companies that can contribute to military projects and help meet procurement needs, including companies that develop unmanned systems. To achieve the goals of MCF, the PRC uses both licit and illicit means, including exploiting global academic exchanges, investment in foreign companies, forced military transfer, and, in some cases, blatant theft.

As a result of these strategies, DJI and Autel can sell their UAS at below-market cost to the United States and allied countries, a process known as dumping. A 2017 investigation by the US Department of Homeland Security found that, in 2015, DJI slashed its prices by 70 percent, leading to a problem highlighted in 2019 by then Under Secretary of Defense for Acquisition and Sustainment Ellen Lord, who said, “We don’t have much of a UAS industrial base because DJI dumped so many low-price quadcopters on the market, and we then became dependent on them.” DJI has even clearer linkages to the CCP than just state support for illegal trade practices. A 2022 Washington Post investigation found four different CCP-owned or operated investment vehicles invested in DJI.

The US government recognizes the threat posed by PRC-made drones. In 2021, the Department of Defense released a statement indicating that DJI systems pose potential threats to national security. In 2022, the department identified DJI as a Chinese military company operating in the United States. Similarly, the Treasury Department added DJI to the Chinese Military-Industrial Complex (CMIC) companies list, which prevents US citizens from investing in or trading their stock, should DJI attempt to build a public company.

PRC-made UAS pose four direct national security concerns. The first concern relates to Chinese intelligence collection in the United States. In early 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released an alert that stated, “The use of Chinese-manufactured UAS in critical infrastructure operations risks exposing sensitive information to PRC authorities, jeopardizing U.S. national security, economic security, and public health and safety.” These concerns represented by the joint CISA-FBI alert are compounded by China’s 2017 National Intelligence Law, which mandates that private companies work with the PRC’s intelligence services. Article 14 of the law states, “State intelligence work organs, when legally carrying forth intelligence work, may demand that concerned organs, organizations, or citizens provide needed support, assistance, and cooperation.” In practice, this may include Chinese drone companies sharing sensitive flight data, the personal information of users, geolocation data, images, and video collected in the United States with the CCP. The transfer of such information to the CCP would allow Beijing to identify and exploit US vulnerabilities and facilitate the sabotage, disruption, or destruction of US critical infrastructure in times of crisis or conflict. Indeed, in 2017, US Immigration and Customs Enforcement determined that DJI was likely providing information about critical US infrastructure sites to the PRC, which the PRC then used to target specific assets. At the strategic level, FBI Director Christopher Wray warns that the Chinese security services present a “broad and unrelenting threat” to US critical infrastructure and are prepared to “wreak havoc.” PRC-made UAS have also been located in restricted airspace, including over Washington, DC. This is despite DJI claiming to have geofencing restrictions, which, in theory, limit where its UAS can operate.

The second concern relates to military effectiveness. The war in Ukraine is a testbed for new military technologies, and small commercial UAS have been a game changer in the conflict. They allow troops on the ground to conduct more accurate, real-time intelligence, surveillance, and reconnaissance (ISR) of adversary positions and troop movements, and to facilitate more effective fires. They have also proven to be an effective and economical strike option, as UAS can destroy much more expensive platforms by crashing into them or dropping inexpensive bombs. Indeed, Chinese drones are making Vladimir Putin’s war machine more lethal. As of March 2023, the PRC had sold more than $12 million in UAS and parts to Russia. The consistent supply of UAS has allowed Russia access to a cheap and plentiful way to carry out ISR and targeted attacks. DJI and Autel are the number one and two brands, respectively, that China exports to Russia. To maintain deterrence in Europe and the Indo-Pacific, the United States and its allies will need the ability to develop trusted drones, at scale, for military purposes and to counter adversaries’ drones. Recent news from China makes that reality more important. Last year, China enacted export controls on small commercial drones for the first time. Those controls threaten to choke Ukraine’s primary source of drones without affecting supplies to Russia. That development highlights the criticality of the United States and its allies developing alternative sources of supply.

An Autel Robotics Dragonfish Pro drone, with an 18-mile range, is displayed during CES 2022 at the Las Vegas Convention Center in Las Vegas, Nevada, U.S. January 5, 2022. REUTERS/Steve Marcus

A third concern relates to secure supply chains. In recent years, the United States and its allies have recognized they are economically vulnerable due to dependence on autocratic rivals—China and Russia—for critical supplies, including semiconductors, critical minerals, energy, and much else. As demonstrated by the recent Chinese efforts to strangle Ukraine’s source of supply, the PRC has the ability to restrict US and allied access to UAS, potentially limiting their access in wartime. Similarly, drone customers not subject to federal or state prohibitions on Chinese drones, such as commercial entities, remain vulnerable to the PRC’s ability to restrict their access to UAS for civil purposes in peacetime.

The fourth and final concern relates to human rights. China commits gross human rights violations, including genocide against its Uyghur minority population. Under the Uyghur Human Rights Act of 2020, Washington committed to sanctioning companies that participate in atrocities against the Uyghurs. The US Treasury Department stated, “SZ DJI has provided drones to the Xinjiang Public Security Bureau, which are used to surveil Uyghurs in Xinjiang. The Xinjiang Public Security Bureau was previously designated in July 2020, pursuant to the Global Magnitsky Human Rights Accountability Act for connection to human rights abuses in Xinjiang.” DJI has already been added to the Commerce Department’s entity list, which restricts the ability of US companies to sell technology and component parts to DJI. DJI’s complicity in the human rights violations against the Uyghurs is indicative of the CCP’s support of authoritarianism globally. China and its authoritarian partners increasingly use UAS to suppress democracy and human rights globally. Countering DJI and other PRC UAS companies is critical to limiting the reach of autocrats and supporting democracy globally.

Ongoing efforts to counter PRC-made drones

The United States and its allies have already undertaken some efforts to challenge the dominance of Chinese UAS. At the federal level, the Donald Trump administration banned the sale of US technology to DJI without a license. The Department of Defense, Department of Homeland Security (DHS), and Department of the Interior stopped using Chinese drones in 2018, 2019, and 2020, respectively. Congress codified the Pentagon’s ban in 2019. The 2022 National Defense Authorization Act (NDAA) expanded those restrictions to prohibit DOD from buying UAS or components from Russia, Iran, and North Korea. This law was further expanded to ban defense contractors from using UAS and components manufactured in the PRC, Russia, Iran, and North Korea in execution of their DOD contracts starting in 2023. The American Security Drone Act, passed in the 2024 NDAA, bans federal government entities from buying and operating UAS from designated adversarial nations, including China, and prohibits the use of federal funds to purchase or operate these drones starting in December 2025.

At the state level, Arkansas, Florida, Hawaii, Mississippi, Nevada, Texas, Tennessee, and Utah have restricted the use of PRC-made UAS by state agencies, local agencies, or both. Those restrictions generally mirror federal laws, protecting government agencies from insecure products connected to adversarial nations. This first phase of state action focused on government end-user restrictions, but a second phase—focused on providing grants to accelerate the transition away from insecure drones—is under way. In 2023 Florida enacted a $25-million grant program to help local agencies reduce their dependency on insecure drones. In 2024, legislators in several states proposed similar grant programs.

There are additional efforts under way in the US Congress. Representatives Elise Stefanik and Mike Gallagher introduced the Countering CCP Drones Act to amend the Secure and Trusted Communications Networks Act of 2019. Their bill would add DJI to the list of equipment banned from operating on US telecommunications infrastructure, potentially impacting DJI’s ability to place new products on the market. The bill would not affect existing DJI drones.

In an effort to better equip the United States with UAS for military purposes, the DOD recently announced the Replicator initiative, which aims to directly counter PRC dominance in the domain of attritable autonomous systems. Replicator was motivated, in part, by the recognition that the PRC has a scale advantage, which allows Beijing to rapidly manufacture and field weapons systems, including attritable autonomous systems. With Replicator, DOD aims to deploy thousands of autonomous systems. Open questions remain as to what systems will be selected for Replicator, how the initiative will be funded, and how many systems will be procured. To be decisive in a near-peer conflict, Replicator will likely need to purchase tens of thousands of various systems to be used across all domains. For example, the UK-based Royal United Services Institute estimates that Ukraine is losing ten thousand drones per month in its fight against Russia, providing insight into the scale of the total number of UAS. To complement Replicator and make all-domain attritable autonomous systems decisive in near-peer conflict, the DOD should consider stockpiling drones. The stockpiling of these systems would be a hedge against supply-chain interruptions in times of conflict, and would allow for the quick delivery of drones to theaters of conflict as these systems are rapidly expended on the battlefield.

US allies have also started to act. In 2022, Lithuania banned the purchase of technology from countries deemed “untrustworthy” for applications in defense and security, including PRC-made UAS. India has gone further, banning both Chinese-made drones and their component parts. Australia’s military services and border force have grounded DJI drones, and other agencies appear to be transitioning to secure systems. In Japan, the coast guard stopped using DJI drones in 2020 due to cybersecurity concerns.

While the above actions are a good start, the United States and its allies need a whole-of-free-world strategic framework to mitigate the threat posed by PRC-made drones.

A free-world strategy for securing UAV supply chains

The United States and its allies should adopt a comprehensive strategy to address the threat posed by Chinese-made drones. The goal should be to reduce or eliminate the national security threats that come from an overreliance on PRC-made drones, and to develop an alternative drone market in trusted countries. To achieve these goals, the United States and its allies should pursue a three-part “protect, promote, and align” strategy.

1. Protect the United States and its allies from the national security threat posed by PRC-made drones.

The first element of a strategy for securing UAV supply chains is to protect US and allied markets from PRC-made drones that threaten national security or that violate international trade laws and norms. This begins by pursuing a hard decoupling from Chinese-made drones in areas of sensitive national security concern. The regulation of UAS can be modeled after the “small yard, high fence” approach that the United States is taking to the regulation of other critical technologies, such as semiconductors.

In the United States, the American Security Drone Act is a good first step, but it is insufficient to fully address the problem. In addition, Congress should pass the Countering CCP Drones Act to prohibit Chinese drones from operating on Federal Communications Commission (FCC) infrastructure, just as the United States did for Chinese telecommunication companies Huawei and ZTE. As identified by CISA and the FBI, the continued operation of Chinese UAS on US infrastructure raises the risk that the PRC will gain access to sensitive information and could use that information to conduct espionage on vulnerabilities in US critical infrastructure and public-safety response footprint, and to stage potential cyberattacks. Volt Typhoon, a recently disclosed Chinese threat activity discovered penetrating US critical infrastructure to prepare for future attacks, illustrates the stark nature of the threat. Currently, the American Security Drone Act would only ban DJI, but this should be amended to include all PRC-made drones, including those made by Autel.

Reasonable restrictions on PRC-made drones should be extended to state and local governments. Currently, the diverse range of legislation at the state and local levels has created a piecemeal approach that is confusing and leaves loopholes. Furthermore, the ban on Chinese drones operating in the United States should include the US private sector operating in sensitive national security areas, such as inspecting critical-infrastructure sites.

Next, the State Department should work with US allies and partners and encourage them to pass similar legislation restricting Chinese drones in sensitive sectors and to cooperate on common drone policies going forward. US global defense readiness and ability to project power in key regions could be compromised if China is able to gather sensitive intelligence and targeting information through drones operating in key allied countries. The United States and its allies already discuss critical and emerging technology cooperation through various forums, such as the US-EU Trade and Technology Council. The State Department should elevate drone cooperation as a key agenda item for discussion and cooperation in these forums. Additionally, the State Department should designate an individual who has the mandate to lead diplomatic efforts on drone cooperation.

In addition, the United States and its allies should seek coordinated tariffs and other countervailing measures to offset China’s unfair trade practices and level the playing field. The United States should maintain, if not increase, its 25-percent tariff on Chinese-made drones. There will, of course, be a cost to these measures, but they can be partially offset by the recommendations in the following “promote” element of the strategy. Should the United States increase tariffs on Chinese-made drones, the corresponding increased tariff revenue could be used to fund various grant programs to help existing Chinese drone customers—such as law-enforcement agencies—transition to US or allied drones.

When considering tariffs, it is critical to counter tariff evasion. In March 2024, bipartisan members of Congress wrote to the Joe Biden administration raising serious concerns that Chinese drone makers are evading the 25-percent tariffs by transshipping drones through Malaysia. The letter said, “[A]fter exporting virtually zero drones to the United States and being home to no major domestic drone manufacturers prior to 2022, Malaysia’s drone exports to the United States jumped inexplicably to 242,000 units that year.” In “the first eleven months of 2023 the United States imported more than 565,000 drones from Malaysia.” It is critically important to tackle transshipment, and to apply equivalent tariffs to—or categorical bans on—companies and products found to be complicit.

As part of this strategy to secure drone supply chains, the United States must be wary of efforts by DJI and other Chinese drone companies to avoid US sanctions. The New York Times reported earlier this year, for example, about a Texas-based company that licenses its drone designs from DJI and sources much of its parts from China. Legislative initiatives by Congress and other efforts by federal regulators to curb dependence on Chinese drones need to eliminate loopholes that would enable Chinese companies to evade punitive measures by distributing their products through US-based companies.

In preparation for a possible crisis or conflict with China, Washington and its allies should also be prepared to enact wide-reaching sanctions against Chinese companies critical for China’s military and intelligence activities, including DJI and Autel.1 Washington must also be prepared to sanction companies involved in the overall procurement process for UAS, something that the Treasury Department has done in targeting companies that support Iran’s UAV industry. A response to the PRC in a time of crisis would also include enacting retaliatory export restrictions of US technology to China. To best prepare for these potential impacts, the Sanctions Economic Analysis Unit, established within the Department of the Treasury, should undertake research to understand the possible “collateral damage of sanctions before they’re imposed, and after they’ve been put in place to see if they should be adjusted.” A quick and easy win in this space would be adding Autel to the Department of Defense’s 1260H list, the Commerce Department’s entity list, and the Treasury Department’s Chinese Military-Industrial Complex Companies List, joining DJI. Additionally, the United States must work to develop robust and durable secure supply chains for all components of UAS, including through the development of a domestic industrial base.

To guide engagement with its allies, the United States should leverage the recently established Office of the Special Envoy for Critical and Emerging Technology (S/TECH). The S/TECH should make secure supply chains for drones a priority, along with other measures such as coordinating restrictions and safeguards against Chinese drones. Additionally, the DOD should elevate UAS as a priority agenda item for all bilateral and multilateral technology engagements carried out by US diplomats with allies and partners.

Taken together, these steps will offer significant protection for the United States and its allies from the threat of Chinese-made UAS.

U.S Secretary of State Antony Blinken, accompanied by the U.S. Ambassador to Nigeria Mary Beth Leonard, walks past a Zipline drone while touring an Innovation Exhibition at Innov8 Hub in Abuja, Nigeria November 19, 2021. Andrew Harnik/Pool via REUTERS

2. Promote the development of a robust drone-manufacturing capability in the United States and allied countries to provide a secure alternative to PRC-made drones.

The second major element of the strategy is to promote the development of a robust drone-manufacturing capability in the United States and allied countries. As outlined above, drones are critical for many purposes, and Chinese-made systems dominate all drone markets. As the United States and allied countries successfully de-risk from Chinese-made drones, they will need to replace this supply with drones produced by trusted sources.

Some of the steps identified in the “protect” element of the strategy will also stimulate domestic US and allied production. A selective ban on Chinese drones will naturally increase demand for drones produced elsewhere. Stiffer tariffs on Chinese-made drones will help to level the playing field and make non-PRC-made drones more competitive in the market.

To ensure these bans can be effectively enacted while being minimally disruptive, the federal government should provide funding incentives to facilitate the transition away from PRC-made UAS. As noted earlier, Florida’s ban on PRC-made UAS left local bodies, including fire departments and law-enforcement agencies, scrambling to find funding for alternatives. The provision of federal funds can help overcome the financial burden of buying alternatives to PRC UAS. The DIIG Act, for example, promises to provide funding for state and local agencies to purchase UAS for infrastructure inspections. Federal funding should be conditional, and only available to states that fully ban PRC-made UAS. For example, states that only ban DJI and not Autel, or that fail to ban the use of PRC-made UAS by contractors, would not be eligible for this funding.

The State Department should share these efforts, such as the DIIG Act, with allied countries and encourage the adoption of similar measures by allied governments. Its network of allies is the cornerstone of US national security. Therefore, the United States must encourage its allies to adopt similar policies that promote their own security as well.

In addition, the Pentagon’s Replicator initiative should be harnessed to stimulate a major leap forward in the development and deployment of US autonomous systems. In the short timeframe of 18–24 months, Replicator can help modernize the DOD’s warfighting capabilities and produce thousands of new drones. The US Congress and the DOD should prioritize significant, enduring funding for the Replicator initiative.

The efforts initially achieved through Replicator can be boosted by utilizing the Office of Strategic Capital (OSC). Established in 2022, OSC identifies critical technologies for the DOD and partners with private capital and other agencies to create investment vehicles. Given Replicator’s priority status for the department, the development of the autonomous UAS industry should be a prioritized area for OSC. However, OSC funding is designed to target small companies that would not be able to produce systems at scale in order to contribute to Replicator. Instead, OSC should consider boosting small, innovative companies that are in the UAS supply chain and help enable the critical domestic industrial base of advanced components for current and future UAS systems. By designating UAS as a priority area for OSC, the Department of Defense can help create a strong domestic manufacturing base for this technology.

There is potential for OSC funding to play an important role in strengthening the domestic UAS industry, with the White House requesting $144 million for the office in 2025. In addition to fully meeting the White House’s request for OSC funding, Congress should continue funding other accelerators and offices that strengthen the development of companies across the DOD’s fourteen critical technology areas.

In order to meet any potential funding gaps, the DOD should be prepared to provide additional funding for investment in small UAV systems outside of OSC, including by increasing related funding to the relevant task forces working inside of the Army, Navy, and Air Force. Furthermore, Congress should authorize additional funding for the Defense Production Act that will allow the Department of Defense to further invest in the defense industrial base, including the development of asymmetric capabilities such as the small drones that have played a critical role in Ukraine’s battlefield success.

The US Departments of State and Defense can encourage key allies to adopt their own versions of the Replicator program to ensure the free world has UAS in mass that will be necessary to deter and defeat aggression in the twenty-first century. Additionally, the Department of Defense should consider the potential to invite other allies and partners into the Replicator program, or establish a multinational, allied Replicator initiative. In doing so, the department would scale the allied drone industry, create interoperability among combined allied forces, and strengthen allied deterrence against great-power adversaries.

DOD is already working to integrate UAS and autonomous systems more broadly into its operations. The US Navy’s Task Force 59 aims to better integrate emerging technologies into warfighting, and is currently focused on robotics and autonomous systems. Task Force 59 operates a variety of uncrewed vehicles, including submersible and surface-level ships, alongside UAS.

The Air Force operates Task Force 99.2 Based in Qatar, it has developed a 3D-printed UAV, dubbed the “kestrel,” which can be produced for $2,500 and can carry a payload of up to three kilograms.

The efforts of Task Forces 59 and 99 are a solid start, but they have been challenged by institutional hurdles and a lack of funding. Similar concerns have been raised about the ability of the private sector to meet the government’s demand for Replicator. Any successful long-term strategy in this area will require close coordination between the private and public sectors. Replicator offers a good starting point, allowing the DOD to establish trust with the defense-technology industry, break free from the antiquated Cold War procurement process, and establish the new defense industrial base required for twenty-first-century security.

Beyond Replicator, Congress should pass legislation modeled on the CHIPS and Science Act to produce autonomous unmanned aerial vehicles. Recognizing a similar challenge related to domestic semiconductor manufacturing, Congress passed the CHIPS and Science Act in 2022. The act provides billions of dollars in incentives for the research, development, and manufacturing of semiconductors. It has already stimulated the construction of new semiconductor-fabrication facilities in the United States. Similarly, the United States should provide a variety of incentives, including tax credits and investments, for the research, development, and manufacturing of autonomous vehicles. Stimulating US manufacture of autonomous vehicles will make drones available for DOD procurement, while also allowing US-made UAS to be sold globally for commercial applications.

Creating an equivalent piece of legislation for the manufacturing of UAS would have one major difference compared to the CHIPS Act—the price would be significantly lower. A manufacturing facility for the production of semiconductor chips costs a minimum of $10 billion while taking at least five years to build. Compare that to the US drone manufacturer Skydio, which raised $230 million in additional funding in 2023, part of which paid for the construction of a new UAV-manufacturing facility within the United States that expanded its production capacity ten times. For a fraction of the $54-billion CHIPS Act, the United States can successfully develop and support a variety of domestic UAV-manufacturing operations.

US allies and partners have taken note of the CHIPS Act and passed their own legislation to advance in this space. For example, the European Union enacted the European Chips Act into law in September 2023. As the US encouraged allies to invest in CHIPS, it can encourage key allies to stimulate domestic drone manufacturing in their countries.

Coordinating these actions will require a whole-of-free-world approach, among the White House, the Department of Defense, the Department of State, the Department of Commerce, and US allies and partners. To achieve these ambitious goals, the president should consider designating an individual within the State Department’s S/TECH office. This individual would be responsible for coordinating this slate of policy proposals, similar to how the White House coordinator for CHIPS implementation operates. The special envoy should set a date for achieving the above benchmarks to ensure accountability.

Taken together, these actions can help create an industrial base in the United States and allied countries to provide a secure supply for UAS.

3. Align with allies and partners to forge a coherent free-world approach to the setting of policies, regulations, and norms regarding commercial UAS.

The third major element of the strategy is to forge a coherent free-world approach to the setting of policies, regulations, and norms regarding commercial UAS. Among the United States’ greatest strengths in its competition with China is its network of allies and partners. Combined, the United States and its allies possess nearly 60 percent of global gross domestic product (GDP) and, when they work together, they retain a preponderance of power to shape global outcomes.

The G7, the G20, and the Quad are all multilateral groupings in which the United States has galvanized allies and partners alike to develop a series of secure supply chains for semiconductors. It should do the same with UAS.

The Scowcroft Center has previously argued that the United States and its allies should establish a new Democratic Technology Alliance to coordinate the free world’s approach on emerging technology, including UAS. Short of this, the United States and its allies should work through existing bilateral and multilateral channels.

The United States should continue to work with its allies to develop regulations and norms for the responsible use of new technology, including UAS, through bodies such as the US-EU TTC, NATO, G7, G20, and WTO. The United States would be well served to develop polices in coordination with its allies and partners through these forums. Doing so will help ensure a coordinated approach going forward. The United States should also raise concerns in these bodies about China’s unfair and illegal behavior. Though the WTO lacks teeth when coming after China, raising concerns about its behavior and trade disputes at the WTO can help build evidence of a pattern of unfair actions. The development of clear norms would help to demonstrate that the free world is not taking punitive measures against China or seeking to hold China down. Rather, it is taking prudent actions to protect itself from China’s unfair and threatening practices. If China were to reform its practices and its economic system, it could be welcomed back into US and allied markets.

Concurrently, the Department of Commerce and its International Trade Administration should play a central role in developing a trusted ecosystem—both in the United States and with its allies and partners—to secure critical components to strengthen domestic UAS manufacturing while promoting US-made drones around the world.

In addition, the United States should leverage the new trilateral defense pact, AUKUS. AUKUS Pillar II brings together Australia, the United Kingdom, and the United States to improve defense coordination across critical-technology areas, including artificial intelligence and autonomy, innovation, and information sharing. The Pentagon should work with AUKUS partners to prioritize the development of advanced UAS.

Moreover, Washington should work with allies and partners to develop a secure supply chain for UAV components and manufacturing. DOD has already cleared two drones produced by Parrot, a French UAV manufacturer, as secure and reliable through its Blue UAS program. This will allow for the manufacturing of component parts through final assembly to take place in trusted countries.

NATO offers other opportunities for Washington to coordinate with allies on emerging technologies. The NATO Defence Innovation Accelerator for the North Atlantic (DIANA) is a venue for Alliance members to coordinate on the development of emerging technologies, bringing together researchers, industry, and government. In 2023, DIANA announced the first three areas in which it aims to encourage the development of dual-use technologies. One of these domains, sensing and surveillance, is a logical avenue for the allied development of UAS. Indeed, DIANA has already accepted a Czech UAV manufacturer into the program. Here, the United States should utilize DIANA as a means to further cooperation on UAS and enable reciprocal development and manufacturing relationships across Europe, creating the basis of a dual-use drone industry.

In addition, the United States should work with its allies to secure the key UAS component supply chain, including batteries and battery cells. Part of the solution concerns mineral access. Amid a global transition to low-carbon energy sources, China’s strong position in the global lithium market and Russia’s robust nickel-mining capacity present challenges to US efforts to secure access to minerals needed for batteries. As several colleagues in the Atlantic Council’s Global Energy Center have argued, one option to address these challenges is supporting research, development, and capacity building for alternative battery chemistries. This includes leveraging public capital from US and allied governments and using tax incentives to encourage diversification of battery inputs. In 2021, the Department of Energy announced that innovations related to advanced batteries, which were developed via taxpayer dollars through Department of Energy (DOE) funding, would need to be “substantially” manufactured in the United States. In 2023, as a result of the Bipartisan Infrastructure Law, DOE announced $3.5 billion “to boost domestic production of advanced batteries and battery materials nationwide.” At the same time, the federal government, as well state and local governments, will need to muster the political will to allow domestic mining and refining of these minerals to ensure truly secure access to batteries. Once regulatory red tape is reduced, private capital necessary for the development of this domestic capability will enter the battery market. This sort of public-private engagement is an important part of shoring up the US battery supply chain and mitigating vulnerabilities vis-à-vis China.

Taken together, these steps will help to ensure a successful and coordinated free-world approach to UAS.

Conclusion

This paper recommended a protect-promote-align strategy to help the United States and its allies secure a trusted UAS industry to compete against China. China’s dominance of the dual-use UAS sector presents an unacceptable national security risk to the United States and its allies. Following this strategy will allow the United States and its allies to counter the unfair CCP practices that have led to China’s ill-begotten dominance of the global UAS market. A dedicated strategy, one that limits the use of PRC-made UAS, creates incentives for domestic UAS production, aligns the United States and its likeminded allies, and will allow the free world to retain its innovation edge over the CCP and better position itself for victory in a new era of strategic competition.

About the authors

Matthew Kroenig is vice president and senior director of the Atlantic Council’s Scowcroft Center for Strategy and Security. In these roles, he manages the Scowcroft Center’s nonpartisan team of more than thirty resident staff and oversees the Council’s extensive network of nonresident fellows. His own research focuses on US national security strategy, strategic competition with China and Russia, and strategic deterrence and weapons nonproliferation.

Imran Bayoumi is an associate director with the Scowcroft Strategy Initiative in the Atlantic Council’s Scowcroft Center for Strategy and Security. He supports the Center’s work on foresight and strategy development, focusing on emerging technologies, conflict, and climate security. In addition, Bayoumi contributes to the development of the Center’s annual “Global Foresight” publication.   


Related content

The Scowcroft Strategy Initiative works to develop sustainable, nonpartisan strategies to tackle security challenges.

1    For an in-depth examination of what potential sanctions targeting the PRC will look like across a wide range of sectors see: Charlie Vest and Agatha Kratz, “Sanctioning China in a Taiwan Crisis: Scenarios and Risks,” Atlantic Council, June 21, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/sanctioning-china-in-a-taiwan-crisis-scenarios-and-risks/.
2    The US Army operates Task Force 39, a similar initiative to Task Forces 59 and 99, which focuses on the development of semi-autonomous ground-transport systems working to advance the integration of big data and artificial intelligence across the US Army more broadly. Task Force 39 is also involved in the development of the Red Sands counter-drone technology initiative, in partnership with Saudi Arabia. For more information, see: Jon Harper, “How US Central Command’s Task Forces Are Shaping the Future of Operational AI,” DefenseScoop, May 10, 2023, https://defensescoop.com/2023/05/10/how-us-central-commands-task-forces-are-shaping-the-future-of-operational-ai/ https://taskandpurpose.com/news/task-force-99/.

The post A global strategy to secure UAS supply chains appeared first on Atlantic Council.

]]>
Dean quoted in the Sydney Morning Herald on implications of a second Trump administration for allies https://www.atlanticcouncil.org/insight-impact/in-the-news/dean-quoted-in-the-sydney-morning-herald-on-implications-of-a-second-trump-administration-for-allies/ Mon, 24 Jun 2024 19:12:13 +0000 https://www.atlanticcouncil.org/?p=777387 On June 23, IPSI nonresident senior fellow Peter Dean was quoted in the Sydney Morning Herald, where he shared what a second Trump administration could mean for allies. 

The post Dean quoted in the Sydney Morning Herald on implications of a second Trump administration for allies appeared first on Atlantic Council.

]]>

On June 23, IPSI nonresident senior fellow Peter Dean was quoted in the Sydney Morning Herald, where he shared what a second Trump administration could mean for allies. 

The post Dean quoted in the Sydney Morning Herald on implications of a second Trump administration for allies appeared first on Atlantic Council.

]]>
National resilience is a crucial part of defense. Here are the countries doing it right. https://www.atlanticcouncil.org/blogs/new-atlanticist/national-resilience-is-a-crucial-part-of-defense-here-are-the-countries-doing-it-right/ Mon, 03 Jun 2024 18:30:07 +0000 https://www.atlanticcouncil.org/?p=769864 Learning from the allies that are already taking action will give other NATO members that decide to enhance their resilience a leg up.

The post National resilience is a crucial part of defense. Here are the countries doing it right. appeared first on Atlantic Council.

]]>
National resilience has long been part of NATO’s mission; indeed, it has its very own paragraph in the North Atlantic Treaty. But for years, NATO allies neglected national resilience. Recently, however, many of them have realized that national resilience is fundamental to their security. Better yet, some are now taking innovative action to improve their resilience. Learning from the allies that are already taking action will give other allies that decide to enhance their resilience a leg up.

“In order more effectively to achieve the objectives of this Treaty, the Parties, separately and jointly, by means of continuous and effective self-help and mutual aid, will maintain and develop their individual and collective capacity to resist armed attack,” reads Article 3 of the North Atlantic Treaty, which was signed seventy-five years ago in Washington, DC. Even though Article 3 precedes Article 5, many allies have not taken it particularly seriously—at least not since the end of the Cold War.

That’s because national resilience is harder to quantify than military defense. With the latter, the armed forces, policymakers, and even the public can assess how large and effective efforts are. Armed forces have a specific number of active-duty service members, a specific number of reservists, and specific weaponry. But the “individual and collective capacity to resist armed attack” involves a plethora of skills and items that are much harder to identify, let alone measure. There are no rules governing who should participate in resilience, nor is there an official level at which a country (or organization) is considered resilient.

At the 2016 Warsaw summit, NATO leaders attempted to elevate resilience standards by adopting seven “baseline requirements.” These were: assured continuity of government and critical government services, resilient energy supplies, the ability to deal effectively with the uncontrolled movement of people, resilient food and water resources, the ability to deal with mass casualties, resilient civil communications systems, and resilient civil transportation systems. Creating that list was a worthy step, though some allies have treated the baselines more like ambitions than requirements.

Some allies, though, go far beyond the baseline requirements. Indeed, they make national resilience a matter not just of infrastructure and governmental capabilities: instead, they involve the population. Two of the foremost practitioners of societal resilience, Sweden and Finland, have joined the Alliance at just the right time, because they have invaluable knowledge to share.

In the case of Sweden, its society-wide involvement in national security dates back to World War II, when the country had to meet Nazi leader Adolf Hitler’s total war by marshaling all the resources at its disposal: total defense. During the Cold War, Sweden turned these efforts into a system so well-managed that millions (in a country of some eight million at the end of the Cold War) were involved in various parts of national security: as soldiers, as reservists, as members of auxiliary defense organizations, as civilians in crucial professions (from daycare teachers to nuclear engineers), and as ordinary citizens knowing what to do in case of war, because the authorities had regularly kept them informed.

Finland, prevented by the Soviets from operating auxiliary defense organizations, focused instead on preparedness and what it called mental territorial defense: making the Finns steadfast in their support of the country. (Those interested can read more about it in The Defender’s Dilemma.) In recent years, Sweden has once again proven itself as an innovator when it comes to resilience, with initiatives such as the If Crisis or War Comes leaflet, which the Civil Contingencies Agency published six years ago. Especially now that the two friends and neighbors have finally made it into NATO, other allies can pick from their collection of resilience practices and adopt and adapt the ones they like without having to spend the considerable time it takes to create such practices from scratch. Indeed, this kind of learning is already picking up speed. These days Latvia, for example, has a Sweden-like booklet called How to Deal with a Crisis.

But the much-lauded Swedes and Finns, and their Nordic and Baltic friends, are not NATO’s only resilience leaders. The Czech Republic has, through its ministry of defense, launched gray-zone exercises for the private sector. Until the Czech initiative, national-security training for companies had barely been addressed by NATO’s member states, mostly because doing so would require setting up a new format and designing the exercises. Now that the Czech Republic has done so, others can save time and effort by building on the Czechs’ initiatives.

Other allies are also taking important steps. Latvia, for its part, has introduced a defense curriculum that teaches all its high schoolers resilience skills. Germany’s Technisches Hilfswerk (THW), too, is a model worth learning from: 99 percent of those working for this federal agency, whose members help in public emergencies such as storms, are volunteers. The THW doesn’t have a national security mandate, but its model can easily be adapted to national resilience. NATO member states would also do well to learn from close friends outside the Alliance. In the Indo-Pacific, Singapore has an annual total defense day, and Australia is developing an ambitious resilience strategy.

Not every practice is applicable to every NATO country, but what matters is that solutions exist. Learning from friends willing to share best practices is the easiest and most efficient way of learning.


Elisabeth Braw is a senior fellow with the Atlantic Council’s Transatlantic Security Initiative in the Scowcroft Center for Strategy and Security and the author of Goodbye, Globalization: The Return of a Divided World (Yale University Press: 2024).

NATO’s seventy-fifth anniversary is a milestone in a remarkable story of reinvention, adaptation, and unity. However, as the Alliance seeks to secure its future for the next seventy-five years, it faces the revanchism of old rivals, escalating strategic competition, and uncertainties over the future of the rules-based international order.

With partners and allies turning attention from celebrations to challenges, the Atlantic Council’s Transatlantic Security Initiative invited contributors to engage with the most pressing concerns ahead of the historic Washington summit and chart a path for the Alliance’s future. This series will feature seven essays focused on concrete issues that NATO must address at the Washington summit and five essays that examine longer-term challenges the Alliance must confront to ensure transatlantic security.

The post National resilience is a crucial part of defense. Here are the countries doing it right. appeared first on Atlantic Council.

]]>
Who’s a national security risk? The changing transatlantic geopolitics of data transfers https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/whos-a-national-security-risk-geopolitics-of-data-transfers/ Wed, 29 May 2024 19:34:02 +0000 https://www.atlanticcouncil.org/?p=767982 The geopolitics of data transfers is changing. How will Washington's new focus on data transfers affect Europe and the transatlantic relationship?

The post Who’s a national security risk? The changing transatlantic geopolitics of data transfers appeared first on Atlantic Council.

]]>

Table of contents

Introduction
Data transfer politics come to America
Data transfer politics in Europe
Conclusions

Introduction

The geopolitics of transatlantic data transfers have been unvarying for the past decade. European governments criticize the US National Security Agency (NSA) for exploiting personal data moving from Europe to the United States for commercial reasons. The US government responds, through a series of arrangements with the European Union, by providing assurances that NSA collection is not disproportionate, and that Europeans have legal avenues if they believe their data has been illegally used. Although the arrangements have not proven legally stable, on the whole they have sufficed to keep data flowing via subsea cables under the Atlantic Ocean.

Now the locus of national security concerns about international data transfers has shifted from Brussels to Washington. The Biden administration and the US Congress, in a series of bold measures, are moving aggressively to interrupt certain cross-border data flows, notably to China and Russia.

The geopolitics of international data flows remain largely unchanged in Europe, however. European data protection authorities have been mostly noncommittal about the prospect of Russian state surveillance collecting Europeans’ personal data. Decisions on whether to transfer European data to Russia and China remain in the hands of individual companies.

Will Washington’s new focus on data transfers to authoritarian states have an impact in Europe? Will Europe continue to pay more attention to the surveillance activities of its liberal democratic allies, especially the United States? Is there a prospect of Europe and the United States aligning on the national security risks of transfers to authoritarian countries?

Data transfer politics come to America

The US government long considered the movement of personal data across borders as primarily a matter of facilitating international trade.1 US national security authorities’ surveillance of foreigners’ personal data in the course of commercial transfers was regarded as an entirely separate matter.

For example, the 2001 EU-US Safe Harbor Framework,2 the first transatlantic data transfer agreement, simply allowed the United States to assert the primacy of national security over data protection requirements, without further discussion. Similarly, the 2020 US-Mexico-Canada Free Trade Agreement3 and the US-Japan Digital Trade Agreement4 contain both free flow of data guarantees and traditional national security carve-outs from those obligations.

Edward Snowden’s 2013 revelations of expansive US NSA surveillance in Europe put the Safe Harbor Framework’s national security derogation into the political spotlight. Privacy activist Max Schrems then challenged its legality under EU fundamental rights law, and the Court of Justice of the European Union (CJEU) ruled it unacceptable.5

The 2023 EU-US Data Privacy Framework6 (DPF) is the latest response to this jurisprudence. In it, the United States commits to hold national security electronic surveillance of EU-origin personal data to a more constrained standard, as the European Commission has noted.7 The United States’ defensive goal has been to reassure Europe that it conducts foreign surveillance in a fashion that can be reconciled with EU fundamental rights law.

Now, however, the US government has begun expressly integrating its own national security considerations into decisions on the foreign destinations to which US-origin personal data may flow. It is a major philosophical shift from the prior free data flows philosophy, in which national security limits played a theoretical and marginal role.

One notable development is a February 28, 2024, executive order, Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.8 The EO empowers the Department of Justice (DOJ), in consultation with other relevant departments, to identify countries “of concern” and to prohibit or otherwise regulate bulk data transfers to them, based on a belief that these countries could be collecting such data for purposes of spying on or extorting Americans. A week later DOJ issued a proposed rule describing the envisaged regulatory regime, and proposing China, Cuba, Iran, North Korea, Russia, and Venezuela as the countries “of concern.”9

The White House, in issuing the bulk data EO, was at pains to insist that it was limited in scope and not inconsistent with the historic US commitment to the free flow of data, because it applies only to certain categories of data and certain countries.10 Nonetheless, as has been observed by scholars Peter Swire and Samm Sacks, the EO and proposed rule are, for the United States, part of “a new chapter in how it regulates data flows” in that they would create an elaborate new national security regulatory regime applying to legal commercial data activity.11

Hard on the heels of the bulk data EO came congressional passage in April of the Protecting Americans’ Data from Foreign Adversaries Act, which the president signed into law.12 It prohibits data brokers from selling or otherwise making available Americans’ sensitive information to four specified countries: China, Iran, North Korea, and Russia. The new law has a significantly broader scope than the EO. It cuts off certain data transfers to any entity controlled by one of these adversary countries, apparently including corporate affiliates and subsidiaries. It extends to any sensitive data, not just data in bulk. It remains to be seen how the administration will address the overlaps between the new law and the EO.

Another part of the same omnibus legislation ordered the ban or forced sale of TikTok, the Chinese social media platform widely used in this country.13 Advocates of the law point to the government of China’s ability under its own national security law to demand that companies operating there turn over personal data, including, potentially, TikTok users’ data transferred from the United States. Critics have cast the measure as a targeted punishment of a particular company, done without public evidence being offered of national security damage. TikTok has challenged the law as a violation of the First Amendment.14

Finally, the data transfer restrictions in these measures are thematically similar to a January 29 proposed rule from the Commerce Department obliging cloud service providers to verify the identity of their customers, on whose behalf they transfer data.15 The rule would impose know your customer (KYC) requirements—similar to those that apply in the international banking context—for cloud sales to non-US customers, wherever located.

This extraordinary burst of legislative and executive action focused on the national security risks of certain types of data transfers from the United States to certain authoritarian states is indicative of how far and fast political attitudes have shifted in this country. But what of Europe, which faces similar national security data challenges from authoritarian states? Is it moving in a similar direction as the United States?

Data transfer politics in Europe

The EU, unlike the United States, has long had a systematic set of controls on personal data flows from EU territory abroad, articulated in the General Data Protection Regulation (GDPR).16 The GDPR conditions transfers to a foreign jurisdiction on the “adequacy” of its data protection safeguards—or, as the CJEU has refined the concept, their “essential equivalence” to the GDPR regime.

The task of assessing foreign legal systems falls to the European Commission, the EU’s quasi-executive arm. Article 45 of the GDPR instructs it to consider, among other things, “the rule of law, respect for human rights and fundamental freedoms, relevant legislation . . . including concerning . . . the access of public authorities to personal data.”

For much of the past decade, the central drama in the European Commission’s adequacy process has been whether the United States meets this standard. As previously noted, the CJEU invalidated first the Safe Harbor Framework,17 in 2015, and then the Privacy Shield Framework,18 in 2020. The DPF is the third try by the US government and the European Commission to address the CJEU’s fundamental rights concerns. Last year, the European Commission issued yet another adequacy decision that found the DPF adequate.19 The EU understandably has focused its energies on the United States, since vast amounts of Europeans’ personal data travels to cloud service providers’ data centers in the United States and, as Snowden revealed, offered an inviting target for the NSA.

Separately, the European Commission has gradually expanded the range of other countries benefiting from adequacy findings, conferring this status on Japan,20 Korea,21 and the United Kingdom.22 However, the 2019 adequacy decision for the UK continues to be criticized in Brussels. On April 22, the Committee on Civil Liberties, Justice, and Home Affairs (LIBE) of the European Parliament wrote to the UK House of Lords complaining about UK national security bulk data collection practices and the prospect of onward transfer of data from UK territory to jurisdictions not deemed adequate by the EU.23 Next year, the European Commission will formally review the UK’s adequacy status.

List of countries with European Commission Adequacy Decisions

This past January, the European Commission renewed the adequacy decisions for eleven jurisdictions which had long enjoyed them, including, notably, Israel.24 On April 22, a coalition of civil society groups published an open letter to the European Commission questioning the renewal of Israel’s adequacy decision.25 The letter expressed doubts about the rule of law in Israel itself, the specific activities of Israeli intelligence agencies in Gaza during the current hostilities there, and the surveillance powers exercised by those agencies more generally.

Also delicate is the continuing flow of personal data from the European Union to Russia and China. Although neither country has been—or is likely to be—accorded adequacy status, data nonetheless can continue to flow to their territories, as to other third countries, if accompanied by contractual data protection safeguards. The CJEU established in its Schrems jurisprudence that such standard contractual clauses (SCCs) must uphold the same fundamental rights standards as an adequacy decision. The European Data Protection Board (EDPB) subsequently issued detailed guidance on the essential guarantees against national security surveillance that must be in place in order for personal data to be sent to a nonadequate jurisdiction.26

In 2021, the EDPB received an outside expert report27 on several foreign governments’ data access regimes. Its findings were clear. “Chinese law legitimises broad and unrestricted access to personal data by the government,” it concluded. Similarly, with respect to Russia, “The right to privacy is strongly limited when interests of national security are at stake.” The board did not take any further steps to follow up on the report, however.

Shortly after Russia invaded Ukraine, Russia was excluded from the Council of Europe and ceased to be a party to that body’s European Convention on Human Rights.28 The European Data Protection Board issued a statement confirming that data transfers to Russia pursuant to standard contract clauses remained possible, but stressed that safeguards to guard against Russian law enforcement or national security access to data were vital.29

Over two thousand multinational companies continue to do business in Russia, despite the Ukraine war, although a smaller number have shut down, according to a Kyiv academic research institute.30 Data flows between Europe and Russia thus remain substantial, if less than previously. Companies engaged in commerce in Russia also are subject to requirements that data on Russian persons be localized in that country.31 Nonetheless, data flows from Europe to Russia are not subject to categorical exclusions, unlike the new US approach.

The sole reported case of a European data protection authority questioning data flows to Russia involves Yango, a taxi-booking mobile app developed by Yandex, a Russian internet search and information technology company. Yango’s European services are based in the Netherlands and are available in other countries including Finland and Norway. In August 2023, Finland’s data protection authority (DPA) issued an interim decision to suspend use of Yango in its territory because Russia had just adopted a decree giving its state security service (FSB) unrestricted access to commercial taxi databases.32

The interim suspension decision was short-lived. A month later, the Finnish authority, acting in concert with Norwegian and Dutch counterparts, lifted it, on the basis of a clarification that the Russian decree in fact did not apply to use of the Yango app in Finland.33 The Finnish authority further announced that the Dutch authority, in coordination with it and Norway, would issue a final decision in the matter. The Dutch investigation reportedly remains open, but it does not appear to be a high priority matter.

The day after lifting the Yango suspension, the Finnish data protection authority rushed out yet another press release advising that its decision “does not address the legality of data transfers to Russia,” or “mean that Yango data transfers to Russia would be in compliance with the GDPR or that Russia has an adequate level of data protection.”34

One can interpret this final Finnish statement as at least indirectly acknowledging that continued commercial data transfers from an EU jurisdiction to Russia may raise rule of law questions bigger than a single decree allowing its primary security agency, known as the FSB, to access certain taxi databases. Otherwise, the Finnish decision could be criticized for ignoring the forest for the birch trees.

Equally striking is the limited extent of DPA attention to data transfers between EU countries and China. China maintains an extensive national security surveillance regime, and lately has implemented a series of legal measures that can limit outbound data transfers for national security reasons.35 In 2023, the Irish Data Protection Commissioner36 imposed a substantial fine on TikTok for violating the GDPR with respect to children’s privacy, following a decision by the EDPB.37 This inquiry did not examine the question of whether Chinese government surveillance authorities had access to European users’ data, however.

Personal data actively flows between Europe and China in the commercial context, pursuant to SCCs. China reportedly may issue additional guidance to companies on how to respond to requests for data from foreign law enforcement authorities. To date there is no public evidence of European DPAs questioning companies about their safeguard measures for transfers to China.

Indeed, signs recently have emerged from China of greater openness to transfers abroad of data generated in the automotive sector, including from connected cars. Data from connected cars is a mix of nonpersonal and personal data. China recently approved Tesla’s data security safeguards, enabling the company’s previously localized data to leave the country.38 In addition, the government of Germany is trying to ease the passage of data to and from China on behalf of German carmakers. On April 16, several German government ministers, part of a delegation visiting China led by Chancellor Olaf Scholz, issued a joint political statement with Chinese counterparts promising “concrete progress on the topic of reciprocal data transfer—and this in respect of national and EU data law,” with data from connected cars and automated driving in mind.39

Conclusions

The United States and the European Union are, in some respects, converging in their international data transfer laws and policies. In Washington, free data transfers are no longer sacrosanct. In Europe, they never have been. Viewed from Brussels, it appears that the United States is, finally, joining the EU by creating a formal international data transfers regime—albeit constructed in a piecemeal manner and focused on particular countries, rather than through a comprehensive and general data privacy law.

Yet the rationales for limiting data transfers vary considerably from one side of the Atlantic to the other. Washington now focuses on the national security dangers to US citizens and to the US government from certain categories of personal data moving to the territories of “foreign adversaries.” Brussels instead applies more abstract criteria relating to foreign governments’ commitment to the rule of law, human rights, and especially their access to personal data.

A second important difference is that the United States has effectively created a blacklist of countries to which certain categories of data should not flow, whereas the EU’s adequacy process serves as a means of “white listing” countries with comparable data protection frameworks to its own. Concretely, this structural difference means that the United States concentrates on prohibiting certain data transfers to China and Russia, while the EU institutionally has withheld judgment about transfers to those authoritarian jurisdictions. Critics of the EU’s adequacy practice instead have tended to concentrate on the perceived risks of data transfers to liberal democracies with active foreign surveillance establishments: Israel, the United Kingdom, and the United States.

The transatlantic—as well as global—geopolitics of data transfers are in flux. The sudden US shift to viewing certain transfers through a national security lens is unlikely to be strictly mirrored in Europe. In light of the emerging differences in approach, the United States and European governments should consider incorporating the topic of international data transfers into existing political-level conversations. Although data transfer topics have thus far not figured into the formal work of the EU-US Trade and Technology Council (TTC),40 which has met six times since 2022 including most recently in April,41 there is no evident reason why that could not change. If the TTC resumes activity after the US elections, it could become a useful bilateral forum for candid discussion of perceived national security risks in data flows.

Utilizing a broader grouping, such as the data protection and privacy authorities of the Group of Seven (G7), which as a group has been increasingly active in the last few years,42 also could be considered. The deliberations of this G7 group already have touched generally on the matter of government access, and they could readily expand to how its democratic members assess risks from authoritarians in particular. Eventually, such discussions could be expanded beyond the G7 frame into broader multilateral fora. The Organisation of Economic Co-operation and Development (OECD) Declaration on Government Access43 is a good building block.

The days when international data transfers were a topic safely left to privacy lawyers are long gone. It’s time for Washington and Brussels to acknowledge that the geopolitics of data flows has moved from the esoteric to the mainstream, and to grapple with the consequences.

About the author

Related content

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Kenneth Propp, “Transatlantic Digital Trade Protections: From TTIP to ‘Policy Suicide?,’” Lawfare, February 16, 2024, https://www.lawfaremedia.org/article/transatlantic-digital-trade-protections-from-ttip-to-policy-suicide.
2    U.S.-EU Safe Harbor Framework: Guide to Self-Certification, US Department of Commerce, March 2009, https://legacy.trade.gov/publications/pdfs/safeharbor-selfcert2009.pdf.
3    “Chapter 19: Digital Trade,” US-Mexico-Canada Free Trade Agreement, Office of the United States Trade Representative, https://ustr.gov/sites/default/files/files/agreements/FTA/USMCA/Text/19-Digital-Trade.pdf.
4    “Agreement between the United States of America and Japan Concerning Digital Trade,” Office of the United States Trade Representative, https://ustr.gov/sites/default/files/files/agreements/japan/Agreement_between_the_United_States_and_Japan_concerning_Digital_Trade.pdf.
5    Schrems v. Data Protection Commissioner, CASE C-362/14 (Court of Justice of the EU 2015), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:62014CJ0362.
6    “President Biden Signs Executive Order to Implement the European Union-U.S. Data Privacy Framework,” Fact Sheet, White House Briefing Room, October 7, 2022, https://www.whitehouse.gov/briefing-room/statements-releases/2022/10/07/fact-sheet-president-biden-signs-executive-order-to-implement-the-european-union-u-s-data-privacy-framework/.
7    European Commission, “Commission Implementing Decision of 10.7.2023 Pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the Adequate Level of Protection of Personal Data under the EU-US Data Privacy Framework,” July 10, 2023, https://commission.europa.eu/system/files/2023-07/Adequacy%20decision%20EU-US%20Data%20Privacy%20Framework_en.pdf.
9    Department of Justice, “National Security Division; Provisions Regarding Access to Americans’ Bulk Sensitive Personal Data and Government-Related Data by Countries of Concern,” Proposed Rule, 28 C.F.R. 202 (2024), https://www.federalregister.gov/d/2024-04594.
10    “President Biden Issues Executive Order to Protect Americans’ Sensitive Personal Data,” Fact Sheet, White House Briefing Room, February 28, 2024, https://www.whitehouse.gov/briefing-room/statements-releases/2024/02/28/fact-sheet-president-biden-issues-sweeping-executive-order-to-protect-americans-sensitive-personal-data/.
11    Peter Swire and Samm Sacks, “Limiting Data Broker Sales in the Name of U.S. National Security: Questions on Substance and Messaging,” Lawfare, February 28, 2024, https://www.lawfaremedia.org/article/limiting-data-broker-sales-in-the-name-of-u.s.-national-security-questions-on-substance-and-messaging.
12    “Protecting Americans from Foreign Adversary Controlled Applications Act,” in emergency supplemental appropriations, Pub. L. No. 118–50, 118th Cong. (2024), https://www.congress.gov/bill/118th-congress/house-bill/7520/text.
13    Cristiano Lima-Strong, “Biden Signs Bill That Could Ban TikTok, a Strike Years in the Making,” Washington Post, April 24, 2024, https://www.washingtonpost.com/technology/2024/04/23/tiktok-ban-senate-vote-sale-biden/.
14    “Petition for Review of Constitutionality of the Protecting Americans from Foreign Adversary Controlled Applications Act,” TikTok Inc. and ByteDance Ltd. v. Merrick B. Garland (US Court of Appeals for the District of Columbia Cir. 2024), https://sf16-va.tiktokcdn.com/obj/eden-va2/hkluhazhjeh7jr/AS%20FILED%20TikTok%20Inc.%20and%20ByteDance%20Ltd.%20Petition%20for%20Review%20of%20H.R.%20815%20(2024.05.07)%20(Petition).pdf?x-resource-account=public.
15    Department of Commerce, “Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities,” Proposed Rule, 15 C.F.R. Part 7 (2024), https://www.govinfo.gov/content/pkg/FR-2024-01-29/pdf/2024-01580.pdf.
16    “Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation),” 2016/679, Official Journal of the European Union (2016), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679.
17    Schrems v. Data Protection Commissioner.
18    Data Protection Commissioner v. Facebook Ireland & Schrems, CASE C-311/18 (Court of Justice of the EU 2020), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:62018CJ0311.
19    The Commission’s decision has since been challenged before the CJEU. See Latombe v. Commission, No. Case T-553/23 (Court of Justice of the EU 2023), https://curia.europa.eu/juris/document/document.jsf?text=&docid=279601&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=1498741.
20    European Commission, “European Commission Adopts Adequacy Decision on Japan, Creating the World’s Largest Area of Safe Data Flows,” Press Release, January 23, 2019, https://commission.europa.eu/document/download/c2689793-a827-4735-bc8d-15b9fd88e444_en?filename=adequacy-japan-factsheet_en_2019.pdf.
21    “Commission Implementing Decision (EU) 2022/254 of 17 December 2021 Pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the Adequate Protection of Personal Data by the Republic of Korea under the Personal Information Protection Act,” Official Journal of the European Union, December 17, 2021, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022D0254.
22    “Commission Implementing Decision (EU) 2021/1772 of 28 June 2021 Pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the Adequate Protection of Personal Data by the United Kingdom,” Official Journal of the European Union, June 28, 2021, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32021D1772.
23    European Parliament Justice Committee, Correspondence to Rt. Hon. Lord Peter Ricketts regarding Inquiry into Data Adequacy, April 22, 2024, https://content.mlex.com/Attachments/2024-04-25_L75PCWU60ZLVILJ5%2FLIBE%20letter%20-%20published%20EAC.pdf.
24    “Report from the Commission to the European Parliament and the Council on the First Review of the Functioning of the Adequacy Decisions Adopted Pursuant to Article 25(6) of Directive 95/46/EC,” European Commission, January 15, 2024, https://commission.europa.eu/document/download/f62d70a4-39e3-4372-9d49-e59dc0fda3df_en?filename=JUST_template_comingsoon_Report%20on%20the%20first%20review%20of%20the%20functioning.pdf.
25    European Digital Rights et al., Letter to Vice-President of the European Commission Věra Jourová Regarding Concerns following  Reconfirmation of Israel’s Adequacy Status, April 22, 2024, https://edri.org/wp-content/uploads/2024/04/Concerns-Regarding-European-Commissions-Reconfirmation-of-Israels-Adequacy-Status-in-the-Recent-Review-of-Adequacy-Decisions-updated-open-letter-April-2024.pdf.
26    Milieu Consulting and Centre for IT and IP Law of KU Leuven, “Recommendations 02/2020 on the European Essential Guarantees for Surveillance Measures,” Prepared for European Data Protection Board (EDPB), November 10, 2020, https://www.edpb.europa.eu/sites/default/files/files/file1/edpb_recommendations_202002_europeanessentialguaranteessurveillance_en.pdf.
27    Milieu Consulting and Centre for IT and IP Law of KU Leuven, “Government Access to Data in Third Countries,” EDPB, EDPS/2019/02-13, November 2021, https://www.edpb.europa.eu/system/files/2022-01/legalstudy_on_government_access_0.pdf.
28    European Convention on Human Rights, November 4, 1950, https://www.echr.coe.int/documents/d/echr/Convention_ENG.
29    Statement 02/2022 on Data Transfers to the Russian Federation, European Data Protection Board, July 12, 2022,
https://www.edpb.europa.eu/system/files/2022-07/edpb_statement_20220712_transferstorussia_en.pdf.
30    “Stop Doing Business with Russia,” KSE Institute, May 20, 2024, #LeaveRussia: The List of Companies that Stopped or Still Working in Russia (leave-russia.org).
31    “Russian Data Localization Law: Now with Monetary Penalties,” Norton Rose Fulbright Data Protection Report, December 20, 2019, https://www.dataprotectionreport.com/2019/12/russian-data-localization-law-now-with-monetary-penalties/.
32    “Finnish DPA Bans Yango Taxi Service Transfers of Personal Data from Finland to Russia Temporarily,” Office of the Data Protection Ombudsman, August 8, 2023, https://tietosuoja.fi/en/-/finnish-dpa-bans-yango-taxi-service-transfers-of-personal-data-from-finland-to-russia-temporarily.
33    “European Data Protection Authorities Continue to Cooperate on the Supervision of Yango Taxi Service’s Data Transfers–Yango Is Allowed to Continue Operating in Finland until Further Notice,” Office of the Data Protection Ombudsman, September 26, 2023, https://tietosuoja.fi/en/-/european-data-protection-authorities-continue-to-cooperate-on-the-supervision-of-yango-taxi-service-s-data-transfers-yango-is-allowed-to-continue-operating-in-finland-until-further-notice.
34    “The Data Protection Ombudsman’s Decision Does Not Address the Legality of Data Transfers to Russia–the Matter Remains under Investigation,” Office of the Data Protection Ombudsman, September 27, 2023, https://tietosuoja.fi/en/-/the-data-protection-ombudsman-s-decision-does-not-address-the-legality-of-data-transfers-to-russia-the-matter-remains-under-investigation#:~:text=The%20Office%20of%20the%20Data%20Protection%20Ombudsman%27s%20decision,Protection%20Ombudsman%20in%20October%2C%20was%20an%20interim%20decision.
35    Samm Sacks, Yan Lou, and Graham Webster, “Mapping U.S.-China Data De-Risking,” Freeman Spogli Institute for International Studies, Stanford University, February 29, 2024), https://digichina.stanford.edu/wp-content/uploads/2024/03/20240228-dataderisklayout.pdf.
36    “Irish Data Protection Commission Announces €345 Million Fine of TikTok,” Office of the Irish Data Protection Commissioner, September 15, 2023, https://www.dataprotection.ie/en/news-media/press-releases/DPC-announces-345-million-euro-fine-of-TikTok.
37    “Following EDPB Decision, TikTok Ordered to Eliminate Unfair Design Practices Concerning Children,” European Data Protection Board, September 15, 2023, https://www.edpb.europa.eu/news/news/2023/following-edpb-decision-tiktok-ordered-eliminate-unfair-design-practices-concerning_en.
38    “Tesla Reaches Deals in China on Self-Driving Cars,” New York Times, April 29, 2024, https://www.nytimes.com/2024/04/29/business/elon-musk-tesla-china-full-self-driving.html.
39    “Memorandum of Understanding with China,” German Federal Ministry of Digital and Transport, April 16, 2024,
https://bmdv.bund.de/SharedDocs/DE/Pressemitteilungen/2024/021-wissing-deutschland-china-absichtserklaerung-automatisiertes-und-vernetztes-fahren.html.
40    Frances Burwell and Andrea Rodríguez, “The US-EU Trade and Technology Council: Assessing the Record on Data and Technology Issues,” Atlantic Council, April 20, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/us-eu-ttc-record-on-data-technology-issues/.
41    “U.S.-EU Trade and Technology Council (TTC),” US State Department, https://www.state.gov/u-s-eu-trade-and-technology-council-ttc/.
42    “G7 DPAs’ Action Plan,” German Office of the Federal Commissioner for Data Protection and Freedom of Information (BfDI), June 22, 2023, https://www.bfdi.bund.de/SharedDocs/Downloads/EN/G7/2023-Action-Plan.pdf?__blob=publicationFile&v=1.
43    OECD, Declaration on Government Access to Personal Data Held by Private Sector Entities, December 14, 2022, OECD/LEGAL/0487, https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0487.

The post Who’s a national security risk? The changing transatlantic geopolitics of data transfers appeared first on Atlantic Council.

]]>
Ukraine faces long-term mental health challenges among veteran community https://www.atlanticcouncil.org/blogs/ukrainealert/ukraine-faces-long-term-mental-health-challenges-among-veteran-community/ Thu, 23 May 2024 20:11:53 +0000 https://www.atlanticcouncil.org/?p=767775 Far away from the front lines of the country’s ongoing war with Russia, growing numbers of Ukrainian veterans are facing up to the psychological aftermath of their military service, writes Claire Szewczyk.

The post Ukraine faces long-term mental health challenges among veteran community appeared first on Atlantic Council.

]]>
Far away from the front lines of the country’s ongoing war with Russia, growing numbers of Ukrainian veterans are facing up to the psychological aftermath of their military service. These mental health challenges include post-traumatic stress disorder (PTSD), depression, and anxiety. Given the sheer numbers involved, there are serious concerns over Ukraine’s ability to address this issue effectively.

Over the past decade, the number of Ukrainian military veterans has expanded dramatically. Prior to the onset of Russia’s full-scale invasion in 2022, approximately half a million Ukrainians had served in the military campaigns underway in the east of the country since 2014. Over the past two years, this figure has mushroomed. Ukraine’s Ministry of Veteran Affairs has estimated that up to five million Ukrainians may be eligible for veteran status by the end of the war.

In 2024, Ukraine allocated approximately $350 million to support veterans and their families through the Ukrainian Veterans Fund. Nevertheless, there has been considerable criticism over the use of this funding. In a survey of Ukrainian army veterans conducted earlier this year, many said they believed veterans were not having their post-service needs met and required better access to support.

Current Ukrainian legislation offers benefits to veterans such as housing provisions. A range of support is also available for those with disabilities incurred during wartime service and for family members of service personnel. However, critics say there is significant confusion over the availability of support, and complain of inconsistencies along with a frequent lack of funding. In practice, many veterans say they are unable to access the care they need.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The current healthcare struggles of Ukrainian veterans resonate with the US veteran community, which continues to face similar struggles with post-service mental health issues. Like their Ukrainian counterparts, large numbers of American veterans deal with PTSD, depression, and anxiety.

According to a recent survey, nearly one in four American veterans are diagnosed with at least one mental health disorder following military service. This statistic illustrates the widespread nature of mental health concerns among veterans everywhere, and gives an idea of the sheer scale of the challenge facing the Ukrainian authorities.

Ukraine may be able to learn from US experience in the provision of support for military personnel. US veterans can call upon a more structured support system under the Department of Veteran Affairs. However, this approach is not always effective, with veterans often encountering long wait times, bureaucratic hurdles, and a shortage of healthcare providers adequately trained in military cultural competence. This last point is crucial; research has highlighted that more than three-quarters of veterans find it extremely important to receive care from providers who they feel understand them and can treat them appropriately.

The challenges Ukraine faces in providing the necessary support for the country’s veteran community echo the issues encountered in the United States and elsewhere. Ukraine currently struggles with underfunded and understaffed mental health services. These shortages mean that even when veterans take the appropriate steps to seek help, the necessary resources may not be available or might come too late.

Another issue is lack of financial support. While healthcare is a major concern for Ukrainian veterans, access to financial resources is also critical for general well-being. When surveyed earlier this year, more than half of veterans indicated that they struggled to remain financially secure.

A further significant barrier to effective mental health treatment in Ukraine is the lack of providers with a good understanding of military culture. Ukrainian veterans often comment that their experiences are misunderstood by the medical professionals who are treating them, leading to misdiagnosis and ineffective treatments.

The stigma associated with mental health issues in Ukraine is an additional issue, particularly due to the emphasis on “toughness” and “strength” within military communities. This can lead to veterans failing to acknowledge their struggles and refusing to seek the help they need and deserve.

Addressing these challenges requires a multifaceted approach that includes increased funding for mental health services, enhanced training in military culture for healthcare providers, and an active approach to challenging the narrative around mental health, especially in relation to Ukraine’s military and veteran communities. The task of addressing the stigma attached to mental health is something the wider community can participate in, as Ukrainians seek to create a more compassionate environment for the country’s defenders.

Claire Szewczyk is a digital content coordinator for Hill & Ponton. She formerly worked for the Department of Veterans Affairs.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine faces long-term mental health challenges among veteran community appeared first on Atlantic Council.

]]>
Congress should save the Sentinel ICBM—its true value is more than simply its cost https://www.atlanticcouncil.org/blogs/new-atlanticist/congress-should-save-the-sentinel-icbm-its-true-value-is-more-than-simply-its-cost/ Tue, 21 May 2024 14:20:26 +0000 https://www.atlanticcouncil.org/?p=763192 The value of the new intercontinental ballistic missile program should be measured over its full lifetime and not just by its current price tag.

The post Congress should save the Sentinel ICBM—its true value is more than simply its cost appeared first on Atlantic Council.

]]>
In January, the US Air Force notified Congress that the new Sentinel intercontinental ballistic missile (ICBM) was costing more than expected to build. At 37 percent, the projected cost overruns were considered “critical” and triggered the Nunn-McCurdy act, a law designed to curtail cost growth in major military procurements. Now, as both supporters and critics of the program gear up for the required congressional testimony this summer, it’s important to understand not only what the program costs, but also its true value.

A thorough review reveals that some of the cost estimate increases seem understandable given expensive but worthwhile new requirements. These include replacing thousands of miles of communication cables, improving security, and rebuilding hundreds of silos. Understood in full context, Congress should insist on continuing this vital program—indeed, most Nunn-McCurdy-breaching programs are continued. At the same time, supporters in Congress and the Pentagon need a better argument regarding costs and value propositions. They need to make it clear, especially in the event that costs rise further still, that the value of program should be measured in decades, over its full lifetime, and not simply by its current price tag.

What is a Nunn-McCurdy Review?

Effectively fighting to retain Sentinel requires first understanding when a Nunn-McCurdy Review (NMR) becomes necessary. There are two kinds of cost that trip an NMR: either a sharp rise in the estimated program cost (research and development, construction costs, and procurement of each weapon) or a rise within single unit cost (that is, the cost of just one bomb, aircraft, or satellite). Both numbers are looked at on a per-unit basis to make it easier to weigh the cost of a particular capability separated from order quantity. Large acquisition programs take years to complete and so undergo checks at key milestones. A program’s cost estimate is updated with each milestone and so called its ‘current’ estimate, but the original can only be updated during an NMR. Finally, there are two types of review under the NMR based on the degree of cost overrun. The first is a “significant” breach, which entails a cost increase of either 15 percent above the current projection or 30 percent over the original, while a “critical” breach would be 25 percent or 50 percent respectively. A critical review is performed under the presumption of program cancellation—and such is the case for the Sentinel program now. Therefore, continuing the program will require a root-cause analysis, program restructuring, and the personal sign-off of the US secretary of defense. So, in total, there are eight ways to trigger an NMR, as indicated below.

The Nunn-McCurdy Act passed more than four decades ago to curtail large expenditures for significant defense projects, such as the Patriot missile defense system. From 1997 through 2015, there were ninety-four NMR breaches in total, with nearly half being major programs. Additionally, almost all of these large projects breached the rule twice before completing initial purchases.

Why is Sentinel so expensive?

It is no surprise that the Sentinel program—which will rebuild more than six hundred silos and other facilities, including creating hundreds of new cutting-edge modular missiles, all while consolidating and updating several complicated command-and-control systems—is expensive. For too many years, the Department of Defense waited to carry out missile, communications, silo, and other updates, and all those areas must now be updated all at once. This necessitates a much larger project with more variables, making it even harder to predict expenses.

With the Sentinel program, the Air Force is purchasing much more than just replacements of four-hundred operational Minuteman missiles. The program will also refurbish or rebuild more than six hundred facilities and purchase hundreds of maintenance and other support vehicles, as well as more than one hundred missiles for ongoing testing.

So what, then, explains the unanticipated costs? Pushing new technology too fast often leads to unexpected costs. But seventeen of Sentinel’s eighteen major subsystems are out of the danger zone of being considered “immature,” a period in which cost overruns often originate. Sentinel’s challenges have a blend of sources, including changed requirements, lingering aftereffects of economic realities driven by the COVID-19 pandemic, and most importantly, sheer scale.

The Air Force has never attempted an infrastructure build at this scale and the initial plan was overly optimistic. That initial rosy cost estimate was reconciled with the broader Pentagon’s cost estimate, which was around $95 billion. But the initial approved budget still supposed it could avoid rewiring and major rebuilds. This assumption might have held, but by early summer 2023, the scope of the requirements for the program was changed, in part, to deal with new threats. Though costly, the altered requirements improve Sentinel by leveling up to modern communications capabilities and by adding “security enhancement of both missile hardware and facilities.” A new fiber-based underground communications structure and sixty-two towers will add redundancy while requiring fewer people to operate, given the planned halving of launch control centers. The personnel savings may also impact security forces as well, with reduced on-site maintenance activity and lower false-alarm response rates. These design changes ensure US preeminence in nuclear weapon safety and security while suggesting relief options for recruitment challenges.

Another reason for the increase in the Sentinel program’s cost has been economy-wide increases in costs of construction above background inflation rates. Difficulties in finding and retaining engineers, including getting them timely security clearances, were also cited for increasing cost projections. Manufacturing and construction have been disproportionately impacted by supply-chain interruptions and labor scarcity. In 2019, when the most recent Sentinel cost estimates were being developed, no one was predicting the enduring economic impact of a pandemic.

But the simplest and biggest factor is the sheer size and scope of the project, and with that comes added uncertainty. This is why even post-NMR, the cost estimate has the potential to rise again.

Anyone who has renovated a house or even just watched a few HGTV episodes will know that, even if a building has “good bones,” surprises happen. The fine print on home renovation contracts accounts for the possibility that, after construction begins, new problems will be discovered. Half a century ago, Minuteman siloes in Montana were “rushed to completion,” with workers pouring concrete amid the Cuban missile crisis. These Cold War–era silos remain in some of the harshest environments that exist within the contiguous United States. Sentinel’s NMR should include comprehensive assessments of silo foundations to confirm that only the planned partial silo rebuilds is needed. Likewise, renovation can often be more costly than a new build, so there is merit in looking at so-called “green pasture” build options.

A better value proposition

Sentinel is a large and complex program, but it is worth more—and is a better value—than most realize. The Sentinel missile is slated for up to a sixty-year lifespan, now with a $131.5 billion projected cost for four hundred operational missiles. This amounts to an annualized cost of $2.2 billion for the fleet and facilities, or about $2.7 million per year per missile. For comparison, the F-35A has a flyaway cost of $82.5 million and a fifty-year planned lifespan, giving a per-unit-design-year cost of just under $1.6 million. Taking into account the discrepant availability rates for these two systems, the design year costs of putting each on alert twenty-four hours a day nears parity. This designed lifetime on-mission cost comparison is admittedly incomplete and inexact. But it offers a better way to compare costs across two headline military systems, both of which have faced an NMR.

An upside of Sentinel’s longevity by design is lowered maintenance. Over the past five years, Air Force Global Strike Command logged 2.5 million maintenance hours to keep Minuteman operational, a 30 percent increase from the previous five years. In March of this year, Lt. Col. Anthony Santino, the head of ICBM flight testing, said that he expects a further 25 percent increase over the rest of this decade. That much maintenance translates to needing at least sixty more full-time mechanics at a time when it’s getting harder to meet basic recruiting goals. Sentinel will allow personnel reductions and retain that savings for at least half a century. The nature of the nuclear mission does not lend itself to just-in-time production, or maintenance, to make up for weapons that fall offline during a crisis. Sentinel will invert the manpower needs curve while improving security, reliability, effectiveness, and upgradability of the ICBM force.

Seeing how the Sentinel program adds unique value to national defense requires thinking one step past the eight ways to trip an NMR. Using the annualized design-life cost metric is perhaps one way to show that Sentinel is no more expensive than other recent major military purchases. This framing helps show the sensibility in sustaining the cheapest means of securing strategic deterrence for future generations.


Lieutenant Colonel James McCue is a senior US Air Force SkillBridge fellow with the Atlantic Council’s Scowcroft Center for Strategy and Security in the Forward Defense program.

Note: The Atlantic Council’s Scowcroft Center for Strategy and Security conducts work on nuclear and strategic forces that is sponsored by donors including Los Alamos National Laboratory, Northrop Grumman Corporation (which has the sole contract from the US Air Force to engineer and manufacture Sentinel ICBMs), the Norwegian Ministry of Defense, the Swedish Ministry of Foreign Affairs, the United States Department of Defense, the United States Department of Energy, the United States Department of State, as well as general support to the Scowcroft Center. This article did not involve any of these donors and reflects only the author’s views. The positions expressed do not reflect the official position of the United States Air Force or the Department of Defense.

The post Congress should save the Sentinel ICBM—its true value is more than simply its cost appeared first on Atlantic Council.

]]>
Polymeropoulos on a Cipher Brief podcast about Havana Syndrome https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-cipher-brief-havana-syndrome-podcast/ Mon, 20 May 2024 15:50:30 +0000 https://www.atlanticcouncil.org/?p=767552 On May 20, Forward Defense nonresident senior fellow Marc Polymeropoulos spoke on a Cipher Brief podcast titled “Is Russia Attacking U.S. Government Employees Using High-Energy Weapons?” about Havana Syndrome.

The post Polymeropoulos on a Cipher Brief podcast about Havana Syndrome appeared first on Atlantic Council.

]]>

On May 20, Forward Defense nonresident senior fellow Marc Polymeropoulos spoke on a Cipher Brief podcast titled “Is Russia Attacking U.S. Government Employees Using High-Energy Weapons?” about Havana Syndrome.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos on a Cipher Brief podcast about Havana Syndrome appeared first on Atlantic Council.

]]>
Vinograd for CBS News about the helicopter crash that killed the Iranian President and Foreign Minister https://www.atlanticcouncil.org/insight-impact/in-the-news/vinograd-cbshelicopter-crash-iranian-president/ Mon, 20 May 2024 15:02:17 +0000 https://www.atlanticcouncil.org/?p=767516 On May 20, Forward Defense Nonresident Senior Fellow Samantha Vinograd spoke on CBS about the helicopter crash that killed Iranian president Ebrahim Raisi and his foreign minister and the potential ramifications for global and regional security.

The post Vinograd for CBS News about the helicopter crash that killed the Iranian President and Foreign Minister appeared first on Atlantic Council.

]]>

On May 20, Forward Defense Nonresident Senior Fellow Samantha Vinograd spoke on CBS about the helicopter crash that killed Iranian president Ebrahim Raisi and his foreign minister and the potential ramifications for global and regional security.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Vinograd for CBS News about the helicopter crash that killed the Iranian President and Foreign Minister appeared first on Atlantic Council.

]]>
Full transcript: The 2024 Distinguished Leadership Awards recognize skillful leaders navigating a world of crises https://www.atlanticcouncil.org/news/transcripts/full-transcript-the-2024-distinguished-leadership-awards-recognize-skillful-leaders-navigating-a-world-of-crises/ Thu, 09 May 2024 02:57:06 +0000 https://www.atlanticcouncil.org/?p=763505 The Atlantic Council honored government, military, and artistic leaders who are bolstering security and advocating for the most vulnerable globally.

The post Full transcript: The 2024 Distinguished Leadership Awards recognize skillful leaders navigating a world of crises appeared first on Atlantic Council.

]]>
Gear up to watch the broadcast of the event

Event transcript

Uncorrected transcript: Check against delivery

JOHN F.W. ROGERS: I want to welcome everyone to the Atlantic Council Distinguished Leadership Awards. And it’s a pleasure to see all of you here tonight. And we gather to honor some of the world’s most impressive and influential leaders, and to highlight the Atlantic Council’s time-honored commitment to providing the intellectual, engaged global leadership necessary to meet the world’s most demanding challenges, and to ensure that self-determination, that freedom and prosperity can one day be an enduring reality across all nations.

We convene, however, at a decisive moment for the Atlantic Council and the world over. In an era of uncommon geopolitical uncertainty and unrest, as we navigate the social, economic, and political issues that define one of the most fragile, if not foreboding, moments of our time. It is vital that we are guided by people of insight, and experience, and resolve. Leaders who confront obstacles with the confidence and the steady hand that will help chart a course towards a more stable and secure world order. We are fortunate to have such individuals with us as we honor them tonight.

Moreso, the collective interest of peoples and of cultures and countries everywhere, with so much at stake, are fortunate to have our slate of honorees as their—at their posts, defending the principles of democracy and promoting a peaceful way of life [to] which all are entitled as a basic tenet of humanity—intrinsic and universal actually to all humankind. In no small way, the formidable trials we face in the world today are a reminder that the Atlantic Council raison d’être has never been more relevant or critically central to geopolitical harmony.

We must acknowledge that the work will be difficult, that the solutions are hard earned. But I say, with optimism and confidence, that we are prepared as we’ve ever been in our sixty-year history, with world-class thought leadership, tactical acumen, and operational expertise, to meet this moment with a single-minded resolve that is second to none. In doing so, working in tandem with our international partners, we are able to galvanize an influential network of global leaders and policy experts, whose own intellectual contribution and actionable strategies both complement and buttress the work of the Council. In solidarity we stand proven and ready to shape the global future together. That mission is greatly enriched by the distinguished leaders that we celebrate tonight.

An American president once observed, if your actions inspire others to dream, to learn more, to do more, and become more, you are a leader.

This year, the Atlantic Council recognizes that undeniable few who inspire us and the world to become more, to envision something better, to strive for something brighter, and safeguard those ideals that we hold dear. They represent the very best of our transatlantic partnership and serve as shining examples of the Atlantic Council’s highest aspirations.

And it’s now my privilege to add four exemplary leaders to the rolls of our past honorees who have distinguished themselves each in their own way and made an enduring if not indelible impact on the world.

Tonight we salute a high school physics teacher who became a mayor of his hometown, a leader of a national political party, and eventually reaching the highest rungs of his land, the president of Romania; an army brat who earned a degree in biology from Princeton, who speaks four languages, and who has forged a career from a combat infantryman to a supreme allied commander of Europe; a precocious student, one of the very first women ever to attend La Salle Academy, who would graduate valedictorian, become a Rhodes scholar, governor of her home state, and now the US secretary of Commerce; and an Academy Award winner, an action hero, and a reluctant Miss World contestant, an actress whose acclaimed roles include goodwill ambassador for the United Nations.

Ladies and gentlemen, these are our 2024 Distinguished Leader honorees, and I know I speak for all of us in this room when I say that we are in awe of their achievements, inspired by their character, and humbled in their presence.

Now please turn your attention to the screen, and we will begin the first of our videos honoring the president of Romania.

ANNOUNCER: To present the Distinguished International Leadership Award, please welcome Atlantic Council International Advisory Board chairman, Stephen J. Hadley.

STEPHEN J. HADLEY: Good evening. Thank you all for being here for this terrific evening program. We have a wonderful group of awardees, and I have the honor of introducing one of them to you now.

From his early days as a physics teacher in the small town of Sibiu, to serving as head of state of Romania, President Klaus Werner Iohannis has always had a vision for the future of his country. Over the course of his career, President Iohannis has led his country in bolstering judicial independence and strengthening the rule of law, increasing electoral participation, protecting the rights of minorities, and reforming Romania’s educational system. He has shown what nations of vision can achieve with a steadfast commitment to democracy, fairness, confidence, and rule of law.

Importantly, President Iohannis has always believed that there is no contradiction between a united Europe and a strong transatlantic alliance. Quite the contrary; they are mutually reinforcing.

As national security adviser to President George W. Bush, I was present in Romania’s capital city of Bucharest during the 2008 NATO Summit. I witnessed the failure of NATO to offer a membership action plan to Ukraine and Georgia, a failure that gave Russian President Vladimir Putin the belief that he could invade each of these countries without fear of a unified NATO response.

Now, with Russia’s full-scale invasion of Ukraine at their doorstep, Romanians have an enormous stake in maintaining and reinforcing European and allied unity. President Iohannis has responded by bolstering Romania and NATO’s defense of the alliance’s eastern flank, strengthening the US-Romanian strategic partnership, advocating for continued NATO and EU enlargement, and forging strategic partnerships with Japan and South Korea. Under his leadership, Romania has provided critical support to Ukraine in its fight for freedom and has been the most important route for Ukrainian grain shipments to the Global South by sea, road, and rail. As we celebrate President Iohannis tonight, let us hope that his principled leadership inspires others to face this historic moment as he has, with courage, with dedication, and above all, with vision.

And now, please join me in welcoming President Iohannis to the stage.

KLAUS WERNER IOHANNIS: Thank you very much. Good evening.

I am honored to receive this award. I accept it as a recognition of Romania’s leadership over the past twenty years as a proud NATO member, and US partner and friend.

Starting in 2001, a few years before we joined NATO, and then throughout our two decades of membership, Romania and the Romanian people have made bold, brave, and determined decisions to strengthen the democratic fabric of our society, live up to our transatlantic security commitments, and turn our country into an anchor of strategic stability, prosperity, and progress in a still troubled part of Europe.

Romania has set an example in many areas in Central and Eastern Europe from defending the eastern flank of NATO to investing in democracy, human rights, and the rule of law. These Romanian efforts have consequences that go far beyond our national borders. They, in fact, have helped strengthen Europe and the transatlantic alliance and they deserve to be recognized.

So I would like to thank Fred Kempe and the Atlantic Council board of directors for making this choice to recognize and honor Romania for these efforts. I’m also grateful to the former National Security Adviser Stephen Hadley for the introduction tonight and for the unparalleled work in helping to shape and implement President George W. Bush’s vision of a Europe whole and free where Romanians and the other Central and East European nations can embrace dignity, democracy, and prosperity. We should honor this tonight as well.

In 2011 Vice President Joe Biden was on this stage for the same award and at the time made a very powerful statement about America’s engagement in Central Europe. He said, I quote, “The time for Central Europe has come. You have shown yourselves ready for common challenges, willing to tackle them, and able to overcome them. That’s why in America we no longer think in terms of what we can do for Central Europe but, rather, in terms of what we can do together with Central Europe.”

And, indeed, our country stepped up to meet the responsibilities of being America’s eastward partners and allies. That is how the Bucharest Nine format occurred, an initiative spearheaded in 2015 by Romania and Poland that includes all eastern flank nations and provides a robust platform to coordinate our security resources within NATO.

This is how most of our countries on the eastern flank have started to make progress in raising defense budgets and upgrading our military infrastructure and equipment. That is how our countries have been empowered to act with unity and resolve and to put up a strong deterrent against the Russian expansionism while at the same time holding true to our core transatlantic democratic values.

There is no other more powerful proof of that than the way in which our countries on the eastern flank have responded to Russia’s unjustified aggression against Ukraine and to Ukraine’s vital needs to defend itself and to reject this horrible Russian attack.

As president of Romania I can tell you that Romania has truly been standing out in the first line through its efforts to help Ukraine. Over 7.5 million Ukrainians have crossed the border into Romania seeking refuge, safety, and safe passage. Almost forty thousand children are now studying in Romanian classrooms.

Millions of tons of humanitarian assistance have crossed into Ukraine through and from Romania. Romania also helped Ukraine maintain a vital economic lifeline, leveraging our unique maritime connections and facilitating the transit of almost forty million tons of grain, almost 70 percent of Ukrainian grain exports through the Romanian ports on the Danube River and the Black Sea. All these efforts continue for as long as it takes because we know that Romania plays a key role in helping Ukraine achieve victory and peace, succeed economically, and integrate into the European Union.

So my message to you tonight is, Romania took this call seriously. What can America do, together with Central Europe? We are working together to enhance our collective security, advanced freedom and economic progress, and make sure that democracy continues to deliver. It is our shared responsibility. And you can count on our ability to carry through because the United States has no better ally than Romania. I dedicate this award to all Romanians and to the partnership and friendship between Romania and the United States of America. Thank you very much.

ANNOUNCER: To present the Distinguished [International] Leadership Award, please welcome back John F.W. Rogers.

JOHN F.W. ROGERS: Ladies and gentlemen, on behalf of the Atlantic Council it’s a great privilege to recognize the honorable Gina Raimondo with a Distinguished International Leadership Award. We do so for her pioneering spirit, and her extraordinary record of achievement, for selfless service to people and causes that rise above self-interest or parochial interests, and for unflinching determination to always do what’s right to find a way forward and to see her vision through. In short, we honor Gina not for what she has accomplished but what she has accomplished for and on behalf of others.

And she does so with grace, and with understanding, with empathy, and, yes, with a relentless tenacity and a sense of purpose that make her an undeniable force of nature. And I think it was her son who best described it to me: Never stand in between an Italian woman and her objective. It’s no hyperbole to say that Gina is set apart with a rare handful who come along each generation, the most gifted and self-driven among us, be that innate or shaped by one’s experiences, with a capacity to help the rest of us not only see what the future can be, but can lead us to it. Who can show us the way.

You have all heard the expression, it is the hope that kills you. Now, usually that’s applied to my favorite sports team. But when you are on Gina’s team, it is the lack of hope that is fatal. Because she views the world through the optimistic lens of opportunity rather than dwelling on how difficult things may be, she focuses on getting things done. It’s something that I’ve had the opportunity to witness firsthand, or more aptly put, the privilege to be able to learn from, as we’ve partnered to support programs for small businesses during her tenure as Rhode Island’s governor. In a state where small enterprises employ nearly 50 percent of the private workforce, Gina made it her personal mission to create jobs and opportunities, if not a better way of life, for her constituents. From my front row seat, both her efforts and outcomes were nothing shy of awe-inspiring. But I’ve come to learn that that’s just Gina.

You know, an English poet once wrote, originality is being different from oneself, not others, which has at its essence, a message about exploring more, growing more, becoming more than who we are at the outset of life’s journey. And from her earliest years, Gina demonstrated a markable aptitude for progressive achievement. Further still, it seemed to be a rare sort of success, boldly crossing any lines of expectation. She was always improvising, innovating, pushing boundaries, even her own, showing us that being different from oneself is perhaps the most authentic way to be true to oneself, when considering the outer limits of our potential.

As an adolescent riding the public bus to school, Gina proved destined to be a trailblazer. She was among the first girls allowed to attend her high school, not an insignificant display of courage and grit for those, and all of us here, who can remember the tribulations of teenage years. She would go on to graduate as the class valedictorian, ratifying her right to be there in spades, and paving the way for girls to follow. More than that, Gina showed them what was possible, a real-world application of the adage, if you can see it, you can be it.

Continuing on to Harvard where she would graduate, here again, as the top economic student in her class, Gina found new areas for growth, if not her fair share of sprains, and bumps, and bruises by joining the women’s rugby team which she has since credited as being the good training for her career on politics. Something that I’m sure all of us can certainly understand.

She would go on to become a Rhodes Scholar and earn her doctorate at Oxford, where her thesis on single motherhood and her experiences with housing and poverty clinics inspired her passion for advocacy, and eventually, a law degree from Yale. Years later, having spent time in the private sector working for a venture capital firm before deciding to start her own investment firm, Gina recounts that it wasn’t until the prospect of local public libraries closing—the same institution that taught her immigrant grandfather to read English—that she redirected her efforts toward public service, first becoming the treasurer of her state, and four years later, the first woman governor of the state of Rhode Island.

And from her perch today as commerce secretary, Gina continues to create the conditions for good-paying jobs, thriving entrepreneurship, and a competitive business landscape. In doing so, she is roundly recognized for being innovative, pragmatic, open-minded, and most of all, collaborative. And by the way, if you ever took a college course on legislative processes in the US, you have come across a book, The Dance of Legislation, and you only need to look at the dance of the CHIPS Act as the case study of how she gets things done. All the while, she has managed to fulfill what she would describe as her most important duties, as a spouse and a mother of two. And I’m very happy that her husband is here tonight, Andy Moffit, to see her.

Let me conclude with these remarks: I think all of you may remember Robert Frost’s poem “The Road Not Taken”: “Two roads diverged into a yellow wood, and sorry [I could not travel both. And be one traveler, long I stood, and looked down [one] as [far] as I could.”

But in the end of this poem, it is all that one road is chosen. “Took [the] one less traveled by, and that has made all the difference.” Now, whether that is a satire on decision making, or a commentary on destiny, in any event, in Gina’s case her road has been few would ever be able to take, even if they wanted to, as it requires an echelon of insight, tenacity, charisma, and character. As such, by fortitude or fate, Gina Raimondo’s road has indeed been the one less taken, and that has made all the difference. Ladies and gentlemen, please welcome Secretary Raimondo.

GINA RAIMONDO: Thank you, John. I certainly feel unworthy of this award, but I think I feel even more unworthy of that introduction. A better friend you will not find then John Rogers, a man of grace, integrity, and passion. Thank you. He also knows me extremely well, so I was a little nervous when I heard he was introducing me. So I appreciate the kindness.

A huge thank you and gratitude to the Atlantic Council for this award. And more important, thank you for your work which has endured for more than sixty years to promote transatlantic cooperation and the core values that have made our world a better place. I also have to congratulate my fellow awardees. Mr. President, congratulations. Thank you for being with us. Thank you for your leadership. It’s quite humbling for me to share the stage with the honorees this evening.

I asked, why would I be chosen for this award? And I was told that it was in part because of the work I’ve done to advance US national security and the security of democracies around the world. Now, I have to be honest with you. When President Biden, or president-elect, asked me if I would serve as his commerce secretary, truth be told I wasn’t really sure what a commerce secretary did. Then you start learning about the job, and you realize you do everything from running the weather service to national fisheries, to space commerce, to export controls. So really, honestly, there’s not much you don’t do.

But it didn’t take me long to realize the absolutely vital role that the Commerce Department plays in ensuring our national security. And here’s why: Because our economic strength, our economic competitiveness is national security. And that is truer now than it has ever been, because in the twenty-first century, this technological age, the source of our strength isn’t just that we have the best, most advanced military in the world—although, of course, we do and we need to.

But the truth of the matter is that our ability to operate in the world, to lead the world, depends vitally on our economic strength. And as this institution knows well, the world is a safer place when America leads. And our ability to lead depends entirely on the strength of the US economy, its dynamism, and the speed at which we innovate. And so that’s why I’m so focused—persistent, as John would say, obsessed, as I have said—with helping US businesses to out-compete, and out-innovate, and to do that with our allies.

Because when I travel all around the globe, I often bring private sector leaders with me. And it’s America’s brands, America’s entrepreneurs, and our technical leadership that are the envy of the world. And it helps to make the US a partner of choice. But I’ll tell you, some of my most successful trips have included—have included trips where I’ve invited a top member of the US military to join me. I’ve done this several times, most recently to Costa Rica.

I had the great privilege to travel to Costa Rica with the [US Southern Command] Commander General Laura Richardson, first female four-star in the US Army. And why did we go together to Costa Rica? We went together to focus on diversifying and strengthening our semiconductor supply chains in the Western Hemisphere. This helps US companies to be more competitive, to diversify away from just one or two countries in Asia, and it enhances our national security. And as the president just said, it also allows us to show that democracy delivers. Democracy delivers jobs, investment, and opportunity.

And so whether we’re talking about enhancing supply chain resiliency with our investments in Latin America, working with our allies in Europe, expanding our commercial presence in the Indo-Pacific, it has never been truer that our national security and our economic competitiveness are interconnected and inexorably linked. If we want to secure resilient supply chains, if want a safe and prosperous future, and if we want to maintain US leadership, it all depends on the strength and dynamism of our economy and our private sector.

So tomorrow when I go back to work, or later this evening, it means we’re going to get back to work investing at home, investing in broadband, investing in manufacturing, investing in chips, investing in AI. It means we’re going to continue to work to deepen our commercial relationships with commercial partners and allies all across the world. And it means we’re going to work alongside our allies, many in this room, to fuel innovation, and to do it consistent with our shared values. And of course, we must always protect our most sensitive technology from falling into the wrong hands, those countries who don’t share our values.

So now I know what the Commerce Department secretary does. That’s what we’re focused on, the commerce secretary. And I will end by saying none of the work that I do, none of the work that the fifty thousand incredible employees that I have at the Commerce Department does would be possible without your support. With partners like the Atlantic Council, every person in this room—private sector, public sector, civil society—we have to stay committed now more than ever. So thank you to the Atlantic Council for your decades of dedication to supporting a strong international system, and thank you again for this great honor. Thank you.

ANNOUNCER: Please welcome Atlantic Council President and CEO Frederick Kempe.

FREDERICK KEMPE: So, first of all, congratulations to President Iohannis and Secretary Raimondo. What a wonderful start of the evening.

We’re about to go into the dinner break, and then after that we’ll be honoring General Cavoli and Michelle Yeoh.

But first I wanted to say something about the flags that you see here along the wall. These flags are to commemorate the seventy-fifth anniversary of NATO, history’s most successful and enduring alliance. The flags represent all thirty-two members of the alliance, with the recent addition of Finland and Sweden. So welcome, Finland and Sweden.

Right now, and in honor of the alliance and before the break, and also in recognition of General Cavoli’s award upcoming, we’re going to present you a delicious appetizer in the form of a musical tribute to honor this year’s seventy-fifth anniversary of NATO. Joining America’s Own, an incredible brass and wind ensemble, please welcome Jazz at Lincoln Center favorite, trumpeter and celebrated recording artist, Bria Skonberg.

[Dinner break]

FREDERICK KEMPE: Hello, everybody. If you could take your seats, we’re going to continue our awards.

Ladies and gentlemen—ladies and gentlemen, distinguished guests, tonight’s honorees, thank you so night—for all coming out tonight for this small birthday party for my wife, Pam. Now, I promised Pam that I would do nothing to embarrass her in front of this vast audience. As one of America’s leading deception detectors, she should have known I was lying. But happy birthday, Pam. Thanks for participating with us. By the way, it’s also the 140th birthday of Harry Truman, but I’m going to come back to that. Pam is much younger.

With apologies, Pam, and on a more serious note, as you all know by now, we are here to celebrate a birthday that’s somewhat more fundamental to the purpose of the Atlantic Council. NATO was born seventy-five years ago, just down the street from here at Mellon Auditorium on April 4, 1949. That is when the alliance founders signed the world’s most—the world’s most enduring, history’s most enduring and successful alliance into being.

As I wrote on that anniversary, President Truman and other founders had an advantage, a really significant advantage, that today’s leaders cannot replicate. All of them had experienced—all of them had experienced the horrors of World War II. All the founders of the Atlantic Council—Dean Acheson, Mary Pillsbury Lord, Henry Cabot Lodge, Lucius Clay, they had all experienced those horrors. And a great many of them also personally knew the ravages of World War I. They understood the urgency of the moment. I’m not sure we do.

That deficit of memory is our greatest peril in 2024, a time when we are facing the greatest threats to global order since the 1930s. It’s perhaps why we have, in my view, responded insufficiently to the challenges of our age, recognizing too slowly the dangers posed by Russian despot Vladimir Putin and like-minded autocrats. One cannot change the historical experience of today’s alliance leaders, nor can one change the historic experience of their electorates. Even President Biden, at age eighty-one, was only two years old when World War II ended.

The best we can do is listen to President Harry S. Truman’s words from the day of the signing of the North Atlantic Treaty, and heed its warnings. And I quote: “Twice in recent years nations have felt the sickening blow of unprovoked aggression. Our peoples, to whom our governments are responsible, demand that these things shall not happen again. We are determined that they shall not happen again,” end quote, Harry Truman.

He called the treaty, a simple document. He likened it to a homeowner’s agreement to protect the neighborhood. He said, if it had existed in 1914 or 1939, the community it brought together could have prevented the acts of aggression which led to two world wars. It is in Truman’s spirit that we come together this evening as a global neighborhood and, as I said, by coincidence, this would be his 140th birthday.

You are sitting among six hundred individuals from more than fifty countries to celebrate Distinguished Leadership and tonight’s honorees. You are senior officials, global business executives, military brass, leading journalists, civil society leaders, and more. President Iohannis, General Cavoli, Secretary Raimondo, and Michelle Yeoh, congratulations and thank you for inspiring us all with your example of principled leadership toward a better world.

President Iohannis, you don’t know this, but my relationship with your country dates back to the time of Ceaușescu, when I was working as a journalist for Newsweek and the Wall Street Journal. And anyone who’s experienced any of that can only wonder at the miracle of Romania’s free markets, free peoples, membership in the European Union, NATO. None of that was to be taken for granted. So congratulations to Romania for that.

I can tell you a lot about my time in Romania. Our relationship, the Atlantic Council’s relationship with Romania, dates back to the NATO summit of 2008, where we hosted a youth summit, supported by Dinu Patriciu, who became a member of the Atlantic Council, in partnership with the intelligence leader at that time of Romania, George Maior, who was an ambassador here, with speakers that included President George W. Bush.

I think Steve Hadley was right that the outcome of that summit was not great. But I think the Atlantic Council’s relationship with Romania started there, and that’s terrific.

It’s great to have in the audience Alex Serban, who has been one of our strongest supporters in Bucharest ever since. It’s wonderful to be working with your embassy here and Ambassador Muraru. We have our partner in the audience, Remus Pricopie. And Remus, it’s so wonderful to work with you and your university.

President Iohannis, for us this is not a one-off event. We understood the strategic importance of Romania early on. And we’ve just wondered at how you’ve built it, and we agree with you that there is no better American ally than Romania. There are a lot of good Romanian allies, so we’ll count them equal. But there is no better.

Our honoring of you this evening marks a high point in this long and strategic relationship.

General Cavoli, we’ll be turning to you soon for your award. I know you’re joined tonight by members of your family. Oh, my God, how proud you must be of General Cavoli. It’s nice to have your family here.

In the early 1960s, the Atlantic Council’s founders debated a core question: How should they define the scope of their organization’s mission? Mary Pillsbury Lord, the sole signatory of the Council’s certificate of incorporation in 1961, argued for a global approach to transatlantic concerns. And there were people who were against her. But she wanted an approach for the Atlantic Council that went far beyond the United States and Europe.

I wish she were here today to see the Atlantic Council in this room. She foresaw the challenges we would face together. The Atlantic Council’s mission is to shape the global future together with partners and allies, building from our transatlantic base, but working closely with our global partners.

We do this at a time when we confront wars in Europe and the Middle East, continued tensions regarding China, a contest for the commanding heights of technological change, and a breathtaking slate of elections around the world. More than 50 percent of humanity is voting in this year, including our own elections this November.

We act, at the Atlantic Council, in the conviction that with sufficient political will, we can not only navigate these difficulties, but emerge even stronger. We do that across sixteen dynamically collaborative programs and centers, both regional and functional in nature.

Just last year, we were involved in major convenings in Asia, the Middle East, Africa, Latin America, Europe, and, of course, the United States. We took leading roles at COP28 in Dubai and at the IMF-World Bank meetings in Marrakesh.

Mary Pillsbury Lord, I wish you were here.

Our functional centers tackle geopolitical and geoeconomic issues, energy and climate issues, security and technological issues, the connection between freedom and prosperity. Tonight I’m delighted to announce the creation of something new, something we’re calling Atlantic Council Global Technology Programs, which will help galvanize all the amazing technology-related work we’re doing across the organization, with a focus on harnessing technology for good.

Managed by Atlantic Council Vice President Graham Brookie, this will bring together our GeoTech Center, our Digital Forensic Research Lab, our Cyber Statecraft Initiative, and our Technology and Democracy Initiative. It’ll work closely with the Scowcroft Center, which remains the lead on defense-related and strategic-related technologies, and the Europe Center, which leads our work on transatlantic technological cooperation, trying to build a transatlantic digital marketplace, and the Global Energy Center, which focuses on clean energy technology.

Bolstered by programmatic innovations like this, the Atlantic Council will move this fall—and I hope you’ll all come there—into a new global headquarters at 1400 L, just two blocks from our current office. It’s a gorgeous space. It will be a transformative move for the Atlantic Council. You will be in great company with members of our board and international advisory board leadership, who have also contributed and named high-profile spaces in the building. And on that score, let me thank Adrienne Arsht, John Rogers, and Phillipe Amon for stepping up first. I encourage anyone interested in learning more about our new global headquarters to speak to me or anyone else at the Atlantic Council.

These two announcements, the creation of the Atlantic Council Global Technology Program and the opening of our new global headquarters, are just two examples of our continued story of growth and innovation, a story so many of you in this audience helped write. Thanks to you, the Atlantic Council has become a remarkable force multiplier, and for our transatlantic and global partners in our quest to navigate these difficult times, hugely difficult times, and shape a freer and more prosperous and secure future.

And in that spirit, we now want to thank many of you who are here this evening as co-chairs of tonight’s distinguished leadership awards dinner. I’d ask you to turn your attention to the screens as we salute those individuals who have made this possible tonight. And I join my finance chair in George Lund, in thanking you so much for this. Please hold your applause so that everyone can hear the names and companies who have co-chaired this evening.

ANNOUNCER: And now, please join us in saluting the co-chairs of the 2024 Atlantic Council Distinguished Leadership Awards. We thank all of tonight’s sponsors for their generous support for this evening’s program, and for the Atlantic Council’s ongoing work to shape the global future together.

Adrienne Arsht. Sarah Beshar. John F.W. Rogers. RTX, represented by Greg Hayes. Airbus, represented by C. Jeffrey Knittel. Alpha Ring International, represented by Peter Liu. Robert J. Abernethy. Bank of America, represented by Larry Di Rita. Blackstone Charitable Foundation, represented by Stephen A. Schwarzman. Ahmed Charai. Chevron Corporation, represented by Albert J. Williams. Edelman, represented by Richard Edelman. E-INFRA Group, represented by Teofil Muresan. FedEx Corporation, represented by Gina F. Adams. Georgetown Entertainment Group, represented by Franco Nuschese. Google, represented by Karan Bhatia. Kirkland & Ellis, represented by Ivan Schlager. John and Susan Klein. KNDS, represented by Marcel Grisnigt. Leviatan Group, represented by Cătălin Robert Podaru. George Lund. Mapa Group, represented by Mehmet Nazif Günal. William Marron. Alexander V. Mirtchev. MITRE, represented by Keoki Jackson. Ahmet M. Oren. Pernod Ricard USA, represented by Tara Engel. Charles O. Rossotti. SAIC, represented by John Bonsell. Serban and Musneci Associates, represented by Alex Serban. Squire Patton Boggs, represented by Edward J. Newberry. Steptoe, represented by Karl Hopkins. Thales, represented by Alan Pellegrini. UPS, represented by Laura Lane. Ambassador Clifford M. Sobel.

FREDERICK KEMPE: I want to ask all the co-chairs to rise. If all the co-chairs could rise, so we can applaud you. Thank you so much. We can’t do our work without you. Thanks so much for that.

And finally, I’d like to ask the following individuals to rise. Some of you will be rising for a second time. So, International Advisory Board members of the Atlantic Council and Atlantic Council staff and board members of the Atlantic Council, please rise. Please join me in applauding this remarkable community of action.

One last point before our next honoree. Don’t forget to take your gift bags tonight. Which include my dear friend David Ignatius’ new novel, hot off the press, Phantom Orbit, generously contributed by Adrienne Arsht, and Frank McCourt’s provocative new book about managing our new digital age, Our Biggest Fight.

With that, ladies and gentlemen, please turn your attention to the screens as we salute tonight’s next honoree.

ANNOUNCER: To present our next awardee, please welcome General John Abizaid.

GENERAL JOHN P. ABIZAID (RET.): Good evening, everybody. It’s great to see you. I have the great honor of introducing to you General Chris Cavoli. Now, Cavoli and I have known each other for a long time. That’s very difficult for him to imagine what I’m going to say. But it’s all right. Relax, Chris.

But before we do that, I really want all the veterans of the United States armed forces and our allied nations in NATO to stand up and be recognized. Thank you. It’s great to have veterans in the audience.

I first met Chris when he was a lieutenant of infantry when I assumed command of the Third Battalion 325th Airborne Battalion Combat Team in Vicenza, Italy. In a battalion packed with the most talented junior officers in our Army, most of whom were top West Point graduates, Chris distinguished himself as a skilled leader and superb trainer. A Princeton graduate, he was well known for his famous undergraduate thesis entitled The Effect of Earthworms on the Vertical Distribution of Slime Molds in the Soil. As you could imagine, this work held him in good stead with the sergeants of the US Army Ranger School.

However, Chris demonstrated his true genius by marrying Christina Dacey, a smart, dynamic leader in her own right. These two professionals not only built wonderful careers together, they also built an Army family that traveled the world and had two sons who exhibit the great talents of both their parents.

Chris’s career is filled with remarkable achievements: a master’s degree in Russian studies at Yale, a foreign area officer who speaks Italian, Russian, and French. He personifies our nation’s commitment to the Atlantic alliance.

Not only does he understand the complexities of our most dangerous adversary but he knows how to fight and win. As a general he reformed the doctrine and structure of the alliance to reflect the realities of modern warfare and he ably assists our Ukrainian friends in their difficult struggle against Russian aggression.

He, along with his partners, have forged a formidable alliance. While his accomplishments of a general officer are great, I also honor him for his combat leadership. I can remember visiting his infantry battalion in one of the most restive dangerous provinces of Afghanistan.

There he led tough, disciplined American soldiers of the 10th Mountain Division while at the same time building professional confidence and competence of his Afghan allies. Here was a fit, dedicated, charismatic young colonel serving in one of the most isolated, dangerous places on earth and it was clear he held the respect of all.

His leadership is marked by courage both on and off the battlefield, by professional competence second to none, and by a remarkable common sense often not seen. Many officers aspire to high command but too few understand that being a warfighter means forging a team that must be able to fight and win tomorrow.

It’s been remarkable to know Chris all these years. He was the best lieutenant I ever knew, the best lieutenant colonel I ever knew, and the best general I know. In Chris Cavoli, our nation has built a gifted soldier, statesman, and leader. Thank God for his leadership at this dangerous time in our history.

Ladies and gentlemen, please welcome this remarkable soldier.

GENERAL CHRISTOPHER G. CAVOLI: Good evening, ladies and gentlemen, distinguished guests. Way too many to mention you all. What a gathering.

Thank you all. I’m very deeply humbled to stand before you tonight, mostly because I recognize that this honor is really not about me. It’s really about the defenders of thirty-two nations, the men, women, and families of the United States and our NATO allies who tirelessly stand guard to secure our freedoms, and I thank them for that in front of you tonight.

General Abizaid, thank you for the far too kind introduction. Thank you for reminding everybody why I became an infantry officer, because I was not a biologist. Thank you for your leadership and your inspiration since I met you when I was a young lieutenant. There is no one I have wanted to emulate more. I’m so lucky to have you and Kathy here tonight.

To the Atlantic Council, thank you for this award. Your dedication to transatlantic cooperation is exemplary and it contributes to the peace and prosperity that we have come to enjoy.

My fellow honorees, it’s a privilege to share the stage with you. Your accomplishments remind us that security requires a full commitment from across all elements of society from everyone. So thank you. We salute you.

Finally, to my family—my wife, my brothers Jim and Steve, my parents. I think they provide a fitting backdrop to this evening. You see, my dad was born and raised in Italy. He lived there without his own dad throughout the war, the Second World War. Afterwards, he came to America. He became an officer. He married my mom, who is from the exact same small town in the Dolomites of northern Italy. We’re working with a very shallow gene pool here. He served a career devoted to our country and to the transatlantic alliance.

My brothers and I grew up as Army brats, as you have heard: Kansas, Texas, so forth, but also Germany and Italy. And my own sons—not here tonight, unfortunately; out in California—grew up the same way, in an Army family living abroad, living the alliance—living the alliance—because our alliance is so much more than simply a promise of collective defense. It’s a promise of a wonderful future. It’s a promise of a future based on shared values of liberty, freedom, and democracy.

It’s the promise that twelve nations made to each other seventy-five years ago this year. Standing amid the ruination of the Second World War, twelve nations banded together and they declared never again. For seventy-five years, we have held that line: An attack on one would be an attack on all. And so there was not an attack on anyone. There has been peace. It hasn’t been easy. We’ve been tested. We’ve been tried. But we have always come through, always. And we have together produced a world that was at peace and growing and prosperous.

But today, dark clouds gather on the horizon. The specter of war once again hangs over the European continent and, indeed, the world. Russia’s ruthless, unprovoked, senseless war in Ukraine stands as yet another, as the latest test to our alliance and to the globe.

And so NATO does what it does: It rises again to its mission. We are reinvigorating our system of collective defense. We have developed and approved plans to defend every square inch of our alliance. Nations are racing to resource those plans. Nations have raised their defense spending dramatically in the past two years. Our exercise program demonstrates our readiness, and we are learning and modernizing at the speed of innovation that we see in the war in Ukraine. We are stronger today than ever.

It is fantastic, unexpected, and yet it’s not unexpected. It’s what we do. We have always banded together. For seventy-five years, we have spotted the key problems, organized against them, and then faced them down. And we are doing that again. NATO is now stronger, it’s more united, it’s more determined, it is bigger than I have ever seen.

These are truly historic times, ladies and gentlemen. History doesn’t always come easy, doesn’t always flow nicely, and this is one of those times. An adversary has threatened us, and we respond. But our response is historic.

It’s such a privilege for me to be part of that response. It’s such a privilege to be part of that response. And it’s a privilege to be here tonight receiving this award on behalf of the brave men and women of our alliance. God bless you all. Thank you very much.

ANNOUNCER: To present our final award this evening, please welcome the Oscar-nominated, Tony, Grammy, and Emmy Award-winning artist, Cynthia Erivo.

CYNTHIA ERIVO: Good evening, excellencies and distinguished guests. It is an honor to be here with you tonight. I would like to thank the Atlantic Council, John Rogers, and the extraordinary Adrienne Arsht, who is also extremely stylish, for giving me the pleasure of presenting the 2024 Distinguished Artistic Leadership Award to my dear friend, Michelle Yeoh.

As we come together in celebration and recognition of global champions, it is no doubt that Michelle embodies the dedication, grace, and empowerment deserving of such an award. Her decades-long career is stellar in depth and dazzling in variety. From her captivating performances in martial arts to her magnetic portrayals in epic drama, her charisma and star quality is undeniable. Michelle is simply a trailblazer, a pioneer who has shattered glass ceilings and defied stereotypes, paving the way for future generations of artists to follow in her footsteps, just like me. Her dedication to her craft, her commitment to excellence, and her unwavering passion for storytelling serve as an inspiration to us all. She’s the reason I want to do my own stunts. Truly.

But it’s more than just her artistic talent that we recognize tonight. Any friend of Michelle knows that beyond her remarkable gifts on screen, she is a woman of humanity and compassion which extends well beyond her work in front of a camera. Her longtime advocacy for gender equality, ending poverty, and environmental protection is a testimony of her moral obligation to help others and fight against global inequality. In 2016, Michelle was appointed as goodwill ambassador of the United Nations Development Programme, a title she has taken dutifully to promote the United Nations Sustainable Development Goals. She continues to use her platform to promote and mobilize her humanitarian efforts in hopes of securing a brighter future for our entire planet.

She is a symbol of perseverance, empowerment, and an inspiration to us all. So tonight, in honoring her excellence, unwavering passion, and inspiring character, it is my absolute pleasure to present—now, wait a minute. I also have to say that this extraordinary woman is one of the most stylish people I have ever met in my life. She is also one of the kindest, most gentle human beings I have ever had the privilege of standing in front of a screen with. It is not easy to sing in front of a camera, and now we have discovered that she can. And I can’t wait for all of you to hear that.

But, it is my absolute pleasure to present the 2024 Distinguished Artistic Leadership Award to the one and only, ever graceful and always elegant, Michelle Yeoh.

MICHELLE YEOH: Oh, gosh. Thank you, Cynthia. I can’t wait for all of you to see Elphaba played amazingly by Cynthia in October—no, November, Thanksgiving, soaring to the skies, not just physically but with her voice, as well. You all are in for a real treat, and thank you for all those kind words! I’m going to have to make up for that. Lovely, thank you.

Good evening, ladies and gentlemen. It is a true pleasure and privilege to spend this evening in such amazing, great, and warm company. Thank you, Atlantic Council, for this prestigious honor. I don’t know what I did to deserve this.

Last week was surreal with the Medal of Freedom; this is—I think I’ve just gone to the heavens and I’m not coming back down for a while.

I would also like to congratulate my fellow honorees: Your Excellency, President Iohannis; Secretary Gina Raimondo; and Commander General Christopher Cavoli. I want to be a general like you. I am so humbled to share the stage with you tonight.

Over the past year, my life has been a whirlwind. It’s not an exaggeration to say that my life was everything everywhere all at once—changed in an instant when the Academy made me the first Asian to win an Oscar for best actress. It did take us ninety-seven years to get there, but at least we are there.

But tonight I would like to talk about another life-changing moment, one that shook my outlook on the world nine years ago. It was April 25, 2015, and I was in Nepal with my husband, Jean, visiting local organizations and doing advocacy for road safety.

Suddenly the ground beneath me began to shake, literally. I’ve never felt that type of instant gut-wrenching fear and panic as the earth trembled violently all around me. And you know I do some crazy stunts in some crazy action movies.

That moment, I dropped to the ground. I crawled to a door to escape the low-rise building we were in. A massive, deadly earthquake was ravaging the country. I was fortunate to survive that day unscathed, but the experience was truly harrowing. Its effects linger with me still.

As we made our way to the airport to be evacuated, I saw the ruins and destruction all around me. I couldn’t shake the thought of how unfair it was that I had a home to go to, unlike the thousands of families whose entire lives were suddenly reduced to rubble. This feeling stayed with me so much that I had to return to Nepal three weeks later to try and help with the relief efforts, and my family did try to stop me. But it was a calling that I felt that I needed to be there.

Disasters of such magnitude cause irreparable damage to the lives of those who already have so little, and for generations after. Many were homeless—were left homeless without means to rebuild or keep their families safe. What I witnessed in Nepal made me realize that crises like this expose deep, pre-existing inequalities. Those living in poverty, especially women and girls, bear the brunt of it. A world that is already unfair becomes even more unfair.

My experience in Nepal inspired me to leverage the platform I was given through my work in film and use it to help others. I wanted to shine a light on the inequalities around the world, particularly how disproportionately they impact women and girls. That’s one of the reasons why I became a goodwill ambassador for the United Nations Development Programme, UNDP.

I was—I am determined to use my voice to advocate for gender equality globally. The issue of gender equality is very personal to me. As an actor in Hollywood who is female, Asian, and now in my early sixties—oh, thirties. Did I say sixties? I know a thing or two about discrimination. I have spent my decades-long career fighting against stereotypes based on gender, race, and age.

As a society, we are far from where we need to be when it comes to gender equality. Much like the film industry, gender bias continues to hold women back. According to the Gender Social Norms Index released by UNDP, almost 90 percent of the world’s population is still biased against women. A staggering 2.4 billion working-age women live in countries that do not grant them the same rights as men. This inequity is ingrained in the fabric of our society at all levels, from our lives at home, to our economy, to our governments. Because of social norms, women around the world shoulder the bulk of unpaid care work, such as childcare, cooking, cleaning, which are viewed as female responsibilities. Caring for our families and households is an essential part of being human, and it’s the backbone of our economies. But the uneven distribution of it means that women miss out on opportunities for stable, paid employment, and are blocked from equal participation in economies that depend on their free labor.

Progress to ensure women’s full and equal economic participation is alarmingly slow. At the current pace, it will take three hundred years to achieve full gender equality. Sorry, but I’m really too impatient for that.

Here’s the thing. When women earn more, everyone wins. That’s because global wealth would potentially increase by 172 trillion [dollars] if women had the same lifetime earnings as men, according to the World Bank. But instead of benefiting women, many countries’ fiscal policies push them deeper into poverty. We are only hurting ourselves. To state the obvious, government policies have a direct impact on women’s lives. This is why UNDP launched a new campaign to advocate for building gender-equal economies, and is working with countries to transform their systems and policies to advance true gender equality in all aspects of life and society.

We have a long road ahead, achieving full gender parity, but it all begins with us here and now.

The film industry I’ve spent a lifetime working in is notorious for unequal pay for male and female actors. In many corners, gender-based discrimination runs rampant. Throughout my career, I have been typecast, stereotyped, put in boxes, and faced a lot of rejection. But I have fought against it all, with varying degrees of success. But time and time again, I refused to accept an unfair world. Today, I am living proof that change is possible.

So let’s not let anyone tell us that our goals are too ambitious, or that we will never achieve them. It’s never too late. After all, I won my first Golden Globe and Oscar at sixty. I know something about perseverance. And I know that we can fight for gender equality. But we have to do it together, and we have to go all in. And it can’t take three hundred years.

So thank you all for listening to me, and have a wonderful night. Thank you.

ANNOUNCER: Please welcome Atlantic Council Executive Vice Chair Adrienne Arsht.

ADRIENNE ARSHT: Congratulations again to Michelle Yeoh. I want to take a moment of personal privilege to mention someone who just spoke and who inspires me every day, Cynthia Erivo. And it’s not just her nails. Cynthia is one of the most talented and extraordinary individuals I know. Specifically, I’m thinking of her stirring portrayal of Harriet Tubman in the title role in the movie Harriet Tubman, and her Oscar-nominated song that she wrote for the movie, entitled, “Stand Up.”

I’m going to read you the lyrics, not sing them. It goes this way: “I’m gonna stand up, take my people with me. Together we are going to a brand-new home far across the river. Do you hear freedom calling?” It’s so very powerful. She too is a rock star. And, as was mentioned, she’ll play Elphaba in the upcoming film Wicked. Cynthia, you told me so many times that when you grow up you wanted to be me. Well, tonight I say I want to be you.

Again, congratulations to all our honorees this evening. And a huge thanks to all who presented and took part in this evening. I’d also like to thank America’s Own and the American Pops Orchestra, led by Luke Frazier. And now, speaking of music, to close out tonight’s program you’re in for a real treat. As we gather to celebrate individuals who understand the importance of democracy, and in honor of the seventy-fifth anniversary of NATO, this song couldn’t be more appropriate. As I bring the performers on, she was recently featured in PBS’s Black Broadway, and he is currently gearing up to star in the Metropolitan Opera’s production of Turandot. Please welcome Brittany Chanell Johnson and Soloman Howard.

The post Full transcript: The 2024 Distinguished Leadership Awards recognize skillful leaders navigating a world of crises appeared first on Atlantic Council.

]]>
Eftimiades published in intelNews on Chinese espionage https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-published-in-intelnews-on-chinese-espionage/ Fri, 03 May 2024 15:55:00 +0000 https://www.atlanticcouncil.org/?p=774553 Nicholas Eftimiades published an article titled "Tradecraft observations on the Reichenbach/Fischer espionage case" in intelNews.

The post Eftimiades published in intelNews on Chinese espionage appeared first on Atlantic Council.

]]>

On May 3, Forward Defense nonresident senior fellow Nicholas Eftimiades published an article titled “Tradecraft observations on the Reichenbach/Fischer espionage case” in intelNews, detailing the alleged Chinese agents’ export of sensitive military technology from Germany.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades published in intelNews on Chinese espionage appeared first on Atlantic Council.

]]>
Ukraine’s new mobilization law leaves demobilization issue unresolved https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-new-mobilization-law-leaves-demobilization-issue-unresolved/ Thu, 02 May 2024 20:32:42 +0000 https://www.atlanticcouncil.org/?p=761862 Ukraine urgently needs to replenish the ranks of the country's depleted military, but the recently adopted mobilization law fails to address the key issue of demobilization, write Elena Davlikanova and Kateryna Odarchenko.

The post Ukraine’s new mobilization law leaves demobilization issue unresolved appeared first on Atlantic Council.

]]>
Ukraine’s new mobilization law will come into force later this month as the country seeks to resolve mounting problems over wartime service in the Ukrainian military. Despite months of political debate and multiple revisions, many observers remain unconvinced by the version of the law that was finally approved by the Ukrainian Parliament and signed by President Zelenskyy on April 16. Crucially, it fails to address the topic of demobilization for the hundreds of thousands of Ukrainians who have been serving since the onset of the full-scale Russian invasion more than two years ago.

Ukraine’s new mobilization law is the latest step in ongoing efforts to reform the military recruitment process and meet the unprecedented challenges posed by Russia’s ongoing invasion. Although Ukrainian losses remain undisclosed, there is clearly a pressing need to replenish the ranks of the military, while also allowing current service personnel to be rotated out of front line positions or demobilized.

Ukrainian military officials initially stated that the goal of the new law was to mobilize an additional 500,000 people. This figure has since been reduced to an unspecified but significantly lower number. Prior to the full-scale invasion, around 250,000 people served in the Ukrainian military, but thanks in large part to a massive surge in volunteers following Russia’s invasion, this force swelled to around 880,000 troops. Together with the National Guard and other formations, there are now believed to be approximately one million Ukrainians in uniform.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Ukraine’s mobilization bill was subject to approximately 4500 amendments, underlining the complexity of the issue. The final version focused on regulating the process of identifying and registering potential conscripts, reviewing eligibility for mobilization, and revising penalties for evading service. Key points include the introduction of an online registry for recruits and the lowering of the age for draft eligibility from 27 to 25.

In line with the new regulations, men of military age will now be obliged to update their registration details within 60 days of the law entering into force, either at regional offices or via an online portal. They will be required to carry their military registration documents and present them upon request or when applying for a passport. Meanwhile, penalties for evading mobilization remain relatively mild. These include modest fines and the potential revocation of drivers licenses.

The new mobilization law does not extend to military-age females. Ukrainian President Volodymyr Zelenskyy had earlier stated his opposition to obligatory military service for women. While they are not subject to conscription, many Ukrainian women do choose to enlist in the armed forces voluntarily, with approximately 60,000 currently serving in a variety of positions including front line roles.

To further boost the mobilization process, the Ukrainian army plans to open a network of 27 new recruitment centers in the coming months in major cities across the country. These centers will function as advisory and information hubs, providing guidance to those interested in joining the armed forces and allowing candidates to choose which unit they prefer to serve in. The first recruitment centers have already opened in Lviv and Zaporizhzhia. Initial reports are positive and indicate this modern approach to military service could help address some of the key concerns among potential recruits.

Most of the criticism leveled at Ukraine’s new mobilization law has focused on the removal of earlier provisions regarding demobilization. Initial drafts envisaged the demobilization of military personnel after 36 months of service, and the rotation of those serving on the front lines for over six months. However, these clauses were taken out of the legislation at the last minute following appeals from Ukraine’s military leadership, who argued that they would weaken Ukraine by facilitating the withdrawal of the country’s most experienced military personnel without providing sufficient trained replacements. The Ukrainian Ministry of Defense is now working on a separate law to handle the demobilization issue.

While opinion remains divided over the fairness and effectiveness of Ukraine’s new mobilization law, few would argue that the country urgently needs to address manpower issues within the armed forces. Many analysts cite troop shortages as one of main challenges facing the Ukrainian military, along with insufficient weapons and ammunition deliveries from the country’s Western partners.

Russia does not currently appear to be encountering any such problems. In recent weeks, Ukrainian commanders have reported that their forces are now outnumbered by as many as ten to one at certain points along the front lines of the war. This overwhelming superiority in numbers is enabling Russia to advance on the battlefield despite suffering consistently high casualty rates.

With Russia’s initial blitzkrieg invasion now transformed into a war of attrition, the Kremlin aims to avoid a politically risky second wave of mobilization and maintain a steady stream of volunteers by offering a range of cash incentives for new recruits, including extremely high salaries and generous financial support for the families of servicemen. Recent reports indicate Russia is aiming to sign up hundreds of thousands of additional troops in the near future amid preparations for a major summer offensive.

Ukraine is now racing against the clock to strengthen its military before Russia’s summer offensive can get fully underway. The recent breakthrough in Washington DC regarding desperately needed US military aid will boost these efforts, as will the new mobilization law. However, with no end in sight to Russian aggression, Ukraine must also find long-term solutions to the country’s lack of new recruits and the thorny issue of demobilization.

Dr. Elena Davlikanova is a Democracy Fellow at the Center for European Policy Analysis and an associate professor at Sumy State University in Ukraine. Kateryna Odarchenko is a partner at SIC Group Ukraine.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s new mobilization law leaves demobilization issue unresolved appeared first on Atlantic Council.

]]>
Vinograd on CBS about President Biden’s comments on university campus protests for Palestine https://www.atlanticcouncil.org/insight-impact/in-the-news/vinograd-cbs-palestine-protests-on-campuses-biden-comments/ Thu, 02 May 2024 17:08:47 +0000 https://www.atlanticcouncil.org/?p=763363 On May 2, Forward Defense Nonresident Senior Fellow Samantha Vinograd appeared on CBS News commented on the public safety factors in President Biden’s comments about student protests for Palestine on university campuses.

The post Vinograd on CBS about President Biden’s comments on university campus protests for Palestine appeared first on Atlantic Council.

]]>

On May 2, Forward Defense Nonresident Senior Fellow Samantha Vinograd appeared on CBS News commented on the public safety factors in President Biden’s comments about student protests for Palestine on university campuses.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Vinograd on CBS about President Biden’s comments on university campus protests for Palestine appeared first on Atlantic Council.

]]>
Great power competition is back. What does that mean for US special operations forces? https://www.atlanticcouncil.org/blogs/new-atlanticist/great-power-competition-is-back-us-special-operations-forces/ Fri, 19 Apr 2024 17:41:57 +0000 https://www.atlanticcouncil.org/?p=758210 With their wide array of capabilities, US special operations forces can play a central role in strategic competition.

The post Great power competition is back. What does that mean for US special operations forces? appeared first on Atlantic Council.

]]>
After 9/11, US special operations forces (USSOF) became well known for direct-action missions that captivated the public’s imagination and demonstrated unparalleled tactical success. The highly publicized raids, precision strikes, and elimination of terrorist threats solidified USSOF’s reputation as the tip of the spear in the US military’s arsenal.

In recent years, however, the global security environment has changed. Adversaries such as Russia and China are using a broad spectrum of diplomatic, informational, military, and economic tactics to challenge the US-led order and achieve their global aims. This return of strategic competition has drawn attention away from the surgical, direct-action operations so prominent during the height of the war on terror, and toward confronting the sophisticated strategies of near-peer adversaries.

So what does this mean for special operations forces?

USSOF will continue to have a central role in the era of renewed strategic competition—but only if there is a broader appreciation and application of USSOF’s capabilities, which extend far beyond just raids and precision strikes. Too often at present, however, USSOF’s distinct capabilities and expertise are overlooked or misunderstood among the broader national security community.

Some of these operations will require applying the operational tactics USSOF focused on since 9/11 to new challenges.

In the face of an evolving and increasingly complex global threat environment, USSOF represents a uniquely versatile component of the US Joint Force. It possesses an array of capabilities that, if fully leveraged, could significantly enhance US force posture. To do so, USSOF must shift its mindset and planning toward strategic competition. There must also be a concerted effort from the services and the Joint Force to integrate USSOF’s unique capabilities more effectively, and the broader defense community must take steps to make the most of the multifaceted value that USSOF brings to the table.

To begin with, USSOF must extend its reach into non-kinetic operations and expand its irregular warfare approach to address the advanced strategies of adversaries such as China and Russia. Some of these operations will require applying the operational tactics USSOF focused on since 9/11 to new challenges. For example, USSOF’s well-honed capabilities for navigating denied and niche environments, including underground operations—an important asset in past counterterrorism missions—are now vital for filling strategic gaps in unconventional warfare scenarios. The salience of this capability is evident, for example, if an adversary uses complex tunnel networks, and it represents just one aspect of USSOF’s highly specialized tactics, techniques, and procedures that can be transitioned to new strategic roles.

This transition will also require adapting USSOF’s strength in new ways. Some of this is already underway—for example, modernizations in naval capabilities are set to boost USSOF’s undersea warfare proficiency, which will help counter rivals such as China in contested spaces. USSOF should continue to prepare for the challenges posed by strategic competition by enhancing its cyber and space capabilities, investing in emerging fields such as artificial intelligence, and bolstering civil-affairs expertise for functioning in extreme and complex operating environments. Clear and decisive communication between the US assistant secretary of defense for special operations and low-intensity conflict and the United States Special Operations Command is vital to define the strategic contributions of special operations within the Department of Defense.

Yet embracing these changes also presents challenges, particularly for USSOF to define and measure its own success. The often-preventive nature of USSOF’s missions, which are aimed at deterring adversaries and shaping their behavior, requires a nuanced approach to evaluating effectiveness. Establishing clear objectives and metrics for strategic competition will be essential, enabling USSOF to quantify its successes and adapt its strategies accordingly.

At the same time, USSOF must maintain its proficiency in essential ongoing tasks, such as combating violent extremist organizations, countering terrorism, and managing weapons of mass destruction. Doing so is necessary so that the United States avoids strategic distractions, such as a preventable terrorist attack.

USSOF works extensively in the information domain, pushing back against propaganda and disinformation from adversaries.

As USSOF adapts its mindset and planning to meet the challenges posed by strategic competition, the Joint Force and the broader interagency must find ways to understand and maximize USSOF’s capabilities. To do so, decision makers across the Joint Force must properly recognize the full range of USSOF’s potential roles, particularly before conflict breaks out.

Unfortunately, some of these potential roles are under-resourced and underleveraged. For example, USSOF’s civil affairs and psychological operations capabilities, though currently underutilized, are essential for strategic competition. The sole brigade responsible for civil affairs is tasked with everything from economic analysis to liaising with civilian government agencies on the ground. With sufficient resources, it could expand its civil-military cooperation in volatile areas, support local governance, and respond to increasingly frequent natural disasters. Notably, United States Marine Forces Special Operations Command’s linguistic and cultural expertise, as demonstrated in long-term operations in the Philippines, highlights the value of investing more in these capacities, especially in strategic areas such as the Indo-Pacific.

Other roles for USSOF are better funded but are still underappreciated across the Department of Defense. USSOF works extensively in the information domain, pushing back against propaganda and disinformation from adversaries. According to General Richard Clarke, former commander of US Special Operations Command, commanders he visited on deployment spent about 60 percent of their time working in the information space. Such work will likely continue, since Russia and China show a growing interest in using information warfare to try to counter US strategic objectives worldwide. Despite this, unfilled billets in the Army’s Special Operations military information support operations were recently cut. This decision signals a troubling undervaluation of these vital capabilities.

If the potential capabilities that USSOF brings to strategic competition are better understood, then these capabilities are more likely to be supported, developed, and implemented in ways that will help shape the strategic environment effectively. Moreover, the capabilities will need to be integrated into a cohesive strategy across the Joint Force, coordinating USSOF’s presence within all seven geographic combatant commands and interagency partners. Doing so would allow USSOF’s capabilities to bridge the divides between different combatant command zones, which could improve the overall US strategic posture in competitive regions and facilitate improved intelligence sharing.

By enhancing USSOF’s capabilities and recognizing its value in strategic competition, the interagency and Department of Defense can ensure it effectively continues to protect US interests and contribute to global stability. Thus equipped, USSOF will remain adept at confronting modern conflict dynamics and asserting US international strategic priorities.


Alyxandra Marine is an assistant director with the Forward Defense program at the Atlantic Council. The recommendations from this piece are explained in further detailed in Stealth, speed, and adaptability: The role of special operations forces in strategic competition.

The post Great power competition is back. What does that mean for US special operations forces? appeared first on Atlantic Council.

]]>
Memo to the president: The United States needs a new strategic approach fit for a new geopolitical era https://www.atlanticcouncil.org/content-series/memo-to/memo-to-the-president-the-united-states-needs-a-new-strategic-approach-fit-for-a-new-geopolitical-era/ Thu, 18 Apr 2024 13:46:49 +0000 https://www.atlanticcouncil.org/?p=757836 The urgent task before American leaders is to renew the foundations of US power, ensuring that the country’s power of example is matched by the example of its power.

The post Memo to the president: The United States needs a new strategic approach fit for a new geopolitical era appeared first on Atlantic Council.

]]>

TO: POTUS
FROM: General (ret.) Wesley K. Clark
SUBJECT: The United States needs a new strategic approach fit for a new geopolitical era

What does the US president need to know? Our “memo to the president” series has the answer with briefings on the world’s most pressing issues from our experts, drawing on their experience advising the highest levels of government.

Bottom line up front: The Post-Cold War is over. And a new geopolitical era is dawning that demands new vision, policies, and strategies to prevent major war and the failure of the rules-based international order. The urgent task before American leaders is to renew the foundations of US power, ensuring that the country’s power of example is matched by the example of its power. Peace, the preservation of democratic values, and the durability of the international system all depend on the United States successfully navigating this new era.

Background: The first step in US renewal is to face reality

The United States’ power of example—the “soft power” so ascendant during the post-Cold War period—was built upon a foundation of economic, military, and moral strength and success. To sustain it, Americans must confront several hard truths:

  1. The United States is facing an emerging, increasingly more closely aligned group of authoritarian powers deeply opposed to the US-led, rules-based international order. Russia—aligned with China, and now alongside Iran and supported by North Korea—is at the center of an effort to shatter American preeminence, redistribute global power, and divide up the world into spheres of influence. These powers are increasingly working together. As Chinese President Xi Jinping declared in bidding farewell to Russian President Vladimir Putin in March 2023, together they are driving “changes” that “we haven’t seen for one hundred years.” Those changes refer to unwinding the global order. Russia’s invasion of Ukraine and China’s quest to take Taiwan are just two efforts among many by these actors that are aimed at reducing US influence and mitigating the laws, rules, and restrictions of the current international system. 
  2. Potential US adversaries are increasingly prone to use force. Russia’s unprovoked, full-scale invasion of Ukraine in 2022 was a shock (though it should not have been). Now European countries are fearful that, if successful in Ukraine, Russia could move against Moldova, Georgia, Kazakhstan, Poland, or the Baltic states. China, though still cautious and calculating, has a major military buildup underway, is wielding that military to intimidate Taiwan, and has pointedly refused to rule out the use of force to seize Taiwan. Iran continues to seek the destruction of Israel and is escalating its (until the recent retaliatory attack against Israel, mostly indirect) use of force in its quest for regional hegemony. North Korea recently stated that it no longer seeks reunification with the South and instead considers the Republic of Korea (ROK) a “primary foe and invariable principal enemy.” Even Venezuela, under the tutelage and with the assistance of Russia, Iran, and China, has threatened to seize the territory of its neighbor, Guyana.   
  3. Nuclear weapons matter again. Putin and his associates have repeatedly—and successfully— threatened the use of nuclear weapons to forestall critically needed US and Western assistance to Ukraine. Overt fear of confrontation with a nuclear power undercuts the credibility of US power worldwide. In seeking help from a potential adversary like China to prevent Russian use of nuclear weapons in Ukraine, the United States may have further undercut the credibility of its nuclear deterrent, especially its attempts to extend that deterrent to protect allies. Russia and China are both enlarging and modernizing their nuclear-weapons arsenals, including strategic nuclear weapons that can strike the United States. Russia has produced a new generation of more usable tactical nuclear weapons and the means to deliver them, and Putin speaks as though Russia has achieved strategic nuclear superiority. North Korea now has nuclear weapons too, and soon Iran will as well. The United States still has its nuclear triad, but its modernization is overdue. Washington withdrew its artillery- and rocket-delivered tactical nuclear systems from Europe more than three decades ago and its nuclear warheads are outmoded, leaving the United States with no counterpart to Russia’s systems. These developments have essentially “decoupled” the United States’ strategic deterrent from its European allies and further weakened Washington’s ability to extend deterrence to its friends and allies.
  4. The All-Volunteer Force and the defense industrial base that supports it are in trouble. The US Army and Navy are too small for the missions that the US government is tasking them with in this new era; excessive “op-tempo,” or pace of operations, is driving out service members and putting premature wear on systems. Both the Army and Navy have missed their recruiting objectives for several years. The result has been ships not fully manned, units training without their full complement of personnel, and deepening reliance on the National Guard and Reserves to make up shortfalls. Even as the nature of war rapidly changes, with drone swarms threatening ships at sea and greater battlefield transparency making maneuver difficult, large battlefield formations may still be required in future conflicts. The US defense industrial base is undergoing vigorous examination and modernization, but will it rejuvenate itself with the limited time and resources available, and be able to cope with rapid injections of new technology? Shortfalls of engineers, welders, and technicians, along with other challenges such as supply-chain issues and capital-equipment deficits, are worrisome. The Kremlin’s invasion of Ukraine has demonstrated how weapons-intensive a war between major powers would be.
  5. US economic sanctions are proving inadequate and sometimes even counterproductive. US sanctions to cut off technological and financial flows to Russia following its 2022 invasion of Ukraine have not proven effective in halting Russia’s use of force. Technology such as chips and machine tools that are vital for Russia’s military industry has leaked through a multilateral sanctions regime that has been difficult to enforce and subject to evasion. Russia is still exporting oil and some gas, and still earning hard currency through a network of smuggling, false manifests, and blending oil products to disguise their origin. But even without being fully effective, these sanctions have alienated many countries fence-sitting on the Ukraine conflict and incentivized further efforts to undercut the US-dominated global financial system. 
  6. US efforts to woo and win over the Global South—largely through soft power—are faltering. The attractive powers of the United States’ democratic system have waned with the success of China’s authoritarian model, the emergence of authoritarians in countries such as Turkey and Egypt, and the obvious problems facing US governance at home. In Africa, US efforts to preach democracy and human rights are sometimes seen as a form of “cultural imperialism” and contrasted with China’s offers of aid and capital without interference in internal affairs. Russia and China are exploiting social media to rip apart young African democracies. In Haiti, Washington has thus far been ineffective in dealing with the country’s humanitarian crisis and the national security risk the crisis poses to the United States. In the Middle East, Iran has created an arc of militias and other forces opposed to the United States—and many actors seem to view the US government’s statements that it does not seek escalation with Tehran as reflecting US weakness. Throughout the Global South, many leaders assessing the United States’ wavering support for Ukraine appear to have decided that Russia is the stronger power.  
  7. The US political system itself has become a major “theater of operations,” in which other countries attempt to manipulate and disrupt US democratic processes to serve their own purposes. Dark money and foreign influence operations exploiting social media and other vulnerabilities have placed US elections and the country’s very democratic system in jeopardy. The failure to resource and fully use the country’s existing organizations and legal authorities to identify and eliminate subversion of the US political system has weakened US strategic credibility, undercut the appeal of democracy as a system, and injected domestic politics into defense and security policies that should sustain bipartisan support. US political dysfunction and increasingly ugly partisanship, some inspired by foreign actors such as Putin, is making effective US policymaking increasingly difficult and further reducing US influence.

Recommendations for rebuilding US power

In this new era, the United States must reinforce its soft power by strengthening the “hard power” foundations of US leadership. The US economic recovery from the COVID-19 pandemic has been surprisingly robust and can be leveraged to fortify these foundations along the following lines of effort. Most fundamental will be the actions taken at home. If we Americans cannot govern ourselves, all the rest is to no avail.

  • Enshrine the sanctity of the US political system as the country’s highest value: This means eliminating malign foreign influence on US elections and policymaking. The US government should strengthen its basic counterintelligence functions, protect its security services from the political machinations of recent years, and reinforce the professional civil service. The United States must prevent the openness and transparency of its democracy from being used against it by foreign powers—a vital but not easily accomplished task that will entail, among other measures, greater scrutiny of social media and polling data, as well as campaign-finance reform. If the United States is to exercise leadership in the world, politics must once again stop at the water’s edge.
  • Strengthen the US nuclear deterrent and all the ancillary systems that give it credibility: During the Cold War, the United States “coupled” its strategic nuclear deterrent to European deterrence by deploying tactical nuclear weapons to Europe, subsequently withdrawing these land-based weapons from the region after the collapse of the Soviet Union. US leaders now must reexamine the need for such tactical and theater systems, as well as the modernization of the warheads they would deliver. Increased funding for surveillance, nuclear systems, space-based communications, missile and space defense, and survivability (including strengthening continuity-of-government programs and dramatically enhancing the resilience of the US electricity grid) would send important signals to rivals and potential adversaries. Investment must be buttressed by policy and rhetoric. The American public needs to be reminded of the positive role of nuclear weapons in US security, and assured that the US government is both maintaining its deterrent and taking appropriate measures to protect the American people should confrontation occur. This is important in strengthening US credibility. In policy terms, Taiwan should be considered a test case. How can the US nuclear deterrent dissuade China from attacking the island? Or is the United States more likely to be deterred from intervening at that crucial moment by China’s nuclear threats? The enhancement of the US nuclear deterrent should be a precondition for the pursuit of more strategic nuclear arms talks with Russia and China.
  • Commit to support Ukraine as necessary to eject Russian forces from its territory: Russia’s aggression in Ukraine has become the litmus test for the rules-based international order. Defeating that aggression—not just halting the fighting in Ukraine—is therefore essential to maintaining the rule of international law and preventing wider conflict. The US government should announce this objective as a policy, and support that goal not only with weapons, munitions, intelligence, and training but also with a full information campaign that includes a broader approach to influencing international opinion. China is surely watching how the United States and other countries respond to this challenge. Washington should encourage allies and partners purchasing US weapons such as ATACMS and Patriot systems to defer acceptance and instead donate their systems to Ukraine as necessary to defeat Russian aggression there.
  • Bolster deterrence of China: To this end, the US government should focus Navy shipbuilding on deterring China, practice troop, naval, and air surges to reinforce Taiwan, and enhance US strategic nuclear defense capabilities. It should also sustain the Quad and alliances in Northeast Asia, seek opportunities such as oil exploration in the South China Sea to push back economically on Chinese expansionism, and maintain the economic policies of robust infrastructure investment at home, “reshoring,” and withholding key technologies from China. Additionally, Washington must give higher priority to protecting the dollar as the primary medium of international trade and store of value. 
  • Force Iran’s rulers to choose between their quest for regional hegemony and regime survival: The US government should change its informal policy toward Iran from “reluctance to escalate” to “end the Axis of Resistance,” including Tehran’s support for the Houthis in Yemen. It should not remit any type of funds to Iran. Washington’s efforts to engage Tehran diplomatically have been only partially successful; while these can be continued, the United States must immediately cease asking Russia for help with them. The US government should actively support groups promoting peaceful change in Iran. And it should privately warn Iran that unless the Axis of Resistance is dismantled and Iran’s terrorist and nuclear threats cease, the United States and its allies will use all necessary means to effect change in Iran. Washington should begin leveraging its diplomatic influence to delegitimize the government of Iran, working with allies to bar it from international organizations and fora while further restricting its access to international banking and markets. US military strikes inside Iran that endanger those assets that the regime values most, beginning with drone and missile production facilities, should not be excluded from consideration if Iran strikes at US forces or vessels.  
  • Enhance deterrence against a nuclear-armed North Korea: The United States should increase its troop presence in and ship visits to South Korea, as well as US-ROK military exercises, while also deepening military industrial cooperation between the two countries. It should forward-station US nuclear-weapons systems and reinforce by policy and public announcement the “extended deterrence” provided to allies in the region by US strategic nuclear systems. Washington should also improve strategic systems for defending the US homeland, and develop and then deploy to the region the capabilities to assure the boost-phase destruction of North Korean missile launches. 
  • Reinvigorate the United States’ All-Volunteer Force and defense industrial base: The US government must encourage greater support among the American people for public service and service in the US military by chartering a presidential commission to revitalize the force, simultaneously strengthening the Selective Service System in the event a military draft is necessary in the future. Washington should boost funding for the armed forces to 4 percent of US GDP in the near term, while also increasing force structure, fleet size, and air and space capabilities, including prioritizing unmanned systems and electronic warfare capabilities. The US military procurement system should also be overhauled to streamline acquisition and enable more rapid insertion of commercially developed systems and capabilities. The United States should also better plan for rapid mobilization of the US industrial and technological base. For two years, the Biden administration has explored ways to substantially increase defense production, but the steps taken have been tentative. This needs to change for the United States to have the material necessary to deter a war with either China or Russia and, if necessary, to fight one. Such an approach would also make it easier to provide Ukraine with the weapons it needs to defeat Russia. Greatly ramping up US defense production would also encourage allies to do the same.
  • Maintain the fragile US lead in cyber and space warfare: The United States shouldpreserve its advantage in the technologies that support these new domains, such as artificial intelligence and quantum computing, and bolster its defenses against “non-kinetic” threats emanating from these domains. The US electricity grid must be secured in depth and properly backed up by reserve equipment, while the country’s financial, transportation, distribution, and manufacturing sectors need greater government protection from cyber threats.
  • Augment US financial power: In addition to taking the measures enumerated above to more effectively deter China, the US government should build on the nascent efforts of the US International Development Finance Corporation to invest in developing economies and outcompete China in this regard. It should empower US firms to gain access to strategic minerals in Africa. And it should make US sanctions more effective by using its deep insights into financial transactions and increasingly powerful artificial-intelligence tools to discern and disrupt every element of the supply chains for nations under sanction, including commercial transactions with third parties that have undercut effective sanctions. The United States needs to apply secondary sanctions to countries that are enabling the Kremlin to avoid sanctions, and to ramp up US capacity to stop high-tech exports to Russia. The United States should also increase US hydrocarbon exports in order to use energy security as a key means of influence abroad. 

Can a democratic society such as the United States—subject to the frequent political churn that comes with regular elections, including another now underway in earnest—develop the long-term strategy, address the high risks, and assume the burdens of leadership that this new geopolitical era requires? The security of the United States and the rules-based international system depends on the answers. Hard truths demand hard choices. The United States can’t afford to shrink from them.  


General Wesley K. Clark is a retired four-star US Army general and former NATO supreme allied commander Europe from 1997-2000. He is a board director at the Atlantic Council, as well as the chairman and CEO of Wesley K. Clark and Associates, a strategic consulting firm.

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Memo to the president: The United States needs a new strategic approach fit for a new geopolitical era appeared first on Atlantic Council.

]]>
Charai in the National Interest: Iran Strikes Israel: What’s Next? https://www.atlanticcouncil.org/insight-impact/in-the-news/charai-in-the-national-interest-iran-strikes-israel-whats-next/ Mon, 15 Apr 2024 16:07:40 +0000 https://www.atlanticcouncil.org/?p=757165 The post Charai in the National Interest: Iran Strikes Israel: What’s Next? appeared first on Atlantic Council.

]]>

The post Charai in the National Interest: Iran Strikes Israel: What’s Next? appeared first on Atlantic Council.

]]>
Webster quoted in the VOA Chinese analysis of the PRC’s support for Russia’s invasion of Ukraine https://www.atlanticcouncil.org/insight-impact/in-the-news/webster-quoted-in-the-voa-chinese-analysis-of-the-prcs-support-for-russias-invasion-of-ukraine/ Fri, 12 Apr 2024 19:09:06 +0000 https://www.atlanticcouncil.org/?p=757291 The post Webster quoted in the VOA Chinese analysis of the PRC’s support for Russia’s invasion of Ukraine appeared first on Atlantic Council.

]]>

The post Webster quoted in the VOA Chinese analysis of the PRC’s support for Russia’s invasion of Ukraine appeared first on Atlantic Council.

]]>
Groen at 2024 US Cyber Command Legal Conference on AI risks and innovation https://www.atlanticcouncil.org/insight-impact/in-the-news/groen-ai-risks-innovation/ Thu, 11 Apr 2024 03:14:43 +0000 https://www.atlanticcouncil.org/?p=758056 On April 10, Forward Defense Nonresident Senior Fellow Michael Groen spoke at the 2024 US Cyber Command Legal Conference about implementing AI and balancing risk with defense innovation.

The post Groen at 2024 US Cyber Command Legal Conference on AI risks and innovation appeared first on Atlantic Council.

]]>

On April 10, Forward Defense Nonresident Senior Fellow Michael Groen spoke at the 2024 US Cyber Command Legal Conference about implementing AI and balancing risk with defense innovation.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Groen at 2024 US Cyber Command Legal Conference on AI risks and innovation appeared first on Atlantic Council.

]]>
Western weakness in Ukraine could provoke a far bigger war with Russia https://www.atlanticcouncil.org/blogs/ukrainealert/western-weakness-in-ukraine-could-provoke-a-far-bigger-war-with-russia/ Mon, 08 Apr 2024 01:15:19 +0000 https://www.atlanticcouncil.org/?p=755016 Western leaders must decide whether they would rather arm Ukraine for victory today or fight a resurgent and emboldened Russia tomorrow, writes Oleksiy Goncharenko.

The post Western weakness in Ukraine could provoke a far bigger war with Russia appeared first on Atlantic Council.

]]>
Does the West actually want Ukraine to defeat Russia? That is the question many in Kyiv are now asking amid continued signs of Western indecision as the biggest European invasion since World War II approaches its third summer with no end in sight.

The mounting sense of frustration among Ukrainians is easy to understand. Encouraged by delays in military aid for Ukraine, Russia has intensified the bombing of Ukraine’s civilian infrastructure over the past month, plunging entire cities into darkness and leaving millions without access to electricity, heating, water, or internet. Despite the looming prospect of a humanitarian catastrophe, the Western response has been notably lacking in urgency.

Meanwhile, Ukraine has begun striking back with drone attacks on Russian refineries, and has succeeded in disrupting more than ten percent of Russian refining capacity. Rather than supporting this seemingly effective campaign to weaken Putin’s war machine, The US has reportedly called on Kyiv to end its drone strikes due to concerns over global oil prices and possible retaliation. Viewed from Ukraine, these do not look like the actions of partners who are fully committed to Ukrainian victory.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Over the past two years, Ukrainians have grown accustomed to excessive Western caution and insufficient Western support. While the democratic world deserves considerable credit for delivering the weapons that have allowed Ukraine to survive, the military aid provided since February 2022 has been subject to frequent delays, and has consistently fallen far short of the quantities required to defeat a military superpower like Russia.

The West’s inadequate response to Russia’s invasion is primarily due to a crippling fear of escalation. Putin sees this indecisiveness and acts accordingly. He easily intimidates Western leaders with nuclear blackmail, while escalating his own attacks on Ukrainian cities and the country’s civilian infrastructure.

In March 2024 alone, Russia attacked Ukraine with 264 missiles and 515 drones, according to Ukrainian Air Force data. Some were intercepted by Ukrainian air defenses, but ammunition is rapidly running out. With no clear idea of when the next batches of interceptor missiles may arrive, Ukrainian troops must ration supplies, leaving millions vulnerable to the horrors of Russian bombardment.

The situation on the front lines of the war is equally critical. With half of promised weapons deliveries arriving late and vital US military aid held up in Congress for the past eight months, Ukrainian troops are running short of crucial ammunition and are currently in danger of being overwhelmed by Russian firepower. In late March, President Zelenskyy admitted that if US aid is not forthcoming, Ukraine will be forced to retreat. If that happens, he warned, Russia could break through Ukraine’s defensive lines and attempt to seize the country’s biggest cities.

Despite this deteriorating picture, there is currently a surreal sense of business as usual in much of the West. The political classes are increasingly preoccupied with upcoming elections and appear largely unaware of the geopolitical disaster unfolding on Europe’s eastern frontier. Many seem to think Ukrainian courage alone will be enough to hold Russia back until the invasion runs out of steam. This is wishful thinking. In reality, if Ukraine does not urgently receive increased support, there is a very real chance that Putin will win. And if Putin wins in Ukraine, he will go further.

At present, the West appears content to wage of a slow war of attrition while drip-feeding Ukraine minimal supplies. This is a recipe for defeat. Russia enjoys huge advantages in terms of manpower and weapons, while the Kremlin has successfully shifted the entire Russian economy onto a war footing. Putin clearly believes he can outlast the West in Ukraine, and is confident time is on his side.

This does not mean a Ukrainian victory is unachievable, but Ukraine’s partners need to demonstrate far more resolve if they genuinely hope to secure Putin’s defeat. Ukraine’s long-range drone attacks on Russian refineries have exposed the vulnerability of Russia’s economically crucial energy industry, but the Western response has so far been predictably cautious. This needs to change. Ukraine cannot win a war against such a powerful enemy with one hand tied behind its back.

Likewise, Ukraine’s remarkable success in the Battle of the Black Sea debunks notions of Russian red lines and offers a road map toward victory over the Kremlin. Despite not having a conventional navy of its own, Ukraine has used drones and missile strikes to sink around a quarter of the Russian Black Sea Fleet. This has forced Putin to quietly withdraw the bulk of his remaining warships from Crimea.

Similar success is possible on land if Ukraine’s Western partners give the country the tools it needs. Ukraine’s requirements are already well known; the Ukrainian military needs vast quantities of artillery shells and drones along with increased deliveries of armored vehicles, combat aircraft, air defense systems, electronic warfare technologies, and long-range missiles.

Without this military aid, Ukraine’s prospects look grim. Nor would the consequences of a Russian victory be confined to Ukraine alone. On the contrary, the shock waves would be felt around the world as Putin and his fellow autocrats sought to capitalize on Western weakness.

A triumphant Putin would almost certainly look to build on the considerable geopolitical momentum created by success in Ukraine. In practical terms, this would mean expanding his quest to reverse the verdict of 1991 and reclaim “historically Russian lands.” Putin’s revisionist agenda would place more than a dozen independent states that formerly belonged to the Russian Empire at risk of suffering the same fate as Ukraine. The most probable initial targets would include Moldova, Georgia, Belarus, and Kazakhstan, but his ambitions would likely expand further.

The fall of Ukraine would leave NATO demoralized and discredited, creating a once-in-a-lifetime opportunity for the Russian dictator to achieve his ultimate goal and instigate the break-up of the alliance. NATO leaders have already demonstrated that they are afraid of escalation and inclined to back down when confronted by the Kremlin. In a post-Ukraine environment, Putin may look to exploit this lack of resolve by testing NATO’s own red lines while stopping short of full-scale hostilities. If the alliance failed to rise to this challenge, it would risk losing all credibility overnight. While NATO could technically survive such a crisis, the alliance would struggle to maintain any legitimacy without its cast-iron commitment to collective security.

Fellow authoritarian powers like China and Iran are also watching the West’s weakness in Ukraine and are drawing the obvious conclusions. This is already helping to fuel insecurity in the Middle East and increasing the threat to Taiwan. The global security architecture established over the past eighty years is clearly crumbling, and Ukraine is the front line in the fight to shape the future of international relations.

The West’s fear of escalation is Vladimir Putin’s secret weapon. It has deterred Western leaders from arming Ukraine, and has prolonged the war by preventing the Ukrainian army from building on its early battlefield successes. Unless the West can overcome this self-defeating fear, it may ultimately lead to Russian victory.

Russian success in Ukraine would almost certainly set the stage for a far bigger military confrontation between the Kremlin and the democratic world. Since February 2022, Putin has placed his entire country on a war footing and has positioned Russia as the leader of an anti-Western coalition of authoritarian states aiming to transform the world order. As the invasion of Ukraine has escalated, he has become increasingly open about his own imperial ambitions. It is dangerously delusional to suggest Putin will simply stop if he wins in Ukraine. Instead, Western leaders must decide whether they would rather arm Ukraine for victory today, or find themselves confronted with a resurgent and emboldened Russia tomorrow.

Oleksiy Goncharenko is a Ukrainian member of parliament with the European Solidarity party.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Western weakness in Ukraine could provoke a far bigger war with Russia appeared first on Atlantic Council.

]]>
Putin has repeatedly used terror attacks to tighten his grip on Russia https://www.atlanticcouncil.org/blogs/ukrainealert/putin-has-repeatedly-used-terror-attacks-to-tighten-his-grip-on-russia/ Thu, 28 Mar 2024 21:33:38 +0000 https://www.atlanticcouncil.org/?p=752769 The March 22 terror attack in Moscow has seriously damaged Putin’s carefully crafted public image as a strongman ruler who offers his subjects security in exchange for restrictions on their personal freedoms, writes Olivia Yanchik.

The post Putin has repeatedly used terror attacks to tighten his grip on Russia appeared first on Atlantic Council.

]]>
The March 22 terror attack on a Moscow concert hall was the deadliest in Russia for almost two decades. While the official investigation into the attack is still underway, it is already becoming increasingly clear that the Kremlin intends to ignore overwhelming evidence of Islamic State responsibility in order to accuse the Ukrainian authorities and their Western partners of orchestrating the killings.

This opportunistic attempt to blame Ukraine is fueling widespread speculation that the attack will lead to an escalation in Russia’s ongoing invasion. Based on past experience throughout Vladimir Putin’s 24-year reign, many also anticipate that the Russian dictator will use the atrocity to launch a further domestic crackdown.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Putin first emerged on Russia’s political stage against a backdrop of terrorist attacks. When he was appointed Prime Minister in August 1999, Putin was largely unknown to the wider Russian public. Weeks later, the country was rocked by a series of apartment bombings in Moscow and southern Russia.

Putin’s hard-line response to these attacks saw him rise to national prominence. This paved the way for his presidential election win in early 2000, while also serving as justification for the Second Chechen War. Putin’s use of macho street slang was welcomed by many, including his famous pledge to flush terrorists “down the toilet.”

In October 2002, armed militants seized a theater in the center of Moscow and held almost one thousand audience members hostage. The ensuing standoff ended in tragedy when a botched intervention by Russian security forces led to the deaths of more than 100 hostages. This incident was to become another key turning point in the Putin era.

In the wake of the theater siege, Putin passed a series of anti-terrorism laws restricting civil liberties. He also significantly strengthened Kremlin control over the Russian media, making it far more difficult for journalists to report critically on the authorities. Crucially, Putin sought to frame the theater attack as an act of “international terrorism.” This played an important role in transforming international perceptions of Russia’s fight against Chechen separatism by equating it with the US-led “War on Terror.”

The largest terrorist attack of the Putin era came in September 2004, when militants stormed a school in Beslan during traditional ceremonies to mark the first day of the new academic year. This high-profile crisis ended in carnage and the deaths of more than 300 hostages. The Beslan massacre transformed the political landscape in Russia. In the wake of the tragedy, Putin moved to end the direct election of regional governors and return to a system of appointment by the Kremlin. This reversed what was widely regarded as one of the main democratic achievements of the Yeltsin era.

Throughout the 2010s, Russia experienced sporadic suicide bombings across the country. In 2017, an attack on the St. Petersburg metro system led to new restrictions imposed on the popular Telegram messaging app, after an investigation concluded that the platform had been used by terrorists to coordinate their activities.

With today’s Russia already an increasingly authoritarian state, it is not clear what measures remain available to the Kremlin in response to the recent Moscow attack. Following the full-scale invasion of Ukraine in February 2022, the last vestiges of an independent press and civil society have been largely extinguished, while draconian legislation has criminalized any criticism of the war.

Some fear that the Moscow attack may spark a backlash against Russia’s large community of labor migrants, many of whom are Muslims from Central Asia. Meanwhile, some officials are already calling for the reintroduction of the death penalty. Given the scale of the attack and the rhetoric currently coming out of the Kremlin, most expect the response to be severe.

The March 22 attack in Moscow has seriously damaged Putin’s carefully crafted public image as a strongman ruler who offers his subjects security in exchange for restrictions on their personal freedoms. In order to reestablish his credentials, Putin is likely to target his enemies in Ukraine and the West. In line with past practice, he will also look to tighten his grip inside Russia itself.

Olivia Yanchik is a program assistant at the Atlantic Council’s Eurasia Center.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Putin has repeatedly used terror attacks to tighten his grip on Russia appeared first on Atlantic Council.

]]>
Vinograd on CBS “Face the Nation” about the recent ISIS terrorist attack in Moscow, US border security, and more https://www.atlanticcouncil.org/insight-impact/in-the-news/vinograd-cbs-face-the-nation-intelligence-vetting-architecture/ Sun, 24 Mar 2024 19:41:36 +0000 https://www.atlanticcouncil.org/?p=752220 Samantha Vinograd speaks about increasing resources for vetting architecture and intelligence sharing to improve national security.

The post Vinograd on CBS “Face the Nation” about the recent ISIS terrorist attack in Moscow, US border security, and more appeared first on Atlantic Council.

]]>

On March 24, Forward Defense Nonresident Senior Fellow Samantha Vinograd appeared on CBS “Face the Nation” with Margaret Brennan discussing the recent terrorist attack carried out by ISIS-K in Moscow and southern US border security. She also spoke about the criticality of supplying resources for vetting architecture, intelligence sharing, and enhancing information arrangements with international partners.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Vinograd on CBS “Face the Nation” about the recent ISIS terrorist attack in Moscow, US border security, and more appeared first on Atlantic Council.

]]>
Russian victory in Ukraine would leave Europe at Putin’s mercy https://www.atlanticcouncil.org/blogs/ukrainealert/russian-victory-in-ukraine-would-leave-europe-at-putins-mercy/ Thu, 21 Mar 2024 21:06:18 +0000 https://www.atlanticcouncil.org/?p=751150 A Russian victory in Ukraine would reinvigorate Putin's war machine and leave much of Europe at the mercy of the Kremlin, writes Mykola Bielieskov.

The post Russian victory in Ukraine would leave Europe at Putin’s mercy appeared first on Atlantic Council.

]]>
If Putin wins in Ukraine, will he go further? This is the question currently being asked with increasing urgency in capital cities throughout Europe.

Skeptics note that the failures of the past two years have exposed the limitations of the Russian military, and claim a triumphant Putin would be in no position to expand the war beyond the borders of Ukraine. This argument is comforting but short-sighted. It ignores the practical implications of a Russian victory, and underestimates the geopolitical importance of Ukraine for the security of Europe.

The re-emergence of an independent Ukraine in 1991 profoundly altered the European geopolitical landscape. For centuries prior to 1991, the Russian Empire and the USSR had exploited Ukraine’s geographical location, natural resources, and population to project power into the heart of Europe. Hundreds of thousands of Ukrainians had served in the Red Army, while the Soviet war machine had relied heavily on Ukraine’s industrial base to produce everything from warships and tanks to intercontinental missiles.

The collapse of the Soviet Union temporarily reduced the imperial threat facing the countries of Central Europe. Neighbors such as Poland and Hungary understood the strategic importance of Ukrainian statehood perfectly well and were among the first to recognize Ukraine’s independence. This new geopolitical reality shielded countries across the region from potential Russian aggression and helped pave the way for their NATO accession.

Vladimir Putin was also well aware that Ukrainian independence was a major obstacle to the revival of Russia’s great power status. From the very beginning of his reign, he made the subjugation of Ukraine a foreign policy priority. At first, he attempted to achieve this goal via political means; when this failed, he resorted to the same military methods employed by generations of his Czarist and Soviet predecessors.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The Russian army has suffered extremely heavy losses over the past two years in Ukraine, but this has not deterred Putin. On the contrary, with the future of Western military aid to Ukraine currently in doubt, the Russian dictator is growing visibly more confident of securing victory. If Putin is able to extinguish Ukrainian statehood, Russia’s military potential will be dramatically enhanced by the acquisition of Ukraine’s considerable resources.

Russia is already conscripting large numbers of men in occupied regions of Ukraine and using them as cannon fodder in brutal human wave offensives. If Ukraine falls, hundreds of thousands more would be forced to join the Russian military and deployed in similar fashion. As well as extra manpower, a conquered Ukraine would also provide Russia with vast natural resources, industrial strength, and agricultural wealth. Indeed, the occupation of Ukraine would allow Russia to dominate global agricultural markets.

The geographical implications of a Russian victory in Ukraine would be equally grave. Russia seized Crimea in 2014 then used the occupied Ukrainian peninsula as a springboard for the full-scale invasion of the country eight years later. As the Russian army continues to edge forward in eastern Ukraine, each advance brings Putin’s troops closer to the border with NATO.

Nobody is more conscious of the growing danger than Ukraine’s western neighbors. It is no surprise that Poland, the Czech Republic, and the Baltic states are among the biggest supporters of Ukraine and the most vocal when it comes to raising the alarm over the Russian threat. They know that if Ukraine is lost, they are next in line and will face a resurgent Russia emboldened by the success of the current invasion.

This is not to say that others are oblivious to the potentially disastrous consequences of a Russian victory in Ukraine. French President Emmanuel Macron has recently warned that European security is “at stake” in Ukraine, and has refused to rule out deploying Western troops to prevent Russia from overrunning the country.

Influential voices in America have long recognized the geopolitical importance of Ukrainian independence. In the 1990s, former US National Security Advisor Zbigniew Brzezinski highlighted the country’s crucial role in the geopolitics of the region. “It cannot be stressed strongly enough that without Ukraine, Russia ceases to be an empire, but with Ukraine suborned and then subordinated, Russia automatically becomes an empire,” he famously observed.

During the early decades of Ukrainian independence, successive US administrations appeared inclined to follow Brzezinski’s counsel. However, from the late 2000s onward, the focus of US foreign policy began to shift away from Ukraine and the wider Eastern European region toward Asia.

This coincided with the rise of a more assertive Russia. In 2008, Russian troops invaded Georgia. Six years later, the Kremlin occupied Crimea and sparked a war in eastern Ukraine. By 2022, an emboldened Putin felt strong enough to launch the biggest European invasion since World War II. This escalating Russian aggression should serve as a painful lesson for anyone tempted to take the continued existence of an independent Ukraine for granted.

Ukraine is currently facing the most challenging period since the start of Russia’s full-scale invasion. Starved of supplies, Ukrainian troops find themselves forced to ration ammunition. In many cases, they are already unable to prevent Russia from edging forward. This is fuelling increasingly pessimistic forecasts as the spring campaigning season draws near.

The stakes could hardly be higher. If Russia’s invasion succeeds, the consequences will be felt far beyond the borders of Ukraine. The Russian military will be revitalized by the capture of Ukraine’s vast human and material resources, and will loom large on the eastern border of a NATO alliance demoralized and discredited by its failure to defend Ukrainian independence. At that point, many in the West may begin to ask why they didn’t arm Ukraine when they had the chance. By then, of course, it will be too late.

Mykola Bielieskov is a research fellow at the National Institute for Strategic Studies and a senior analyst at Ukrainian NGO “Come Back Alive.” The views expressed in this article are the author’s personal position and do not reflect the opinions or views of NISS or Come Back Alive.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Russian victory in Ukraine would leave Europe at Putin’s mercy appeared first on Atlantic Council.

]]>
Eftimiades on NucleCast by ANWA Deterrence Center https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-on-nuclecast-by-anwa-deterrence-center/ Wed, 20 Mar 2024 19:47:30 +0000 https://www.atlanticcouncil.org/?p=749687 Eftimiades was interviewed on NucleCast by ANWA Deterrence Center, where he discussed  China's whole of society approach to espionage and the methods that they use to implement this approach.

The post Eftimiades on NucleCast by ANWA Deterrence Center appeared first on Atlantic Council.

]]>

On March 12, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on “NucleCast,” hosted by the ANWA Deterrence Center. He discussed China’s whole-of-society approach to espionage and the methods that Chinese actors use to implement this approach.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades on NucleCast by ANWA Deterrence Center appeared first on Atlantic Council.

]]>
Break up TikTok, arm Ukraine https://www.atlanticcouncil.org/content-series/inflection-points/break-up-tiktok-arm-ukraine/ Wed, 20 Mar 2024 11:30:00 +0000 https://www.atlanticcouncil.org/?p=749993 The United States and its allies need to address both Russia’s military threats and Chinese influence operations.

The post Break up TikTok, arm Ukraine appeared first on Atlantic Council.

]]>
The US Congress should force the sale of TikTok or ban the app, and it should pass its long-delayed aid package for Ukraine. Just as important, it should signal to American voters that both represent the front lines in the strategic battle for the global future.

What’s surprising is that the same House Republican minority that has blocked Ukraine funding for more than five months hasn’t made this connection. What might help this group is a close reading of the recently released “Annual Threat Assessment of the US Intelligence Community”—and Peggy Noonan’s latest Wall Street Journal column.

News reports have focused public attention on the new intelligence report primarily because of its assessment of Israeli Prime Minister Benjamin Netanyahu’s “viability as a leader” as being “in jeopardy.” Even more important, however, are the links it draws between regional conflicts in Europe and the Middle East and our unfolding, generational contest with China to shape the future.

“During the next year,” the assessment explains, “the United States faces an increasingly fragile global order strained by accelerating strategic competition among major powers, more intense and unpredictable transnational challenges, and multiple regional conflicts with far-reaching implications.”

Regarding Beijing, the assessment underscores China’s growing efforts online, resembling the long-standing Moscow playbook, “to exploit perceived US societal divisions . . . for influence operations.” That includes experimentation with artificial intelligence. TikTok accounts run by a Chinese government propaganda arm “reportedly targeted candidates from both political parties during the US midterm election cycle in 2022,” it notes, something the Atlantic Council’s Digital Forensic Research Lab was the first to show through an open-source investigation.

In a valuable new report, the Atlantic Council’s own analysts stopped short of calling for a breakup or ban of TikTok as a means of addressing the platform’s threats to US national security. “TikTok: Hate the Game, Not the Player” argues that an exclusive focus on the Chinese app overlooks “broader security vulnerabilities in the US information ecosystem.”

Peggy Noonan makes a compelling case for why the United States should nevertheless target TikTok. “It uses algorithms to suck up information about America’s 170 million users, giving it the potential to create dossiers,” she writes. Federal Bureau of Investigation Director Christopher Wray, Noonan adds, has warned that China “has the ability to control software on millions of devices in the US.”

That brings me to Ukraine.

It’s difficult to gather hard evidence to illustrate how the Chinese government is deploying the TikTok weapon, yet the existing and potential dangers were sufficient to prompt a bipartisan House vote against it of 352-65, unifying members of Congress such as Democrat Nancy Pelosi and Republican Elise Stefanik, who are more often poles apart.

By comparison, the evidence of Russian President Vladimir Putin’s murderous intentions is incontestable. Russian forces are advancing, and US dithering is costing Ukrainian lives. It’s also encouraging an increasingly close autocratic partnership built on the shared belief that now is the moment to test US and Western staying power and resolve.

“Russia’s strengthening ties with China, Iran, and North Korea to bolster its defense production and economy are a major challenge for the West and its partners,” says the new report by the US intelligence community. On Tuesday, Reuters reported that Putin will visit Chinese leader Xi Jinping in May, building upon what he has called their “no limits” partnership.

Weeks ago, a large Senate majority voted in favor of an aid package that would bring $60 billion in aid to Ukraine alongside support for Israel and Taiwan. A similar House majority would support that, but thus far a small Republican minority in the lower chamber has blocked a vote. This needs to be fixed quickly either by Speaker Mike Johnson permitting a floor vote, or through a discharge petition signed by a bipartisan majority.

With the stakes of such a historic nature, the United States and its allies should address both Russia’s military threats, with Chinese support, and Chinese influence operations, with Russian inspiration.

It’s not one or the other—but both. And now.


Frederick Kempe is president and chief executive officer of the Atlantic Council. You can follow him on Twitter: @FredKempe.

This edition is part of Frederick Kempe’s Inflection Points Today newsletter, a column of quick-hit insights on a world in transition. To receive this newsletter throughout the week, sign up here.

The post Break up TikTok, arm Ukraine appeared first on Atlantic Council.

]]>
Polymeropoulos cited on RawStory about concerns of Trump politicizing intelligence https://www.atlanticcouncil.org/insight-impact/in-the-news/polymeropoulos-trump-politicizing-intelligence/ Mon, 18 Mar 2024 15:52:15 +0000 https://www.atlanticcouncil.org/?p=750967 Marc Polymeropoulos notes that there will be negative effects for allies' information sharing if Trump continues to politicize intelligence.

The post Polymeropoulos cited on RawStory about concerns of Trump politicizing intelligence appeared first on Atlantic Council.

]]>

On March 18, Forward Defense Nonresident Senior Fellow Marc Polymeropoulos was cited about the negative effects that Trump’s politicization of intelligence would have on gathering and sharing information, particularly with American allies.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Polymeropoulos cited on RawStory about concerns of Trump politicizing intelligence appeared first on Atlantic Council.

]]>
Help Ukraine win—or risk kicking off a US losing streak https://www.atlanticcouncil.org/blogs/new-atlanticist/help-ukraine-win-or-risk-kicking-off-a-us-losing-streak/ Fri, 15 Mar 2024 14:13:37 +0000 https://www.atlanticcouncil.org/?p=748187 Supporting Ukraine isn’t charity. It is a way for the United States to reassert itself at a time when its influence is faltering.

The post Help Ukraine win—or risk kicking off a US losing streak appeared first on Atlantic Council.

]]>
More than two years into Russia’s war in Ukraine, the once solid wall of US public support for aid to Ukraine has become less vocal. Because of this decrease in discourse supporting Ukraine, a small number of loud detractors is seeking to sway public opinion by asserting that supporting Ukraine isn’t in the United States’ interest. These voices point to the twenty years of war in Iraq and Afghanistan and the tragic consequences of the US and NATO withdrawal from Afghanistan to argue that the United States should not become entangled in another “forever war,” and that instead it should focus on its southern border. These arguments are built on the false sense that US influence abroad, whether it starts or stops, is divorced from any noticeable consequence for most Americans. However, continued assistance to Ukraine is critical if the United States is to retain its position as the world’s indispensable nation and the many benefits Americans enjoy as a result. Failing to support Ukraine now might kick off an American losing streak that could take decades to overcome.

First, Ukraine is not Afghanistan. No US troops are fighting in Ukraine, whereas tens of thousands of US troops invaded Afghanistan to fight an insurgency in a mountainous, landlocked, and poor nation. In contrast, Ukraine borders and aspires to join NATO and the European Union. It has an educated population (with a nearly 100 percent adult literacy rate), and it is connected to the global economy as one of the world’s largest agricultural exporters. Though many Afghans ultimately supported the United States, that support never materialized into the national and political coherence that is already seen among Ukrainians fighting for their right to exist as a democratic nation. Ukraine is protecting its territory from a hostile invasion by Russia—an autocratic nation that supports and is supported by dictators in Syria, Iran, and North Korea.

Supporting Ukraine isn’t charity. It is a way for the United States to reassert itself at a time when its influence is faltering.

Second, while the war has been in an apparent stalemate in recent months, all but the briefest of wars play out in phases. Often, one of the causes of a stalemate is that both sides have run low enough on fresh troops and equipment that they need to reequip and train personnel before they are capable of further large-scale operations. In this sense, the current period of “stalemate” in Ukraine should be seen not as the end-state, but as a finite period to focus on rearming, reequipping, and—importantly—reassessing one’s theory of victory. In this sense, Ukrainian President Volodymyr Zelenskyy’s replacement earlier this year of Valery Zaluzhny with Oleksandr Syrsky as the head of Ukraine’s armed forces looks less like an indication that Ukraine is flailing, and more like a prudent move to set the foundation for a new approach to victory.

The consequences of this war will echo well beyond Europe. Supporting a Ukrainian victory would reassert US global preeminence for around 5 percent of the annual US defense budget, and without the cost of American lives. Continued US global leadership would help shape international issues such as governance of space, artificial intelligence, terrorism, and global migration patterns in the United States’ favor. Russia would be militarily defeated by a reinvigorated American defense industrial base and China would likely reconsider the ability and willingness of the United States to exert its will around the globe, including in defense of Taiwan.

If, however, the United States fails to support Ukraine, expect the opposite. An emboldened Russia is likely to expand its current policy of sowing global discord. Already it has muscled into countries in Africa in hope of capturing raw materials, supported Iranian-backed terrorists in the Middle East that threaten global shipping, and conducted anti-US information and covert operations in Central and South America. Europe would chart a more independent foreign policy and seek to decrease its reliance on the US defense industry and military cooperation. Some may think this is a positive, but the US defense industrial base relies on both US military sales and on sales to allies in NATO and elsewhere. Furthermore, the United States’ ability to defend its global interests—the same interests that give Americans their extraordinary standard of living—would be diminished by nations unwilling to cooperate with an unreliable partner.

Which brings us back to Ukraine. Some argue that the United States must first secure its own borders before supporting Ukraine, but that falsely assumes that the two issues are mutually exclusive or linked. It is possible to both support Ukraine and secure US borders; one does not preclude the other. Others say that Europe should be paying to support Ukraine, which it already is. More than a dozen European nations are spending more than the United States as a share of their gross domestic product, and the European Union as an institution is outspending the United States in terms of total commitments. Finally, some argue that funding Ukraine diverts funds for US capabilities in the Indo-Pacific. This ignores two critical facts: First, most of the funding “for Ukraine” actually goes to support the US defense industrial base. Second, all of the United States’ plans for United States Indo-Pacific Command involve an assumption of some support from European allies. US leaders and policymakers need to ask themselves how realistic that assumption is if they do not support those allies today.

Supporting Ukraine isn’t charity. It is a way for the United States to reassert itself at a time when its influence is faltering. It is a golden opportunity to cement the support of US allies and partners—its greatest advantage over Russia and China. Support to Ukraine isn’t just a good deed, it’s also a good deal. From January 2022 to January 2024, the United States gave roughly $46 billion in military assistance to Ukraine, according to the Kiel Institute for the World Economy. From 1941 to 1945, the United States sent the current equivalent of $831 billion to allies fighting fascist regimes in the Atlantic and Pacific and ultimately had to sacrifice 416,000 American men and women to the cause of freedom. Ukraine can still win without US troops.

In seventy-five years, the only time NATO has invoked its collective defense protocol was to defend the United States after 9/11. And NATO allies sent their troops thousands of miles away to fight an insurgency with the United States. Now, it is Europe that needs help from the United States. Russia has invaded a European nation in what NATO allies see as the greatest security threat to Europe since the Nazis. If the United States turns its back on Ukraine now, it would be abandoning its allies in their time of need. It would be kicking off an American losing streak that could last decades—if not longer.


General Tod D. Wolters (Ret.) is a distinguished fellow with the Atlantic Council’s Scowcroft Center for Strategy and Security. In 2022, Wolters completed a distinguished forty-year active-duty career in the US Air Force as the supreme allied commander Europe (SACEUR) and commander US European command (EUCOM).

Ann Marie Dailey is a nonresident senior fellow at the Transatlantic Security Initiative of the Atlantic Council’s Scowcroft Center for Strategy and Security and is currently serving as a policy researcher at the RAND Corporation. The views, opinions, findings, conclusions, and recommendations contained herein are the author’s alone and not those of RAND or its research sponsors, clients, or grantors.

The post Help Ukraine win—or risk kicking off a US losing streak appeared first on Atlantic Council.

]]>
Will the US crack down on TikTok? Six questions (and expert answers) about the bill in Congress. https://www.atlanticcouncil.org/blogs/new-atlanticist/will-the-us-crack-down-on-tiktok-six-questions-and-expert-answers-about-the-bill-in-congress/ Wed, 13 Mar 2024 23:42:14 +0000 https://www.atlanticcouncil.org/?p=747735 The US House has just passed a bill to force the Chinese company ByteDance to either divest from TikTok or face a ban in the United States.

The post Will the US crack down on TikTok? Six questions (and expert answers) about the bill in Congress. appeared first on Atlantic Council.

]]>
The clock is ticking. On Wednesday, the US House overwhelmingly passed a bill to force the Chinese company ByteDance to divest from TikTok, or else the wildly popular social media app would be banned in the United States. Many lawmakers say the app is a national security threat, but the bill faces an uncertain path in the Senate. Below, our experts address six burning questions about this bill and TikTok at large.

1. What kind of risks does TikTok pose to US national security?

Chinese company ByteDance’s ownership of TikTok poses two specific risks to US national security. One has to do with concerns that the Chinese Communist Party (CCP) could use its influence over the Chinese owners to use TikTok’s algorithm for propaganda purposes. Addressing this security concern is tricky due to legal protections for freedom of expression. The other risk, and the one addressed through the current House legislation, has to do with the ability of the CCP to use Chinese ownership of TikTok to access the massive amount of data that the app collects on its users. This could include data on everything from viewing tastes, to real-time location, to information stored on users’ phones outside of the app, including contact lists and keystrokes that can reveal, for example, passwords and bank activity.

Sarah Bauerle Danzman is a resident senior fellow with the Economic Statecraft Initiative in the Atlantic Council’s GeoEconomics Center.

This debate is not over free speech or access to social media: The question is fundamentally one of whether the United States can or should force a divestment of a social media company from a parent company (in this case ByteDance) if the company can be compelled to act under the direction of the CCP. We have to ask: Does the CCP have the intent or ability to compel data to serve its interests? There is an obvious answer here. We know that China has already collected massive amounts of sensitive data from Americans through efforts such as the Office of Personnel Management hack in 2015. Recent unclassified reports, including from the Office of the Director of National Intelligence, show the skill and intent of China to use personal data for influence. And the CCP has the legal structure in place to compel companies such as ByteDance to comply and cooperate with CCP requests.

Meg Reiss is a nonresident senior fellow at the Scowcroft Strategy Initiative of the Atlantic Council’s Scowcroft Center for Strategy and Security.

2. Are those risks unique to TikTok?

TikTok is not an unproblematic platform, and there are real and significant user risks that could pose dangers to safety and security, especially for certain populations. However, focusing on TikTok ignores broader vulnerabilities in the US information ecosystem that put Americans at risk. An outright ban of TikTok as currently proposed—particularly absent clearer standards for all platforms—would not meaningfully address these broader risks and would in fact potentially undermine US interests in a much more profound way.

As our recent report outlines in detail, a ban is unlikely to achieve the intended effect of meaningfully curbing China’s ability to gather sensitive data on Americans or to conduct influence operations that harm US interests. It also may contribute to a global curbing of the free flow of data that is essential to US tech firms’ ability to innovate and maintain a competitive edge.

Kenton Thibaut is a senior resident China fellow at the Atlantic Council’s Digital Forensic Research Lab.

Some have argued that TikTok, while on the aggressive end of the personal data collection spectrum, collects similar data to what other social media companies collect. However, the US government would counter with two points: First, TikTok has a history of skirting data privacy rules, such as those limiting data collection on children and those that prevent the collection of phone-specific identifiers called MAC numbers, and therefore the company cannot be trusted to handle sensitive personal data in accordance with the law. And second, unlike other popular apps, TikTok is ultimately beholden to Chinese regulations. This includes the 2017 Chinese National Intelligence Law that requires Chinese companies to hand over a broad range of information to the Chinese government if asked. Because China’s legal system is far more opaque than the United States’, it is unclear if the US government or its citizens would even know if the Chinese government ever asked for this data from TikTok. While TikTok’s management has denied supplying the Chinese government with such data, insider reports have uncovered Chinese employees gaining access to US user data. In other words, the US government has little reason to trust that ByteDance is keeping US user data safe from the CCP.

—Sarah Bauerle Danzman

3. What does the House bill actually do?

There are two important, related bills. The one that passed the House today is the Protecting Americans from Foreign Adversary Controlled Applications Act, which forces divestment. It is not an outright ban, and it is intended to address the real risk of ByteDance—thus TikTok—falling under the jurisdiction of China’s 2017 National Intelligence Law, which compels Chinese companies to cooperate with the CCP’s requests. However, divestment doesn’t completely solve for the additional potential risks of the CCP using TikTok in a unique or systemic way for data collection, algorithmic tampering (e.g. what topics surface or don’t surface to users), or information operations (e.g. an influence campaign unique to TikTok as opposed to on other platforms as well). Second, the Protecting Americans’ Data from Foreign Adversaries Act, which cleared a House committee last week, more directly addresses a broader risk of blocking the Chinese government’s access to the type of data that TikTok and many other social media platforms collect on the open market. The former without the latter is an incomplete approach to protecting Americans’ data from the CCP—and even the two combined falls short of a federal data privacy standard.

Graham Brookie is vice president and senior director of the Digital Forensic Research Lab.

There is no question China seeks to influence the American public and harvests large amounts of data on American citizens. As our recent report illuminates however, the Chinese state’s path to these goals depends very little on TikTok.

Today’s actions in the House underscore the disjointed nature of the US approach to governing technology. Rather than focus on TikTok specifically, it would be both legally and geopolitically wiser to pass legislation that sets standards for everyone, and not just one company. That could mean setting standards for what actions or behavior by any social media company would be unacceptable (for example on the use of algorithms or collection and selling of data). Or Congress could focus on prohibiting companies that are owned by states proven to have conducted hostile actions toward US digital infrastructure to operate in the United States. That would certainly include TikTok (and many other companies). This bill takes a halfway approach, both tying itself explicitly to TikTok owner ByteDance and hinting that it could apply to “other social media companies.”

Rose Jackson is the director of the Democracy and Tech Initiative at the Digital Forensic Research Lab.

The recently passed House bill, if it were to become law, would create a pathway to force the divestment of Chinese ownership in TikTok or ban the app from app stores and web hosting sites. Unlike previous attempts by the Trump administration to ban the app outright or force a divestment through the Committee on Foreign Investment in the United States, the Protecting Americans from Foreign Adversary Controlled Applications Act would not just affect TikTok. Instead, the legislation would create a process through which the US government could designate social media apps that are considered to be under the control of foreign adversaries as national security threats. Once identified as threats, the companies would have 180 days to divest from the foreign ownership or be subject to a ban.

—Sarah Bauerle Danzman

4. What would be some of the global ripple effects of a TikTok ban?

The United States has always opposed efforts by authoritarian nations seeking to build “great firewalls” around themselves. This model of “cyber sovereignty” sees the open, interoperable, and free internet as a threat, which is why countries like China already have a well-funded strategy to leverage global governance platforms to drive the development of a less open and more authoritarian-friendly version. A TikTok ban would ironically benefit authoritarian governments as they seek to center state-level action (over multi-stakeholder processes) in internet governance. TikTok should not lead the United States to abandon its longstanding commitment to the values of a free, open, secure, and interoperable internet.

A ban could generate more problems than it would solve. What the United States should consider instead is passing federal privacy laws and transparency standards that apply to all companies. This would be the single most impactful way to address broader system vulnerabilities, protect US values and commitments, and address the unique risks related to TikTok’s Chinese ownership, while avoiding the potential significant downsides of a ban. 

Kenton Thibaut

5. What do you make of TikTok’s response, particularly in pushing its users to flood Capitol Hill with calls?

Members of Congress were rightfully alarmed by TikTok’s use of its platform to send push notifications encouraging users to call their representatives. However, Uber and Lyft used this exact same tactic in California when trying to defeat legislation that would have required it to provide benefits to its drivers. If we try to solve “TikTok” and not the broader issue TikTok is illuminating, we will keep coming back to these same issues over and over again. 

—Rose Jackson

6. How is China viewing this debate?

The CCP has a tendency to throw a lot of spaghetti at the wall in an attempt to make its arguments, in this case that the divestment of TikTok from its Chinese parent company ByteDance is unnecessary. When the CCP has justified the internment of Uyghurs, it has thrown out everything from defending its repression based on terrorist beliefs across the population to claiming that it was just helping with social integration and developing work programs. The CCP has already made claims that the divestment would cause investors to lose faith in the US market and that it shows a fundamental weakness and abuse of national security. Expect many different versions of these arguments and more. But all the anticipated pushback will be focused on diverting the public argument away from the fundamental concern: The Chinese government can, under law, force a Chinese company to share information. 

—Meg Reiss

The post Will the US crack down on TikTok? Six questions (and expert answers) about the bill in Congress. appeared first on Atlantic Council.

]]>
Braw interviewed on The Dark State Podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/braw-interviewed-on-the-dark-state-podcast/ Mon, 11 Mar 2024 16:38:21 +0000 https://www.atlanticcouncil.org/?p=750610 On March 11, Transatlantic Security Initiative senior fellow Elisabeth Braw was invited on The Dark State Podcast to discuss modern espionage tactics.   

The post Braw interviewed on The Dark State Podcast appeared first on Atlantic Council.

]]>

On March 11, Transatlantic Security Initiative senior fellow Elisabeth Braw was invited on The Dark State Podcast to discuss modern espionage tactics.

  

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

The post Braw interviewed on The Dark State Podcast appeared first on Atlantic Council.

]]>
Braw featured in The Week on Russia’s “grey zone” tactics at the Finnish Border https://www.atlanticcouncil.org/insight-impact/in-the-news/braw-featured-in-the-week-on-russias-grey-zone-tactics-at-the-finnish-border/ Wed, 06 Mar 2024 15:24:10 +0000 https://www.atlanticcouncil.org/?p=750368 On March 6, Transatlantic Security Initiative senior fellow Elisabeth Braw was quoted by The Week on Russia’s efforts to smuggle migrants through the Finnish-Russian border.   

The post Braw featured in The Week on Russia’s “grey zone” tactics at the Finnish Border appeared first on Atlantic Council.

]]>

On March 6, Transatlantic Security Initiative senior fellow Elisabeth Braw was quoted by The Week on Russia’s efforts to smuggle migrants through the Finnish-Russian border.

  

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

The post Braw featured in The Week on Russia’s “grey zone” tactics at the Finnish Border appeared first on Atlantic Council.

]]>
Eftimiades on Think JSOU on the China’s espionage methodology https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-on-think-jsou-on-the-chinas-espionage-methodology/ Mon, 04 Mar 2024 16:50:26 +0000 https://www.atlanticcouncil.org/?p=730171 Nicholas Eftimiades discusses the role of intelligence operations in the strategic competition between the United States and China.

The post Eftimiades on Think JSOU on the China’s espionage methodology appeared first on Atlantic Council.

]]>

On February 20, Forward Defense nonresident senior fellow Nicholas Eftimiades was interviewed on Joint Special Operations University’s webinar, Think JSOU. He discussed China’s espionage methodology from his 2020 book, Chinese Espionage Operations and Tactics.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades on Think JSOU on the China’s espionage methodology appeared first on Atlantic Council.

]]>
ACFP featuring Raimondo and Vestager cited in Bloomberg on US security concerns over Chinese EVs https://www.atlanticcouncil.org/insight-impact/in-the-news/acfp-featuring-raimondo-and-vestager-cited-in-bloomberg-on-us-security-concerns-over-chinese-evs/ Fri, 01 Mar 2024 18:07:06 +0000 https://www.atlanticcouncil.org/?p=742756 Read the full article here.

The post ACFP featuring Raimondo and Vestager cited in Bloomberg on US security concerns over Chinese EVs appeared first on Atlantic Council.

]]>
Read the full article here.

The post ACFP featuring Raimondo and Vestager cited in Bloomberg on US security concerns over Chinese EVs appeared first on Atlantic Council.

]]>
Warrick quoted in Brackety-Ack on efforts to impeach DHS Secretary https://www.atlanticcouncil.org/insight-impact/in-the-news/warrick-quoted-in-brackety-ack-on-efforts-to-impeach-dhs-secretary/ Wed, 28 Feb 2024 16:34:08 +0000 https://www.atlanticcouncil.org/?p=740150 The post Warrick quoted in Brackety-Ack on efforts to impeach DHS Secretary appeared first on Atlantic Council.

]]>

The post Warrick quoted in Brackety-Ack on efforts to impeach DHS Secretary appeared first on Atlantic Council.

]]>
Braw featured in Politico on espionage in Europe https://www.atlanticcouncil.org/insight-impact/in-the-news/braw-featured-in-politico-on-espionage-in-europe/ Tue, 27 Feb 2024 22:15:01 +0000 https://www.atlanticcouncil.org/?p=741978 On February 27, Transatlantic Security Initiative senior fellow Elisabeth Braw wrote an opinion piece in Politico discussing the changes in espionage tactics by authoritarian regimes.   

The post Braw featured in Politico on espionage in Europe appeared first on Atlantic Council.

]]>

On February 27, Transatlantic Security Initiative senior fellow Elisabeth Braw wrote an opinion piece in Politico discussing the changes in espionage tactics by authoritarian regimes.

  

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

The post Braw featured in Politico on espionage in Europe appeared first on Atlantic Council.

]]>
Dean quoted in the Sydney Morning Herald on Australian defense budget https://www.atlanticcouncil.org/insight-impact/in-the-news/dean-quoted-in-the-sydney-morning-herald-on-australian-defense-budget/ Fri, 23 Feb 2024 20:43:18 +0000 https://www.atlanticcouncil.org/?p=743951 On February 22, IPSI nonresident senior fellow Peter Dean was quoted in the Sydney Morning Herald, describing the lack of an Australian defense budget increase as a “political own goal.”

The post Dean quoted in the Sydney Morning Herald on Australian defense budget appeared first on Atlantic Council.

]]>

On February 22, IPSI nonresident senior fellow Peter Dean was quoted in the Sydney Morning Herald, describing the lack of an Australian defense budget increase as a “political own goal.”

The post Dean quoted in the Sydney Morning Herald on Australian defense budget appeared first on Atlantic Council.

]]>
Lipner quoted in The Wall Street Journal on a potential entity to govern Palestinian society https://www.atlanticcouncil.org/insight-impact/in-the-news/lipner-quoted-in-the-wall-street-journal-on-a-potential-entity-to-govern-palestinian-society/ Thu, 22 Feb 2024 21:26:00 +0000 https://www.atlanticcouncil.org/?p=732873 The post Lipner quoted in The Wall Street Journal on a potential entity to govern Palestinian society appeared first on Atlantic Council.

]]>

The post Lipner quoted in The Wall Street Journal on a potential entity to govern Palestinian society appeared first on Atlantic Council.

]]>
Panikoff quoted in Nameh News on Middle East escalation https://www.atlanticcouncil.org/insight-impact/in-the-news/panikoff-quoted-in-nameh-news-on-middle-east-escalation/ Thu, 22 Feb 2024 21:11:01 +0000 https://www.atlanticcouncil.org/?p=732351 The post Panikoff quoted in Nameh News on Middle East escalation appeared first on Atlantic Council.

]]>

The post Panikoff quoted in Nameh News on Middle East escalation appeared first on Atlantic Council.

]]>
Experts react: What to know about Russia’s apparent plans for a space-based nuclear weapon https://www.atlanticcouncil.org/blogs/new-atlanticist/experts-react-what-to-know-about-russias-apparent-plans-for-a-space-based-nuclear-weapon/ Thu, 15 Feb 2024 22:59:16 +0000 https://www.atlanticcouncil.org/?p=736546 Reports that Russia is developing a space-based nuclear anti-satellite weapon have raised national security concerns in Washington.

The post Experts react: What to know about Russia’s apparent plans for a space-based nuclear weapon appeared first on Atlantic Council.

]]>
Is this a Sputnuke moment? Russia is reportedly developing a space-based nuclear anti-satellite weapon. The news broke on Wednesday after House Intelligence Committee Chair Mike Turner released a cryptic statement on social media urging US President Joe Biden to declassify information about a “serious national security threat.” A White House spokesperson said on Thursday that the Russian system, which is not yet in orbit, does not pose a direct threat of “physical destruction” on Earth. However, it has raised new fears about the possibility of Russia destroying critical US satellites and an arms race in space. Atlantic Council experts will share their insights on the developments in three . . . two . . . one . . .

Click to jump to an expert analysis:

Clementine G. Starling: Russia can already detonate nuclear weapons in space from Earth

Robert M. Soofer: The US needs to modernize its nuclear and space forces

Mark J. Massa: Russia has been experimenting with “exotic” nuclear weapons

Thomas Warrick: Three possible reasons why Turner drew attention to this threat

Jacob Mezey: Russia’s nuclear recklessness in space might spur China and the US to work together


Russia can already detonate nuclear weapons in space from Earth

A nuclear-powered Russian satellite is potentially less alarming than a nuclear-armed satellite, since it would neither be norm-shattering nor give Russia the ability to degrade a large swath of all satellites on orbit in one fell swoop.

Because Russia can already detonate nuclear weapons in space from Earth, a new nuclear-armed anti-satellite weapon (ASAT) likely would not give Moscow significant new military capability, even though it remains concerning. While a nuclear-armed ASAT would advance Russian counterspace capabilities, challenge US space strategy, undermine norms, and alarm allies, it does not appear to add a qualitatively different capability to the Russian arsenal.

Clementine G. Starling is the director of the Atlantic Council’s Forward Defense program and a resident fellow within the Scowcroft Center for Strategy and Security. Read more from Starling on this issue here.


The US needs to modernize its nuclear and space forces

This report, if true, should come as no surprise to the US government, which has been tracking Russian and Chinese anti-satellite capabilities for some years now, including ground- or space-based high-powered lasers. Presumably, armed with this awareness, the Department of Defense is taking appropriate measures to counter this threat. The key to successful nuclear deterrence is a survivable nuclear retaliatory force, including nuclear command and control—these are priorities for the US Department of Defense.

This situation is reminiscent of Russia’s development of transcontinental underwater nuclear torpedoes and nuclear-powered/nuclear-armed cruise missiles; these “novel” nuclear systems do not add appreciably to Russia’s existing capabilities to threaten the United States. Then why does Russian President Vladimir Putin field them? Perhaps it’s to shore up his domestic base or divert global attention from a failing state. Regardless, the US response must be to continue to modernize its nuclear—and space—forces to ensure that no combination of adversaries could ever contemplate a successful disarming first strike against the United States. It’s a good sign that Congress is concerned about these matters—it will have an opportunity to understand the US response as the congressional hearing season unfolds.

Robert M. Soofer is a senior fellow in the Forward Defense practice of the Atlantic Council’s Scowcroft Center for Strategy and Security, where he leads its Nuclear Strategy Project. He was deputy assistant secretary of defense for nuclear and missile defense policy from April 2017 to January 2021. 


Russia has been experimenting with “exotic” nuclear weapons

In recent years, Russia has announced the development of several new so-called “exotic” nuclear weapons—including a nuclear-powered, nuclear-armed cruise missile and submarine drone—which Western analysts have found challenging to understand. While there are plausible ways in which a nuclear-armed ASAT could be more effective than a nuclear detonation in space delivered by an intercontinental ballistic missile, such a development may be more similar in practical effect to the rest of this class of exotic nuclear weapons.

Mark J. Massa is a deputy director in the Forward Defense practice of the Scowcroft Center for Strategy and Security at the Atlantic Council. Read more from Massa on this issue here.

New Atlanticist

Feb 15, 2024

Russian nuclear anti-satellite weapons would require a firm US response, not hysteria

By Clementine G. Starling-Daniels, Mark J. Massa

If fielded, such weapons would directly challenge norms of responsible behavior in space and present a serious risk to all nations’ satellites.

Arms Control Russia

Three possible reasons why Turner drew attention to this threat

House Intelligence Committee Chair Mike Turner’s request to declassify intelligence on a new Russian capability was striking because of Turner’s reputation for being serious about national security and the protection of intelligence sources and methods. I think that Turner was trying to win a trifecta—and he deserves the win.

First, national security Democrats and Republicans have been trying for months to get Congress to renew a crucial legal authority for foreign intelligence collection under section 702 of the Foreign Intelligence Surveillance Act (FISA). Jon Darby and I have described section 702  as “the most timely, impactful, and cost-effective authority to obtain foreign intelligence on terrorists, spies, weapons proliferators, cyber attackers, and nation-states that pose threats to the United States and our allies.” Reasonable reforms of the current law are entirely justified, but an unlikely alliance of progressive Democrats and pro-Donald Trump Republicans have tried to restrict the US intelligence community’s ability to use information collected under 702. A crucial vote scheduled for this week looked to go sideways, causing House leadership to pause the vote. Turner’s disclosure that this important new threat was revealed by intelligence collected under section 702’s authority should warn hesitant House members that the country’s security absolutely depends on renewing section 702.

The second potential motive for declassification has a good, if unorthodox, reason behind it. Normally, interested House members read and are briefed on threats by coming to the Intelligence Committee’s special rooms for reviewing highly classified intelligence—which, for security reasons, are a little out of the way of the routes most House members walk during their workday. Not all House members take this responsibility seriously enough. Declassifying this information will force all House members to confront the reality of this threat and may motivate them to go read the full, classified intelligence and vote accordingly.

The third reason—getting House members to realize that Russia is a threat to our national security and that they should support our allies and partners, including Ukraine—is an obvious reason, as well.

I think Turner is three for three. The Biden administration should support his request and declassify as much of the information as it can.

Thomas S. Warrick is the director of the Future of DHS project at the Scowcroft Center for Strategy and Security’s Forward Defense practice and a nonresident senior fellow and the Scowcroft Middle East Security Initiative at the Atlantic Council.


Russia’s nuclear recklessness in space might spur China and the US to work together

National security wonks in Washington are buzzing after reports that Russia is developing a nuclear system in space for anti-satellite purposes. It is currently unclear whether the system is armed with a nuclear warhead to directly destroy satellites or if it is instead powered by a nuclear reactor for electronic warfare purposes. However, if the system is nuclear-armed, it is worth understanding what the physical effects of such a nuclear explosion in space would be and how the world might respond. If Russia detonated such a weapon, it could damage the vast majority of commercial and military satellites in orbit. Upon detonation, high-energy x-rays would destroy the electronics of all satellites not obscured by the Earth, likely knocking out the Global Positioning System (GPS). In the following weeks, charged particles generated by the blast would be trapped by the Earth’s natural radiation belts and spread around the globe, damaging all satellites except those with a high degree of radiation shielding. When the United States detonated a nuclear weapon at high-altitude in the Starfish Prime test of 1962 a third of all satellites in orbit were eventually destroyed by this effect. In 1962, there were just 24 satellites in orbit. Today there are more than seven thousand.

Given the potential crippling outcome to the global economy and to militaries, this issue should be of utmost priority to the entire world. The United States should clarify whether the weapon is, in fact, nuclear-armed. If so, international pressure, especially from China, would be critical to preventing Russia from deploying the system in space. China operates the second-most satellites of any country and might find common ground with the United States in stopping this threat. If Russia deployed the weapon in space, deterring its use in a major crisis would be difficult since the United States could not threaten to respond in-kind. Therefore, the only alternative would be planning to shoot down the system before it detonated. 

While the United States does not officially possess or have plans to develop an anti-satellite capability, it has demonstrated the ability of an SM-3 missile to target satellites in low-Earth orbit. Such an event could spark an unlikely alliance, since China has tested anti-satellite capabilities and might be willing to cooperate given the threat to its ambitions in space. Regardless of whether this Russian system is indeed a nuclear weapon, this revelation could be good for US-China relations at a time when officials are attempting to jump-start arms control talks. Preserving peaceful access to space could help pave the way for broader discussions on strategic stability.

Jacob Mezey is a program assistant in the Forward Defense practice of the Atlantic Council’s Scowcroft Center for Strategy and Security. He contributes to the program’s research on nuclear security, space security, defense innovation and modernization, and gray zone conflict.


The post Experts react: What to know about Russia’s apparent plans for a space-based nuclear weapon appeared first on Atlantic Council.

]]>
President Zelenskyy’s dual citizenship proposal presents wartime dilemmas https://www.atlanticcouncil.org/blogs/ukrainealert/president-zelenskyys-dual-citizenship-proposal-presents-wartime-dilemmas/ Thu, 08 Feb 2024 21:24:32 +0000 https://www.atlanticcouncil.org/?p=734724 President Zelenskyy's recent proposal to allow dual citizenship is a potentially popular but impractical measure in the current wartime conditions, writes Mark Temnycky.

The post President Zelenskyy’s dual citizenship proposal presents wartime dilemmas appeared first on Atlantic Council.

]]>
Ukrainian President Volodymyr Zelenskyy marked the country’s recent Unity Day holiday on January 22 by thanking Ukrainians around the world for their wartime support and calling for changes to the Ukrainian Constitution that would allow for dual citizenship. Zelenskyy confirmed he was submitting the relevant legislative proposal to the Ukrainian Parliament.

If passed, the bill would allow Ukrainians to hold more than one citizenship. This would have significant implications for Ukraine itself and for the large international Ukrainian diaspora. According to the Ukrainian World Congress, the Ukrainian diaspora currently numbers around 20 million people. Most would potentially be eligible for Ukrainian citizenship. Restrictions on dual citizenship have previously deterred many members of the diaspora from applying for Ukrainian passports.

Zelenskyy’s proposal has been welcomed by many within the Ukrainian diaspora. If adopted, it could help strengthen ties between Ukraine itself and the global Ukrainian community, while granting diaspora members an opportunity to have a greater say in Ukraine’s development. It would make it far easier to visit Ukraine and open a business, purchase property, or otherwise invest in the country, while also providing diaspora Ukrainians with the chance to vote in elections or even run for office themselves.

For existing Ukrainian citizens, acquiring a second passport would potentially open multiple doors in terms of travel, work, and study. Ukrainians have enjoyed visa-free access to the European Union’s Schengen Zone for limited time periods since 2017, and have also benefited from a range of measures to ease border restrictions since the start of Russia’s full-scale invasion. Nevertheless, the prospect of holding an EU, US, or other Western passport would certainly appeal to many.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

While there is likely to be considerable public support for Zelenskyy’s dual citizenship proposal, any attempt at implementation in today’s wartime environment could prove highly problematic. Crucially, it remains far from clear what the initiative would mean for military service.

With Russia’s full-scale invasion of Ukraine now approaching the two-year mark, most analysts believe the conflict has evolved into a war of attrition. With its far larger population, economy, and industrial base, this places Russia at a considerable advantage. The Russian military has also demonstrated a striking disregard for heavy losses in Ukraine, repeatedly employing so-called “human wave” or “meat assault” tactics to overwhelm Ukrainian defenses by sheer weight of numbers.

Ukraine cannot afford to accept such high casualty rates. The country has a far smaller pool of military-age men to draw from, and has already experienced a major decline in population as a direct result of Russia’s invasion. Current martial law restrictions mean most Ukrainian males eligible for military service are not permitted to exit the country. However, if changes to the Ukrainian Constitution made it possible to apply for a second citizenship, opportunities may arise for Ukrainian citizens to use newly acquired passports in order to leave Ukraine and avoid conscription.

Meanwhile, a relaxation in Ukraine’s dual citizenship restrictions could also potentially result in members of the Ukrainian diaspora who took Ukrainian passports becoming eligible for military service. Any uncertainty over the status of new passport holders with regard to conscription would be likely to deter many from applying.

The issue of military service is currently high on the Ukrainian wartime agenda amid debate over how best to bolster the depleted ranks of the army. A recent proposal by Ukraine’s military chiefs to conscript up to 500,000 civilians has met with a mixed reaction in Kyiv, with Zelenskyy refusing to offer his public support and instead calling for further details before making a decision.

Differences of opinion over the correct approach toward mobilization are believed to have contributed to mounting tensions between Ukraine’s civilian and military leadership. This was widely cited as a contributing factor behind Zelenskyy’s February 8 decision to replace Ukraine’s top general, Valery Zaluzhny. Any constitutional changes to introduce dual citizenship would further complicate an already challenging and politically sensitive situation.

President Zelenskyy’s proposal to enshrine the right to dual citizenship in the Ukrainian Constitution reflects growing awareness of the important role played by the global Ukrainian diaspora. If implemented, it would probably prove a popular measure that would significantly increase the number of Ukrainian passport holders and provide millions more people with a stake in the country’s future. However, there are a number of practical reasons why progress on this issue remains unlikely in the current wartime conditions.

Mark Temnycky is a nonresident fellow at the Atlantic Council’s Eurasia Center. 

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post President Zelenskyy’s dual citizenship proposal presents wartime dilemmas appeared first on Atlantic Council.

]]>
Hinata-Yamaguchi quoted in the Japan Times on Japan’s defense upgrades https://www.atlanticcouncil.org/insight-impact/in-the-news/hinata-yamaguchi-quoted-in-the-japan-times-on-japans-defense-upgrades/ Mon, 05 Feb 2024 19:34:34 +0000 https://www.atlanticcouncil.org/?p=735092 On February 2, IPSI nonresident senior fellow Ryo Hinata-Yamaguchi was quoted in an article by the Japan Times, discussing Japan’s efforts to build up its defense and deterrence against simultaneous threats from China, North Korea, and Russia. 

The post Hinata-Yamaguchi quoted in the Japan Times on Japan’s defense upgrades appeared first on Atlantic Council.

]]>

On February 2, IPSI nonresident senior fellow Ryo Hinata-Yamaguchi was quoted in an article by the Japan Times, discussing Japan’s efforts to build up its defense and deterrence against simultaneous threats from China, North Korea, and Russia. 

The post Hinata-Yamaguchi quoted in the Japan Times on Japan’s defense upgrades appeared first on Atlantic Council.

]]>
Kroenig on BBC News on how the US should respond to Iran-backed attack https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-on-bbc-news-on-how-the-us-should-respond-to-iran-backed-attack/ Mon, 05 Feb 2024 14:33:56 +0000 https://www.atlanticcouncil.org/?p=732347 On February 2, Matthew Kroenig, vice president and senior director of the Scowcroft Center, appeared on BBC News to discuss how the United States should respond to the recent attack by Iran-affiliated forces that killed 3 US service members in Jordan.

The post Kroenig on BBC News on how the US should respond to Iran-backed attack appeared first on Atlantic Council.

]]>

On February 2, Matthew Kroenig, vice president and senior director of the Scowcroft Center, appeared on BBC News to discuss how the United States should respond to the recent attack by Iran-affiliated forces that killed 3 US service members in Jordan.

If the [US] response is too weak, Iran will essentially conclude that it got away with this attack and that it can continue to attack US forces and bases in the region, so it needs to be strong enough that Iran decides that this isn’t worth it.

Matthew Kroenig

The post Kroenig on BBC News on how the US should respond to Iran-backed attack appeared first on Atlantic Council.

]]>
Michta in City Journal and RealClearWorld on how the United States can achieve national renewal https://www.atlanticcouncil.org/insight-impact/in-the-news/michta-in-city-journal-on-how-the-united-states-can-achieve-national-renewal/ Fri, 02 Feb 2024 20:59:32 +0000 https://www.atlanticcouncil.org/?p=732290 On February 1, Andrew Michta, director and senior fellow in the Scowcroft Strategy Initiative, was published in City Journal and RealClearWorld on how the United States can revitalize itself. He argues that US leaders must consider how each of their decisions will help American citizens, bring to an end the ideological polarization dividing the country, […]

The post Michta in City Journal and RealClearWorld on how the United States can achieve national renewal appeared first on Atlantic Council.

]]>

On February 1, Andrew Michta, director and senior fellow in the Scowcroft Strategy Initiative, was published in City Journal and RealClearWorld on how the United States can revitalize itself. He argues that US leaders must consider how each of their decisions will help American citizens, bring to an end the ideological polarization dividing the country, and reevaluate foreign and national security policies.

In foreign and security policy, a strategy that prioritizes national interests and matches those with national power—both our own and our allies’—will deter and, if necessary, defeat our adversaries.

The post Michta in City Journal and RealClearWorld on how the United States can achieve national renewal appeared first on Atlantic Council.

]]>
Requirements for nuclear deterrence and arms control in a two-nuclear-peer environment https://www.atlanticcouncil.org/in-depth-research-reports/report/requirements-for-nuclear-deterrence-and-arms-control-in-a-two-peer-nuclear-peer-environment/ Fri, 02 Feb 2024 17:24:28 +0000 https://www.atlanticcouncil.org/?p=712241 Gregory Weaver and Amy Woolf discuss the future of US nuclear posture and arms control, as the United States will soon face two adversaries with peer nuclear arsenals.

The post Requirements for nuclear deterrence and arms control in a two-nuclear-peer environment appeared first on Atlantic Council.

]]>

Table of contents

Foreword

I. US deterrence requirements in the coming two-nuclear peer threat

II. Arms control opportunities in the emerging near-nuclear peer environment

Series conclusion

About the authors

The views expressed in these papers are those of the authors alone and do not necessarily reflect the official positions of the US government, the Department of Defense, the Department of Energy, the National Nuclear Security Administration, Los Alamos National Laboratory, or any other entity.

Foreword

After decades of seeking to reduce the role of nuclear weapons in international relations, the United States is now grappling with a global landscape marked by intense strategic competition and the growing salience of nuclear weapons—problems that will likely persist for years to come. Over the past year, Russia compounded its aggression in Ukraine with nuclear saber-rattling, modernizing and expanding its nuclear forces over the past decade. Furthermore, Russia’s possession of a substantial inventory of theater nuclear weapons continues to threaten regional deterrence. Meanwhile, in Asia, Beijing is pursuing an unprecedented surge in its nuclear capabilities. If current trends persist, China is projected to possess about 1,500 nuclear warheads by 2035.1 While China was once viewed as a secondary nuclear power, its substantial investment in its nuclear arsenal—including the launch of a third ballistic missile early-warning satellite in 2022 and advancements in land-based ballistic missiles, aircraft, submarines, and hypersonic missiles—positions China to become a near-equal nuclear power in the coming decade. These trends mark a historic shift. For the first time in its history, the United States must face two near-peer nuclear competitors simultaneously.

At the same time, Russia’s suspension of its compliance with the New START agreement in 2023 has significantly weakened the last strategic arms control framework established in the Cold War and post-Cold War eras. This move leaves scant provisions governing the future of nuclear capabilities among the United States and its adversaries. For over half a century, Washington and Moscow negotiated to establish treaties that imposed limits on their nuclear arsenals, aiming to manage their nuclear rivalry and mitigate the risk of nuclear conflict. This process served the national security interests of both sides by curbing weapons and activities that could jeopardize deterrence, safeguarding strategic stability, offering insights into nuclear capacities, and potentially steering military competition toward less perilous avenues. However, shifts in the global security landscape have altered this calculus. The Russian Federation, much like the Soviet Union before it, has insisted that future agreements factor in the nuclear capabilities of Britain and France. On the other hand, the United States now confronts a security environment featuring two nuclear-armed adversaries—Russia and China—whose forces will potentially pose significant threats to the United States and its allies.

This evolving security landscape may prompt the United States to reevaluate its assessments of its deterrence and arms control requirements. But how should the United States approach this problem?

The papers below address the intricate challenge of maintaining nuclear deterrence through force structure and arms control requirements. They offer insights into these complex issues, each informed by two workshops attended by both technical and policy experts in the spring and summer of 2023, all supported by Los Alamos National Laboratory. The first paper, authored by Greg Weaver, examines the future of force requirements in this two-peer nuclear environment, arguing that the United States must reexamine its force structure to effectively deter China and Russia simultaneously. Weaver outlines the deterrence requirements for deterring both large-scale nuclear and conventional aggression and limited nuclear attack in a two-peer environment, and concludes that the United States may require a larger arsenal of deployed nuclear warheads than the 1,550 allowed by the New START Treaty, along with additional delivery systems like a nuclear-armed, sea-launched cruise missile, to effectively deter conflicts with both China and Russia simultaneously.

The second paper, authored by Amy Woolf, addresses the future of arms control by examining the future utility of stability dialogues and risk-reduction measures, instead of numerically binding treaties. Woolf finds that although stability discussions and measures for risk reduction could assist these three nations in lowering the likelihood of nuclear employment, they are unlikely to engage in negotiations for treaties or agreements that impose restrictions on the scale of their nuclear capabilities or provide insight into their plans. Together, this series will provide preliminary lessons and recommendations for the future of deterrence and arms control as the United States determines how to respond to this two-peer environment.

Whether or not one finds the specific proposals offered by each author compelling, it is clear that US and allied policy must be composed of both deterrence and arms control options. Since the 1970s, each major US nuclear modernization program has been accompanied by an arms control proposal, and each nuclear arms control treaty has been backed by tangible capabilities.

Robert Soofer, PhD
Senior Fellow, Forward Defense
Scowcroft Center for Strategy and Security
Atlantic Council

William Tobey, MPP
Director, Office of National
Security and International Studies
Los Alamos National Laboratory

Part I: US deterrence requirements in the coming two-nuclear-peer threat environment

Introduction

A large-scale nuclear attack on the US homeland poses the only existential military threat to the United States. The nation relies on nuclear deterrence to prevent this threat. This makes nuclear deterrence the highest priority mission of the US military and the foundation of US national security strategy. If the nation fails at this mission, no other mission matters.2

US nuclear deterrence strategy and practice have arguably prevented nuclear war and contributed to preventing large-scale conventional war between nuclear-armed states as well. While correlation is not causation, the absence of nuclear or large-scale war between major powers since 1945 is difficult to explain without considering the role of nuclear deterrence in general, and US nuclear deterrence in particular.

However, the strategic circumstances in which US nuclear deterrence strategy and practice have operated are changing rapidly. Throughout the nuclear age, the United States designed its nuclear deterrence strategy, and shaped and sized its nuclear forces, to address the Russian nuclear threat, treating other nuclear adversaries (i.e., from China and North Korea) as “lesser included threats.” A US nuclear force structured and sized to address Russia had sufficient capability to address the lesser included threats as well, even after a nuclear war with Russia.

China, however, is deliberately and rapidly changing this equation, building up its nuclear forces on a scale and at a pace not seen since the US-Soviet arms race of the 1960s and 1970s. But, unlike during the Cold War, China is the only one racing in the US-China nuclear relationship. Declassified US intelligence assessments state that China’s nuclear stockpile will reach rough quantitative parity with currently planned US-deployed nuclear warheads by the mid-2030s (e.g., approximately 1,500 weapons by 2035), if China continues on its current trajectory.3 Should this assessment prove accurate, this means the United States will face two peer nuclear adversaries for the first time in the nuclear age in just over a decade.4

A Chinese DF-5B ICBM following the 2015 China Victory Day parade. Credit: Wikimedia user IceUnshattered.

This paper examines how US deterrence requirements will be affected by this coming two-nuclear-peer threat environment. First, it lays out four key assumptions which undergird the analysis. Second, it examines the complex nature of the future two-peer threat. Third, it identifies the critical US deterrence objectives in that two-peer environment. Finally, it examines what will be required to achieve those objectives.

Key assumptions

This analysis makes four assumptions regarding the two-nucle­ar-peer deterrence problem:

  1. In the two-nuclear-peer environment, deterrence will continue to be a function of decisively influencing an adversary leadership’s decision calculus by affecting its assessment of the benefits and costs of taking the action one seeks to deter, and of the benefits and costs of continued restraint from taking that action. The way deterrence works will not change.
  2. Deterring aggression and escalation is based on affecting an adversary’s assessment of the likely outcome of such military actions. Thus, while other factors contribute to deterrence, the perceived ability to fight and win a conflict below the level of large-scale nuclear exchanges is critical to deterrence success. Warfighting capability matters.5
  3. No major power can achieve a measure of nuclear superiority sufficient to win a large-scale nuclear war without sustaining existential-level damage against technically sophisticated and well-resourced major-power adversaries. In a conflict between nuclear-armed major powers, mutually assured destruction is a condition, not a strategy.
  4. While North Korea’s nuclear forces will continue to grow, they will not expand sufficiently to prevent US strategy from treating North Korea as a lesser included case of the Russia-China nuclear threat.

China is rapidly becoming a nuclear peer

China’s rapid nuclear buildup is comprehensive, including both stra­tegic and theater-range forces and the addition of an array of new capabilities. China is fielding a triad of strategic nuclear delivery systems, adopting a launch under attack (LUA) posture for its inter­continental ballistic missile (ICBM) force, and has tested potentially destabilizing new intercontinental range systems (e.g., fractional or multiple orbital bombardment systems [FOBS/MOBS] that could threaten a potentially unwarned preemptive attack on the United States). For the first time, China is developing survivable theater nuclear forces capable of conducting low-yield precision strikes on US and allied/partner forces and infrastructure across East Asia.

Whether China is pursuing nuclear parity with or superiority over the United States is unclear. It also is unclear why Chinese leadership is doing so. China may have decided to change the role of nuclear weapons in its national security strategy by adopting an expanded theater nuclear war-fighting role and/or a counterforce role against US nuclear forces backed by national missile defenses. The force that China is building is not necessary to enable its traditional minimum deterrence/“no first use” strategy.6

Neither a change in Chinese nuclear strategy nor the larger and more diverse Chinese nuclear force to implement it were envisioned when the US nuclear modernization program was designed.7

China is also rapidly modernizing and expanding its conventional forces, which pose an increasing threat to US forces and allies/partners in Asia. By the 2030s, China’s conventional military buildup could flip the conventional military balance in Asia. This potential conventional imbalance could undermine deterrence of Chinese aggression by itself, but the impact would be exacerbated if China were contemplating either opportunistic aggression in the context of an already ongoing theater conflict between Russia and NATO, or collaborative Chinese-Russian aggression in both theaters.

Finally, China is rapidly fielding new nonnuclear strategic capabili­ties in space and cyberspace. These capabilities have the potential to deny or diminish US conventional forces’ ability to project power effectively, and possibly threaten US nuclear command and control.

The RT-2PM2, also known as the Topol-M, is a Russian intercontinental ballistic missile that entered service in the 1990s. Credit: Wikipedia User Stanislav Kozlovskiy

The Russian threat post-Ukraine

Even following its costly invasion of Ukraine, Russia remains a nuclear peer of the United States, one which may engage in further conventional aggression and nuclear coercion or use in the future. Russia has the largest deployed nuclear force of any state today. This is likely to remain true through 2035. Russia continues to expand its theater nuclear forces, increasing its existing advantage over NATO.

Russian strategy and doctrine envision limited first use of theater nuclear weapons to coerce war termination on terms acceptable to Russia if losing a conventional war, and larger scale use of theater nuclear forces to defeat NATO conventional forces, if coercive nuclear use fails. Russian strategy relies on strategic nuclear forces to deter a large-scale US nuclear response against the Russian homeland while Russia escalates to limited nuclear war in theater. Thus, Russian strategy indicates the Russian leadership believes that limited nuclear use is unlikely to escalate out of control.8

Russia’s invasion of Ukraine demonstrates both a propensity to take risk and to miscalculate while doing so, which makes Russian oppor­tunistic or collaborative aggression against NATO states on its pe­riphery a serious threat despite the dismal performance of Russian conventional forces in Ukraine. Those forces’ performance is likely to increase Russian reliance on nuclear weapons, increasing the probability of Russian limited nuclear first use early in a conflict with NATO. Reconstituted Russian conventional forces, while inferior to fully reinforced NATO forces, will continue to have a space/time advantage against NATO states on Russia’s periphery, potentially enabling them to occupy such states’ territory in a fait d’accompli before NATO forces can mobilize in their defense. The Russians might then threaten limited nuclear escalation to deter or defeat a NATO counteroffensive to restore the territorial status quo ante. Russia also continues to expand its space, cyber, and conventional deep precision strike capabilities to deny NATO forces critical enablers and to derive coercive leverage from threats to NATO critical infrastructure.

The unique nature of the two-nuclear-peer threat

If China’s nuclear buildup continues on its current trajectory, the United States will face two nuclear-peer adversaries for the first time in the mid-2030s. Russia and China will together pose an unprecedented threat to US defense strategy. The United States has yet to even substantively grapple with the implications of this two-nuclear-peer threat, much less effectively address it.

Facing China alone as a nuclear peer will alter the strategic land­scape in the Asia-Pacific region. But the Russian-Chinese “friendship without limits” will pose qualitatively new threats of opportunis­tic or cooperative two-theater aggression.

Neither the 2018 US National Defense Strategy (NDS) nor the 2022 NDS adequately address this threat. As noted in the 2018 Commis­sion on the National Defense Strategy’s assessment of the 2018 NDS:


The Department has largely abandoned the longstanding “two war” construct for a “one major war” sizing and shaping construct. In the event of large-scale conflict with Russia or China, the United States may not have suf­ficient remaining resources to deter other adversaries in one—let alone two—other theaters by denying them the ability to accomplish their objectives without relying on nuclear weapons.

National Defense Strategy Commission, Providing for the Common Defense: The Assessments and Recommendations of the National Defense Strategy Commission, November 13, 2018, 20.

The 2022 NDS also adopts a “one major war” sizing construct. And while both the 2022 NDS and the 2022 Nuclear Posture Review hint at reliance on US nuclear forces to deter opportunistic aggression by a second nuclear peer, neither document advocates for the US conventional and nuclear forces that will be required to do so when facing two nuclear peers in the mid-2030s.9

Failing to address this problem has the potential to undermine de­terrence, especially deterrence of opportunistic aggression in a second theater or collaborative Russian and Chinese aggression in Europe and Asia simultaneously. Failing to address these threats because some deem them improbable will have the perverse effect of making them more likely.10

In this broader strategic context, facing a second nuclear peer pos­es several unique challenges to US nuclear strategy, force posture, and force structure.

A Chinese nuclear peer creates new first-strike threats that the Unit­ed States must address to preserve sufficient assured second-strike capability to enable US deterrence strategy. The first new threat is a China-only preemptive counterforce strike on US nuclear forces. The much larger and more capable Chinese nuclear force of the mid-2030s will almost certainly include multiple warhead ICBMs with sufficient accuracy to destroy the US ICBM force, augmented by Chinese counter-space and cyber capabilities, potentially capable of denying the launch warning necessary to enable a US LUA option to preserve ICBM survivability. Chinese nuclear forces may also include FOBS/MOBS capable of conducting a strike on US national leadership and nuclear command and control and warning systems with little to no warning. Finally, China’s intense interest in artificial intelligence (AI), quantum computing, and autonomous sys­tems research might lead to unexpected breakthroughs in antisubmarine warfare (ASW) that could pose a threat to US ballistic missile submarines (SSBNs).

An LGM-30 Minuteman III, a US ICBM, is launched as part of a test at Vandenberg Air Force Base, California. Credit: US Air Force

A Chinese nuclear peer also creates the potential for a collaborative preemptive counterforce strike by China and Russia simultaneously. This scenario not only significantly increases the number of nuclear weapons the United States might face in a first strike on its nuclear forces, but also combines the most threatening features of future Russian and Chinese nuclear capabilities in all relevant domains. Given current capabilities, the potential increase in threat numbers alone is unlikely to increase the first-strike threat to US nuclear forces significantly, because both Russia and China will independently have sufficient forces to target everything that is currently targetable. But, should there be a breakthrough in ASW that allows small-area (but not precise) geolocation of SSBNs at sea, then barrage attacks requiring larger numbers of weapons could become a relevant threat to the most survivable portion of the US nuclear deterrent.

The growth in Chinese nuclear forces also significantly increases the number of nuclear counterforce targets for US forces to potentially hold at risk to either deter aggression and escalation and/or to achieve other US objectives if deterrence fails.11

These collective challenges posed by the future two-peer threat environment have important impacts on US future deterrence and assurance requirements.

A Patriot M903 launcher station at Eielson Air Force Base in Alaska. Credit: Senior Airman Joseph P. LeVeille, US Air Force

Determining US deterrence requirements for the two-nucle­ar-peer environment

To determine US deterrence requirements for the two-nuclear-peer environment one must identify whom we seek to deter from doing what under what conditions. The United States (and its allies and partners) must be able to achieve the following deterrence objectives against China and Russia:

  • Deter large-scale conventional aggression.
  • Deter limited nuclear escalation.
  • Deter large-scale nuclear attack.

Regarding the circumstances in which those objectives must be achieved, the United States (and its allies and partners) must be able to do so in three basic scenarios:

  • Deter either adversary alone.
  • Deter opportunistic aggression by one adversary while already at war against the other.
  • Deter simultaneous collaborative aggression by both adversaries.

US strategy for achieving these deterrence objectives must be tailored to decisively influence the unique decision calculus of Chinese leaders and of Russian leaders. This requires a strategy and supporting force structure and posture that can credibly defeat their respective “theories of victory” by denying them their objectives and imposing costs that far exceed what benefits they can achieve through aggression or escalation.

Deterring large-scale conventional aggression

Deterring conventional aggression by Russia or China individually is conceptually simple but operationally complex. The United States and its allies and partners must be perceived by Moscow or Beijing as willing and capable of fighting and winning a large-scale conventional conflict. This requires conventional military superiority applied in a way that defeats the adversary’s strategy.

But there is an additional element required to deter large-scale conventional aggression by a nuclear peer adversary: one must also convince such an adversary that it cannot escalate its way out of failed conventional aggression through nuclear means to force war termination on terms either favorable or acceptable to the adversary. Thus, the second deterrence objective of deterring limited nuclear escalation contributes directly to achieving the first deterrence objective as well.

But what about deterring opportunistic or collaborative large-scale conventional aggression? This is a much tougher challenge, requiring US, allied, and partner conventional superiority and the ability to deter limited nuclear escalation in both theaters.

Because the US forces required to achieve conventional superiority in Asia are somewhat different from those required to do so in Europe, there are potential adjustments to US and allied and partner conventional force structure and posture that could achieve superiority in both theaters.

The primary operational limitation on the ability of the United States to fight and win in both theaters simultaneously is logistics: the strategic airlift and sealift needed to get required forces where they need to be and then sustain them in combat, with sufficient stocks of advanced conventional munitions. There also are critical “low-density, high-demand” US military capabilities that would be in short supply in a two-theater conflict, including bombers; integrated air and missile defenses (IAMD); tanker aircraft; intelligence, surveillance, and reconnaissance (ISR) capabilities; and ASW capabilities.

Fixing this would require a shared understanding of the two-nuclear-peer threat among the United States and its allies and partners in Europe and Asia; significant increases in US, allied, and partner military spending; and an agreement on how to optimize the military capabilities of multiple nations in each theater.

The bottom line is that US allies and partners would have to agree to provide much more conventional capability more efficiently, without perceiving the US request to do so as signaling a reduced US commitment to their defense in either theater.

If the United States and its allies and partners cannot (or will not) maintain conventional superiority in a second theater conflict, deterring or defeating opportunistic or collaborative aggression will require reliance on nuclear weapons to counter adversary conventional superiority in the second theater. US nuclear forces do not currently play such a role, and the force the United States currently plans is not designed to play this role.

US ability to deter large-scale conventional aggression through increased reliance on nuclear weapons to compensate for conventional inferiority is greater against China than it is against Russia for several reasons.

First, during a possible amphibious invasion of Taiwan, China’s forces would be highly vulnerable to US limited nuclear use. And while China might well use nuclear weapons in response, China’s ability to seize Taiwan after sustaining a nuclear attack on its amphibious forces would be negated for years. Thus, Chinese nuclear counterescalation would not enable Beijing to achieve its original geopolitical objectives in the near term, while risking further nuclear escalation, including potentially uncontrolled escalation.12

Chinese People’s Liberation Army – Navy ship Changbaishan (LSD-989) at Nieuwe Waterweg, Rotterdam. Credit: Wikimedia user kees torn.

Compensating for NATO conventional inferiority with nuclear weapons to deter Russian opportunistic or collaborative aggression is more problematic. Russia’s growing theater nuclear force advantage would be extremely difficult to overcome in a way that would make such a US strategy credible, especially given the fact that Russian conventional operations would not be uniquely vulnerable to nuclear attack. However, given the performance of Russian conventional forces in Ukraine, it is reasonable to believe that increased, optimized conventional force contributions by European NATO allies combined with more prepositioning of US heavy ground force equipment in Europe could maintain NATO conventional superiority even if a Russia-NATO conflict began after the United States was engaged in a war against China in Asia.

So what are the key deterrence requirements for this deterrence objective?

The best military option is for the United States and its allies and partners to maintain conventional superiority over China and Russia in both theaters simultaneously. This can be done. But it is unclear whether it will be done, given the political and financial costs of doing so. A strategy that requires such conventional superiority in both theaters that is not supported by forces credibly capable of enabling it risks deterrence failure. In that event, the United States and its allies and partners would incur the much higher costs of fighting (and potentially losing) a major power war, and risk escalation to large-scale nuclear war.

If the United States and its allies and partners do not achieve two-theater conventional superiority, then the United States should increase reliance on nuclear weapons to deter large-scale opportunistic or collaborative conventional aggression in Asia while working with its NATO allies to ensure NATO conventional superiority even in the face of a two-theater war. In either case, it will be essential that the United States bolsters its ability to deter limited nuclear escalation in both theaters to enhance deterrence of large-scale conventional aggression by China and/or Russia. If either Beijing or Moscow perceives a viable option to escalate its way out of failed conventional aggression, it will be more likely to risk such a conventional attack.

Deterring limited nuclear escalation

When facing a peer nuclear adversary with a secure second-strike capability that poses an existential threat to the United States, deterrence of limited nuclear escalation requires the perceived ability of the United States, allies, and partners to persevere in the face of adversary limited nuclear escalation without being politically coerced into accepting war termination on the adversary’s terms, and without being decisively militarily disadvantaged. That requires a set of US nuclear capabilities that are militarily relevant in such a conflict. Current Russian theater nuclear capabilities are designed to be just that. The ongoing evolution of Chinese theater nuclear capabilities indicates that Chinese planners may now understand this as well.

The core requirement for deterring limited nuclear escalation in a war with a nuclear peer is a flexible response strategy that credibly convinces the adversary’s leadership that limited nuclear escalation:

  1. Does not provide effective insurance against miscalculating about US and allied capability, resolve, and cohesion in the face of conventional aggression (as Moscow clearly concluded vis-à-vis Ukraine).
  2. Will not result in war termination on its terms.
  3. Runs the risk of uncontrolled escalation because the United States and its allies are visibly prepared for what nuclear scholar Thomas Schelling called a “competition in risk-taking” to defend their vital interests.

An effective flexible response strategy must be enabled by US, allied, and partner nuclear and conventional forces that are capable of three key things:

  1. Providing a robust range of credible response options that can restore deterrence by convincing adversary leadership it has miscalculated in a dire way, that further use of nuclear weapons will not achieve its objectives, and that it will incur costs that far exceed any benefits it can achieve.
  2. Countering the military impact of adversary theater nuclear use.
  3. Continuing to operate effectively to achieve US, allied, and partner objectives in a limited nuclear use environment.

To meet these requirements the United States needs a range of continuously forward-deployed, survivable theater nuclear forc­es that can reliably penetrate adversary defenses with a range of explosive yields, and on operationally relevant delivery timelines. Based on these attributes, currently planned US theater nuclear capabilities are not sufficient for the two-peer threat the United States faces. Completing the modernization of NATO’s dual-capable fighter aircraft capabilities is necessary but not sufficient to meet this requirement. NATO’s planned theater nuclear forces are too small, insufficiently survivable, and insufficiently militarily relevant. The United States currently plans no continuously forward-deployed theater nuclear capabilities in the Asia-Pacific theater whatsoever, despite the rapid growth of Chinese theater nuclear capabilities and indications that China is changing its nuclear strategy.

US strategic nuclear forces alone cannot fill this gap because they lack the flexibility and timeliness necessary to convince the Russian or Chinese leadership that the United States and its allies are credibly prepared to counter limited nuclear first use with militarily effective nuclear responses of their own. Bombers based in the continental United States cannot deliver nuclear weapons on operationally relevant timelines in many scenarios and are vulnerable to preemptive attack if deployed forward in the theater.

The United States should supplement dual-capable fighter modernization with at least one additional survivable, continuously forward-deployed, selectable-yield delivery system with a higher probability of penetrating advanced defenses and delivering nuclear weapons to targets in the European and Asia-Pacific theaters on operationally relevant timelines. There are several candidate systems that could meet this requirement, but a US nuclear-armed sea-launched cruise missile (SLCM-N) deployed on attack submarines would provide all these attributes in a highly effective manner.

Deterring large-scale nuclear attack

US strategy for deterring large-scale nuclear attack has always been to ensure that US nuclear forces can inflict unacceptable damage on any adversary under any circumstances.

Inflicting unacceptable damage against China and Russia simultaneously requires being able to destroy what both adversaries value most under any circumstances, including following a combined Chinese-Russian preemptive counterforce strike on US nuclear forces and their command and control. This begs two key questions:

  • What do the Chinese and Russian leaderships value most?
  • How many US nuclear weapons must survive a combined future Chinese-Russian counterforce attack to be able to credibly hold at risk what both adversaries most value?

During the Cold War, the United States assessed that the Soviet leadership most valued its ability to exercise control over the Soviet state, its war-supporting industry, and its military forces, including its strategic nuclear forces. Whether this remains the correct equation to deter a Chinese and/or Russian large-scale nuclear attack on the United States is largely a question for the intelligence community.

If the intelligence community assesses the United States must hold Chinese and Russian nuclear forces at substantial risk to deter a large-scale nuclear attack, then the United States must carefully evaluate the level and nature of US nuclear counterforce capability required to deter such an attack and modify its planned nuclear force structure accordingly. Given the scale of China’s nuclear force expansion, the currently planned US nuclear force will clearly be insufficient to address two-peer adversaries in this way.

However, two other issues regarding the need for US nuclear counterforce capabilities are questions of political-military strategy, not intelligence assessment. The first is whether holding a peer adversary’s nuclear forces at risk contributes significantly to deterring limited nuclear escalation by making the US will to engage in a competition in risk-taking more credible. The second is whether holding a peer adversary’s nuclear forces at risk is necessary to limit meaningfully the damage Russia and China can do to the United States and its allies if deterrence of large-scale nuclear attack fails.

Even if the United States determines it does not need to hold Chinese and Russian nuclear forces at substantial risk to deter a large-scale nuclear attack, the United States should still evaluate the level and nature of US nuclear counterforce capabilities required to achieve these other two political-military objectives and modify its planned nuclear force structure accordingly. Most analysts believe the most likely path to a large-scale nuclear war is limited nuclear escalation that results from large-scale conventional conflict between nuclear-armed adversaries. Thus, if such counterforce capability contributes to deterring limited nuclear escalation, and thus also contributes to deterring large-scale conventional aggression, it indirectly contributes to preventing large-scale nuclear attack, even if it is not necessary to deter such an attack directly.

Conclusion

The advent of the two-nuclear-peer threat means the United States must reevaluate the size and composition of the nuclear force it will need to credibly deter both China and Russia from initiating large-scale conventional aggression, escalating to limited nuclear use, and launching a large-scale nuclear attack.

China’s impending nuclear-peer status means that the United States can no longer treat the Chinese nuclear threat as a “lesser included case” of the Russian nuclear threat. It is a US national security im­perative that the full implications of the impending two-peer threat identified in this paper be seriously addressed in the near term.

Why is this an urgent imperative? Because if US strategy to address the two-peer threat requires a US nuclear force that is larger in size, different in composition, or both, decisions need to be made in the near term (one to three years) to supplement the planned US nuclear modernization program, or the nation will not have the required additional capabilities in time to address the threat. The current and planned capacity of the US nuclear weapons enterprise, under the purview of both the DOD and the Department of Energy, severely limits the nation’s ability to supplement the planned modernization program significantly in a timely way.

To reevaluate the size and composition of the nuclear force needed to address the coming two-peer threat, the full US national security community—including those who do and those who do not normally focus on nuclear weapons issues—needs to answer three key questions about the future role of nuclear weapons in US strategy and the conventional and nuclear forces required to implement that strategy:

  • What is the strategic rationale for believing that the nuclear modernization program of record that was adopted in 2010, before Russian aggression against Ukraine in 2014 and 2022, and before China’s ongoing and rapid nuclear force expansion, will be sufficient to address a 2030s security environment that poses the threat of conflict with two-peer nuclear adversaries simultaneously?
  • Are the United States and its allies and partners likely to decide to bear the sustained political and financial costs necessary to build sufficient conventional forces to deter and defeat both Russia and China simultaneously?
  • Why would a nuclear weapons design and production infrastructure designed to just barely be able to maintain the existing US nuclear force be sufficient to provide what the nation needs in a potentially unconstrained nuclear competition with two-peer nuclear adversaries who are technically sophisticated, well-resourced, and geostrategicaly aligned, if not allied?

Part II: Arms control opportunities in the emerging two-nuclear-peer environment

By Amy F. Woolf

This issue brief13 considers whether and how the emerging challenge of two near-equal nuclear-armed adversaries might affect the US nuclear posture. This changing security environment may alter US assessments of its nuclear requirements, affecting both the size and structure of the US nuclear arsenal. The presence of two near-equal nuclear adversaries might also raise new questions about whether arms control can help manage the nuclear competition with Russia and China to ease US concerns about emerging threats and mitigate the need for a more robust US nuclear force posture.

While this paper briefly addresses the prospects for arms control with Russia, the core of this inquiry is the question of whether the United States can engage China in an arms control process that restricts the scope of China’s nuclear modernization program, and, therefore, the magnitude of a potential US response. In its simple form, this question asks whether China might agree to limit the size and scope of its arsenal in exchange for limits on the numbers or capabilities of US nuclear weapons. This would seem to mirror the US-Soviet and US-Russian arms control experience where the nations signed several treaties that limited and, eventually, reduced their numbers of deployed nuclear warheads.

But the United States and Soviet Union developed their arms control relationship and crafted the tools they used to manage their nuclear competition over more than fifty years of negotiations. They only agreed to reduce their numbers of deployed nuclear weapons once their political and security relationship had changed in ways that reduced their nuclear requirements. Arms control treaties that codified reductions in their numbers of nuclear weapons were the result, not the cause, of that changing political relationship.

The United States and China almost certainly will not begin their arms control relationship in the same place that the United States and Russia reached after fifty years—with formal treaties that limited their numbers of deployed weapons. Nor can the United States expect China to accept limits on its nuclear capabilities as long as it believes it needs to expand those capabilities to meet its national security requirements. Therefore, this paper looks beyond the question of whether and how to impose numerical limits on Russian or Chinese nuclear forces and considers other forms of cooperation that might ease US concerns about emerging threats and, therefore, mitigate the need for a more robust US nuclear force posture.

President Ford and Soviet Secretary Brezhnev sign a Joint Communique on the Limitation of Strategic Offensive Arms in 1974. Credit: Gerald R. Ford White House Photographs

Prospects for arms control with Russia

The United States and Russia are unlikely to reach an agreement on a formal treaty retaining current limits or imposing further reductions on their deployed nuclear forces before the New START agreement expires in 2026. Although the United States seems willing to move forward with negotiations, it is unclear whether that these discussions will resume before the conflict in Ukraine ends. In June 2023, Jake Sullivan, President Joseph R. Biden’s national security advisor, said that “rather than waiting to resolve all our bilateral differences, the United States is ready to engage Russia now to manage nuclear risks and develop a post-2026 arms control framework.”14 Russia, however, has rejected this approach. Sergey Ryabkov, Russia’s deputy foreign minister, has blamed Russia’s suspension of New START participation on “the totality of circumstances related to the destructive and hostile actions of the United States.” In response to Sullivan’s statement, he said that “there is simply no basis for a productive discussion here, but we are ready to patiently state our approaches and explain why the US course is destructive.”15

Differences in the US and Russian priorities for a treaty to replace New START would further complicate their ability to complete a new treaty before New START expires. The United States has suggested that the subsequent agreement “sustain limits . . . on the Russian systems covered under new START . . . limit the new kinds of nuclear systems Russia is developing; and . . . address all Russian nuclear weapons, including theater-range weapons.”16 Russia, in contrast, wants the arms control process to “cover the entire spectrum of offensive and defensive, nuclear and non-nuclear weapons with a strategic potential.” This list includes offensive nuclear and conventional strategic weapons, ballistic missile defenses, space-based capabilities that could strike targets on Earth, and the nuclear weapons of the United Kingdom and France.17 It would likely take more than the short time remaining before 2026 to resolve differences and conclude a treaty.

The United States and Russia might find common ground if they seek to establish broad goals for cooperation while identifying specific measures to help manage risks and uncertainties created by their nuclear postures. Some analysts have suggested that they could maintain predictability and transparency by pledging to maintain their forces at the levels mandated in New START and to resume exchanging data on the numbers and locations of their deployed strategic weapons. They could also bolster their communication channels, like those established to ensure deconfliction in and around Syria, to reduce the risk of misunderstandings and misperceptions that could lead to inadvertent escalation.

Informal steps designed to demonstrate restraint and avoid miscalculations would, however, be less comprehensive than those mandated by formal treaties and would almost certainly lapse if either side sought additional forces to meet its national security requirements. Nevertheless, voluntary efforts at cooperation, new negotiations to reinvigorate existing communications channels, and consultations to identify new risk reduction measures could help the two sides forestall worst-case assessments and resist arms race pressures until security conditions improved and formal negotiations resumed.

Prospects for arms control with China

US officials have raised concerns about China’s growing nuclear arsenal and the potential that a regional crisis could spark a conflict that might escalate to nuclear war. In response to these concerns, during their meeting in November 2021, President Biden invited China’s President Xi Jinping to participate in a strategic stability dialogue that would establish “common-sense guardrails to ensure that competition does not veer into conflict and to keep lines of communication open.”18 According to the Biden White House, these talks would focus, at first, “on avoiding accidental conflict, then on each nation’s nuclear strategy and the related instability that could come from attacks in cyberspace and outer space,” before eventually providing a venue for more formal arms control negotiations.19

The five Nuclear Non-Proliferation Treaty (NPT) nuclear-weapon states holding a joint press conference in 2013. Credit: Eric Bridiers, US Mission

China has embraced some forms of arms control, participating in multilateral negotiations and engaging in the P5 process—which brings together the five nuclear weapon states (NWS) recognized by the Nuclear Nonproliferation Treaty (China, France, Russia, the United Kingdom, and the United States)—to address nuclear security and nonproliferation issues. In this context, Beijing has advocated for the “five nuclear-weapon States . . . to further strengthen communication on strategic stability and conduct in-depth dialogue on reducing the role of nuclear weapons in their national security doctrines and on a broad range of issues, including missile defense, outer space, cyberspace, and artificial intelligence.”20

China has, however, been reticent about joining strategic stability talks with the United States and has expressly rejected negotiations toward an agreement that would require transparency into or limits on its nuclear forces, citing the significant disparity between the numbers of US, Russian, and Chinese nuclear warheads. According to Ambassador Fu Cong, then-director-general of the Department of Arms Control at the PRC’s Ministry of Foreign Affairs, “the countries with the largest nuclear arsenals should further conduct significant and substantive reduction in their nuclear arsenals in a verifiable, irreversible and legally binding manner. This will create conditions for other nuclear-weapon States to join the nuclear disarmament process.”21 Fu, who is now Chinese ambassador to the European Union, also argued that transparency would undermine China’s strategic capability because China is “faced with a strategic competitor [with] 6000 nuclear warheads” who is also “developing missile defense, deploying all these missiles defense system around China, [and] talking about deploying the intermedi­ate-range missiles around China.”22

The US government has estimated that China’s nuclear stockpile will grow to around 1,500 warheads by 2035.23 Some see this as an opening for arms control because the number would be similar to the New START limit of 1,550 deployed warheads on US and Russian long-range delivery systems. But the New START agreement does not count all US and Russian weapons; their stockpiles contain around 3,700 and 4,000 warheads, respectively. Moreover, New START expires in 2026, after which the United States and Russia could expand their numbers of deployed strategic nuclear forces, leading to far more than 1,550 deployed warheads on each side by the time China’s stockpile reaches 1,500 warheads in the mid-2030s. Thus, whether one counts deployed warheads on strategic delivery vehicles or total stockpiles, China’s deployed forces in 2026 and its stockpile of warheads in 2035 could still fall below those of the United States and Russia.

Still, a strategic stability dialogue like the one mentioned in the statement following the Biden-Xi summit in 2021 might create a pathway for engagement if the United States remains interested and China agrees to participate. The key to progress, however, depends on the issues on the agenda and the incentives the United States provides to bring China to the table.24 For example, China may be more willing to participate if the agenda extends beyond nuclear weapons and focuses on other capabilities, like ballistic missile defenses and conventional strategic strike systems, that China believes undermine its security. China might also be more willing to discuss the implications of its nuclear modernization program if the United States acknowledges that China’s nuclear deterrent poses a credible threat to the United States and places the two nations in a “mutually vulnerable” deterrence relationship. As a matter of policy, the United States has long refused to acknowledge this reality, in part because it could undermine allies’ confidence in the US extended nuclear deterrent. Still, the absence of an acknowledgment also serves to convince China that the United States is seeking “absolute security,” rather than mutual deterrence, with its nuclear weapons.

The two nations could also seek to identify and implement crisis management, communications, and risk reduction measures to address the risk that regional crises might escalate to nuclear war. For example, a missile launch notification agreement might reduce the risk that either nation misunderstands the purpose of a missile test flight, then responds with additional military action. Measures that restrain dangerous air operations or encounters at sea could also reduce the risk of inadvertent engagements and escalation during a crisis. China has been unwilling to engage in direct government-to-government discussions on these types of issues in the past, but, in the current security environment, this type of dialogue might serve as a starting point for a more fulsome arms control relationship.

US President Joseph Biden and Chinese President Xi Jinping meet on the sidelines of the G20 Summit in Indonesia in November 2021. Credit: The White House

Conclusion

The United States, Russia, and China are unlikely to accept restrictions on their numbers of deployed nuclear weapons as long as each continues to center nuclear weapons in its national security strategy, and all believe the threats in the current international security environment increase the salience of nuclear weapons. Moreover, they are unlikely to find an acceptable agenda for negotiations until each is willing to address the others’ concerns about threatening activities or capabilities. Even if they clear these two hurdles, they are unlikely to succeed in talks that focus on nuclear reductions if each believes that it needs to modernize and possibly expand the size of its nuclear stockpile to achieve its security objectives.

A process focused on transparency, communication, and risk reduction measures could provide a path forward, even if it did not lead to nuclear reductions. It would not, however, be without complications. While the United States believes that steps to reduce the risk of nuclear war have value, Russia and China might believe that the risk would be worth taking in the future if it would help coerce the United States to disengage from a conflict. Nuclear weapons make this type of risk-tolerant strategy all the more dangerous. Nevertheless, an agenda focusing on communications and risk reduction might reduce the pressure to increase the number of nuclear weapons.

Series conclusion

Nuclear weapons represent both the greatest threat to US national survival and a central tool in US defense and national security strategy. The potential for horrific destruction in even a limited nuclear attack has underlain the US doctrine of nuclear deterrence, for which the United States has sought to maintain a nuclear force posture sufficient to deny any potential adversary its objectives if it employed nuclear weapons and to ensure that the costs of a conflict that escalated to nuclear use would be unacceptably high for that adversary.

During the Cold War, the United States and the Soviet Union recognized that either side’s efforts to expand its own capabilities could not only introduce new threats for the other, but also create instabilities that might add to the risk of nuclear use in a crisis or conflict. Thus, these states pursued discussions to better understand their planned nuclear force structures and to identify potential sources of instability in the nuclear balance. For the United States, this arms control process was part of its national security toolbox, as the negotiations produced agreements that restrained the size and scope of the Soviet and Russian nuclear force, offered transparency and predictability into potential future developments, and allowed the United States to plan its own nuclear programs without relying on worst-case assessments of Soviet and Russian plans.

In the years following the collapse of the Soviet Union, the size and structure of the US nuclear force, the guidance and employment plans that would direct use of nuclear weapons, and the circumstances under which the United States would consider employing them evolved to reflect positive changes in the international security environment. But the last decade has seen concerns about nuclear weapons and great power rivalry return to the scene. The United States is now engaged in a security environment where it might face conflicts with two nuclear-armed nations at the same time. As Russia and China modernize and expand their nuclear forces, the United States must again consider how to alter the size and structure of its nuclear forces and whether cooperation through arms control can mitigate the need for a more robust US nuclear posture.

The two papers in this study offer answers to both sides of this problem. The first paper concludes that the United States will likely need a greater number of deployed nuclear warheads than the 1,550 permitted under the New START Treaty and additional, more flexible delivery systems—such as a nuclear-armed sea-launched cruise missile—to ensure that it can simultaneously deter conflict with both China and Russia at the strategic and regional levels. The second paper concludes that, while stability dialogues and risk-reduction measures might help the three nations mitigate the risk of nuclear use, they are unlikely for the foreseeable future to negotiate treaties or agreements that limit the size of their nuclear forces or offer transparency into their future plans.

Because the United States, Russia, and China all see nuclear weapons as essential to their national security, they almost certainly will continue to expand their capabilities until the international security environment changes. Neither the United States and Russia, nor the United States and China, are likely to engage in bilateral arms control discussions until they believe they can strengthen their security by cooperating to manage nuclear risks. Moreover, these states are unlikely to find an acceptable agenda for negotiations until each is willing to address the others’ concerns about threatening activities or capabilities. Even if these states clear these two hurdles, negotiators are unlikely to find success in talks that focus on nuclear reductions if each believes that it needs to modernize and possibly expand the size of its nuclear stockpile to achieve its security objectives.

About the authors

Greg Weaver is the principal of Strategy to Plans LLC. Previously, he was deputy director for strategic stability in the Joint Chiefs of Staff Directorate for Strategic Plans and Policy (J5)

There, he was the principal policy and strategy adviser to the chairman of the Joint Chiefs of Staff on nuclear, space, cyber, missile defense, and arms control issues. Prior to joining the Joint Staff, he served as principal director for nuclear and missile defense policy in the Office of the Under Secretary of Defense for Policy.

Amy Woolf is a nonresident senior fellow in the Forward Defense program of the Atlantic Council’s Scowcroft Center for Strategy and Security.

Previously, she served as a specialist in nuclear weapons policy at the Congressional Research Service of the US Library of Congress for more than thirty years. In that role, she provided Congress with research support, background information, and expert analysis on issues related to nuclear forces and arms control. Before joining the Congressional Research Service, Woolf was a member of the research staff at the Institute for Defense Analyses. She also spent a year at the US Department of Defense, working on the 1994 Nuclear Posture Review. Woolf received a master in public policy from the Kennedy School of Government at Harvard University and a bachelor of arts in political science from Stanford University.

Acknowledgments

The authors would like to thank Alyxandra Marine and Mark J. Massa for their assistance in editing this piece and Marine for writing the introduction.

The Atlantic Council is grateful to Los Alamos National Laboratory for its support of this paper.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

1    2022 Report on Military and Security Developments Involving the People’s Republic of China, US Department of Defense, 94.
2    The 2022 National Defense Strategy makes the primacy of the US nuclear deterrent abundantly clear; for example, the DOD focus on integrated deterrence is “backstopped by a safe, secure, and effective nuclear deterrent.” The NDS emphasizes the importance of modernizing US nuclear forces as “the ultimate backstop to deter attacks on the homeland and our Allies and partners who rely on extended deterrence.” Numerous public statements by senior US government officials reiterate the priority of the US’s nuclear deterrent. See 2022 National Defense Strategy, https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSESTRATEGY-NPR-MDR.PDF.
3    Military and Security Developments Regarding the People’s Republic of China 2022, Office of the Secretary of Defense, 2022, 94.
4    Or even sooner. Recent public US intelligence estimates of China’s future nuclear arsenal have repeatedly underestimated both the pace and scale of China’s nuclear buildup.
5    Intrawar deterrence is important to consider should a conflict begin following a deterrence failure and critical actions must be taken to mitigate escalation toward a large-scale nuclear exchange. Intrawar deterrence considerations are distinctly different from preconflict deterrence and escalation toward conflict.
6    For more on the debate regarding China’s “no first use” declaratory policy, see Nan Li, “China’s Evolving Nuclear Strategy: Will China Drop ‘No First Use?,’” China Brief, Jamestown Foundation, January 12, 2018, https://jamestown.org/program/chinas-evolving-nuclearstrategy-will-china-drop-no-first-use/. The author points out that debate over the efficacy of “no first use” among China’s nuclear scholars has increased in recent years, with some calling it into question. Also see Jennifer Bradley, “China’s Nuclear Modernization and Expansion: Ways Beijing Could Adapt Its Nuclear Policy,” National Institute for Public Policy Occasional Paper 2, no. 7, July 2022. Bradley points out that China contends a launch-on-warning capability (that it is developing) is fully consistent with its no-first-use nuclear policy.
7    For background on the development of the current program of record during the administration of President Barack Obama, see, for example, 2010 Nuclear Posture Re­view; 2015 National Security Strategy; Congressional Research Service, “U.S. Strategic Nuclear Forces: Background, Developments, and Issues,” updated September 3, 2019; and for the New START debate in Congress, see, for example, “November 2010 Update to the National Defense Authorization Act of FY2010 Section 1251 Report, New START Treaty Framework and Nuclear Force Structure Plans,” Los Alamos Study Group.
8    As pointed out by US experts on Russian military doctrine (e.g., Dave Johnson, Michael Kofman, Anya Fink), Russian military doctrine and strategy, particularly in the nuclear realm, cannot be reduced to the simplistic and misleading label—“escalate to deescalate.” For more on the Russian approach as a strategic deterrence, counter-escalation, and war-fighting strategy, see D. Johnson, “Russia’s Conventional Precision Strike Capabilities, Regional Crises, and Nuclear Thresholds,” Livermore Papers on Global Security No. 3, Lawrence Livermore National Laboratory, February 2018; M. Kofman and A. Fink, “Escalation Management and Nuclear Employment in Russian Military Strategy,” Center for New American Security, September 2022.
9    “In a potential conflict with a competitor, the United States would need to be able to deter opportunistic aggression by another competitor. We will rely in part on nuclear weapons to help mitigate this risk, recognizing that a near-simultaneous conflict with two nuclear-armed states would constitute an extreme circumstance.” See 2022 Nuclear Posture Review, US Department of Defense, 12.
10    Failing to address this problem also exacerbates issues around extended deterrence and assurance of allies and partners.
11    Note, however, that none of these objectives would likely require a US strategic nuclear force that matched the combined total of deployed warheads in the Russian and Chinese strategic nuclear forces.
12    For more details on this argument, see Greg Weaver, “The Role of Nuclear Weapons in a Taiwan Crisis,” Atlantic Council, November 2023.
13    The views expressed by Amy F. Woolf, a nonresident senior fellow in the Forward Defense program of the Atlantic Council’s Scowcroft Center for Strategy and Security, are her own and do not reflect the views of her current or past affiliations.
14    White House, “Remarks by National Security Advisor Jake Sullivan for the Arms Control Association (ACA) Annual Forum,” White House Briefing Room (website), June 2, 2023, https://www.whitehouse.gov/briefing-room/speeches-remarks/2023/06/02/remarks-by-national-security-advisor-jake-sullivan-for-the-arms-control-associa­tion-aca-annual-forum/.
15    Ministry of Foreign Affairs of the Russian Federation, “Foreign Ministry Spokeswoman Maria Zakharova’s Answer to a Media Question about US National Security Adviser John Sullivan’s Remarks,” June 3, 2023, https://mid.ru/en/foreign_policy/news/1873993/.
16    “Keynote Address for the Commemoration of the 50th Anniversary of the Arms Control Association,” delivered by Mallory Stewart, Assistant Secretary, Bureau of Arms Control, Compliance, and Verification, US Department of State, June 2, 2022, https://www.state.gov/keynote-address-for-the-commemoration-of-the-50th-anniver­sary-of-the-arms-control-association/.
17    Sergey Ryabkov, “Russia’s Nonproliferation Policy and Global Strategic Stability,” Modern Diplomacy, December 27, 2021, https://moderndiplomacy.eu/2021/12/27/rus­sias-nonproliferation-policy-and-global-strategic-stability/.
18    White House, “Readout of President Biden’s Virtual Meeting with President Xi Jinping of the People’s Republic of China,” November 16, 2021, https://www.whitehouse. gov/briefing-room/statements-releases/2021/11/16/readout-of-president-bidens-virtual-meeting-with-president-xi-jinping-of-the-peoples-republic-of-china/.
19    David E. Sanger and William J. Broad, “As China Speeds Up Nuclear Arms Race, the US Wants to Talk,” New York Times, November 28, 2021, https://www.nytimes. com/2021/11/28/us/politics/china-nuclear-arms-race.html.
20    “Upholding the Treaty on the Non-Proliferation of Nuclear Weapons for World Peace and Development,” Ambassador Fu Cong, Head of the Chinese Delegation and Director-General of the Department of Arms Control of the Ministry of Foreign Affairs of the People’s Republic of China, August 2, 2022, https://reachingcriticalwill.org/ images/documents/Disarmament-fora/npt/revcon2022/statements/2Aug_China.pdf.
21    “Upholding the Treaty on the Non-Proliferation of Nuclear Weapons.”
22    “Upholding the Treaty on the Non-Proliferation of Nuclear Weapons.”
23    Military and Security Developments.
24    For more details on the points summarized here, see David Santoro, “Getting Past No: Developing a Nuclear Arms Control Relationship with China,” Journal for Peace and Nuclear Disarmament, June 13, 2023, https://doi.org/10.1080/25751654.2023.2221830.

The post Requirements for nuclear deterrence and arms control in a two-nuclear-peer environment appeared first on Atlantic Council.

]]>
Kroenig and Cimmino quoted in The Dispatch and AOL.com on a more forceful US response to Iran https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-and-cimmino-quoted-in-the-dispatch-and-aol-com-on-a-more-forceful-us-response-to-iran/ Thu, 01 Feb 2024 21:42:54 +0000 https://www.atlanticcouncil.org/?p=731801 On January 30, Matthew Kroenig, vice president and senior director of the Scowcroft Center, and Jeffrey Cimmino, deputy director of operations and fellow in the Scowcroft Center, were quoted in The Morning Dispatch and AOL.com on a more forceful US response to Iran. Dr. Kroenig’s section of the recent experts react piece was also quoted.

The post Kroenig and Cimmino quoted in The Dispatch and AOL.com on a more forceful US response to Iran appeared first on Atlantic Council.

]]>

On January 30, Matthew Kroenig, vice president and senior director of the Scowcroft Center, and Jeffrey Cimmino, deputy director of operations and fellow in the Scowcroft Center, were quoted in The Morning Dispatch and AOL.com on a more forceful US response to Iran. Dr. Kroenig’s section of the recent experts react piece was also quoted.

We have seen that American caution has not led to de-escalation. Rather, American weakness has encouraged more aggression.

The post Kroenig and Cimmino quoted in The Dispatch and AOL.com on a more forceful US response to Iran appeared first on Atlantic Council.

]]>
Kroenig quoted in VOA on the response to US service members killed by Iran-backed forces https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-voa-on-the-response-to-us-service-members-killed-by-iran-backed-forces/ Wed, 31 Jan 2024 22:20:10 +0000 https://www.atlanticcouncil.org/?p=731146 On January 30, Matthew Kroenig, vice president and senior director of the Scowcroft Center, was quoted in VOA News on the aftermath of the deaths of three US soldiers serving in Jordan. He assessed that it is not an accident that the Iran-backed Iraqi militia suspected of carrying out the attack is ending its regional […]

The post Kroenig quoted in VOA on the response to US service members killed by Iran-backed forces appeared first on Atlantic Council.

]]>

On January 30, Matthew Kroenig, vice president and senior director of the Scowcroft Center, was quoted in VOA News on the aftermath of the deaths of three US soldiers serving in Jordan. He assessed that it is not an accident that the Iran-backed Iraqi militia suspected of carrying out the attack is ending its regional operations against U.S. forces. He was also quoted in the Jewish Press.

It is pretty simple: When America puts credible military options on the table, adversaries back down.

Matthew Kroenig

The post Kroenig quoted in VOA on the response to US service members killed by Iran-backed forces appeared first on Atlantic Council.

]]>
Kroenig quoted in The Telegraph on actions the US could take against Iran https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-the-telegraph-on-actions-the-us-could-take-against-iran/ Wed, 31 Jan 2024 22:02:28 +0000 https://www.atlanticcouncil.org/?p=731112 On January 29, Matthew Kroenig, vice president and senior director of the Scowcroft Center, was quoted in The Telegraph on his section in an experts react piece on the news that three US service members had been killed in Jordan by Iran-backed militants.

The post Kroenig quoted in The Telegraph on actions the US could take against Iran appeared first on Atlantic Council.

]]>

On January 29, Matthew Kroenig, vice president and senior director of the Scowcroft Center, was quoted in The Telegraph on his section in an experts react piece on the news that three US service members had been killed in Jordan by Iran-backed militants.

Deterrence works by convincing an adversary that the costs to attacking the United States and its allies and interests greatly outweighs any conceivable benefits. [Limiting attacks to Iran’s proxy forces] would be read in Tehran as a sign of weakness and simply stoke a continued cycle of violence.

Matthew Kroenig

The post Kroenig quoted in The Telegraph on actions the US could take against Iran appeared first on Atlantic Council.

]]>
Kroenig quoted in Daily Mail on recent attacks on US bases by Iran-affiliated militants https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-daily-mail-on-recent-attacks-on-us-bases-by-iran-affiliated-militants/ Wed, 31 Jan 2024 21:18:39 +0000 https://www.atlanticcouncil.org/?p=731037 On January 29, Matthew Kroenig, Vice President and Senior Director of the Scowcroft Center, was quoted in Daily Mail on his recent experts react section on the news that three US soldiers were killed by Iran-backed forces in Jordan.

The post Kroenig quoted in Daily Mail on recent attacks on US bases by Iran-affiliated militants appeared first on Atlantic Council.

]]>

On January 29, Matthew Kroenig, Vice President and Senior Director of the Scowcroft Center, was quoted in Daily Mail on his recent experts react section on the news that three US soldiers were killed by Iran-backed forces in Jordan.

[Actions like hitting back against the Iranian navy, top leadership or nuclear program] would convey to Iran that it badly miscalculated and that attacking the United States was a foolish decision that should not be repeated.

Matthew Kroenig

The post Kroenig quoted in Daily Mail on recent attacks on US bases by Iran-affiliated militants appeared first on Atlantic Council.

]]>
Kroenig quoted in Iran International and NZ City on how the US can react to attacks by Iran-affiliated forces https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-iran-international-on-how-the-us-can-react-to-attacks-by-iran-affiliated-forces/ Wed, 31 Jan 2024 21:00:30 +0000 https://www.atlanticcouncil.org/?p=730984 On January 29, Matthew Kroenig, Vice President and Senior Director of the Scowcroft Center, was quoted by Iran International on the response the United States should impose on Iran after Iran-affiliated militants killed three US soldiers in Jordan. He was also quoted by NZ City on January 30.

The post Kroenig quoted in Iran International and NZ City on how the US can react to attacks by Iran-affiliated forces appeared first on Atlantic Council.

]]>

On January 29, Matthew Kroenig, Vice President and Senior Director of the Scowcroft Center, was quoted by Iran International on the response the United States should impose on Iran after Iran-affiliated militants killed three US soldiers in Jordan. He was also quoted by NZ City on January 30.

Washington could sink the Iranian navy, like then President Ronald Reagan did in the 1980s. It could strike Iranian naval bases. It could target Iranian leadership, following in the footsteps of then President Donald Trump’s killing of Iranian General Qassem Soleimani. It could seize this opportunity to degrade Iran’s nuclear and missile program—which must be addressed soon regardless, as the Pentagon estimates its nuclear breakout timeline to be only twelve days.

Matthew Kroenig

The post Kroenig quoted in Iran International and NZ City on how the US can react to attacks by Iran-affiliated forces appeared first on Atlantic Council.

]]>
Kroenig quoted in ABC News on how the US should respond to Iran-backed attacks https://www.atlanticcouncil.org/insight-impact/in-the-news/kroenig-quoted-in-abc-news-on-how-the-us-should-respond-to-iran-backed-attacks/ Wed, 31 Jan 2024 19:59:11 +0000 https://www.atlanticcouncil.org/?p=730888 On January 29, Matthew Kroenig, Vice President and Senior Director of the Scowcroft Center, was quoted in ABC News on his section of the experts react on the US service members killed in Jordan by Iran-backed forces, where he argued that the United States needs to take greater action against Iran.

The post Kroenig quoted in ABC News on how the US should respond to Iran-backed attacks appeared first on Atlantic Council.

]]>

On January 29, Matthew Kroenig, Vice President and Senior Director of the Scowcroft Center, was quoted in ABC News on his section of the experts react on the US service members killed in Jordan by Iran-backed forces, where he argued that the United States needs to take greater action against Iran.

Iran learned that it could attack with impunity, and US caution only invited more aggression.

Matthew Kroenig

The post Kroenig quoted in ABC News on how the US should respond to Iran-backed attacks appeared first on Atlantic Council.

]]>
Eftimiades in iNews on Chinese espionage https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-in-inews-on-chinese-espionage/ Wed, 31 Jan 2024 19:22:19 +0000 https://www.atlanticcouncil.org/?p=730170 Nicholas Eftimiades discusses the role of intelligence operations in the strategic competition between the United States and China.

The post Eftimiades in iNews on Chinese espionage appeared first on Atlantic Council.

]]>

On January 31st, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in iNews discussing Chinese espionage and the West’s inability to counter it.

We’re under siege. Everywhere you look, something different is happening

Nicholas Eftimiades

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades in iNews on Chinese espionage appeared first on Atlantic Council.

]]>
Braw featured in Defense One on Norway’s model of national service within the armed forces https://www.atlanticcouncil.org/insight-impact/in-the-news/braw-featured-in-defense-one-on-norways-model-of-national-service-within-the-armed-forces/ Fri, 26 Jan 2024 16:25:00 +0000 https://www.atlanticcouncil.org/?p=733079 On January 25, Transatlantic Security Initiative senior fellow Elisabeth Braw was featured in Defense One in which she analyzed Norway’s model of selective military service and offered key opportunities for other nations to learn from the Norwegian model.

The post Braw featured in Defense One on Norway’s model of national service within the armed forces appeared first on Atlantic Council.

]]>

On January 25, Transatlantic Security Initiative senior fellow Elisabeth Braw was featured in Defense One in which she analyzed Norway’s model of selective military service and offered key opportunities for other nations to learn from the Norwegian model.

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

The post Braw featured in Defense One on Norway’s model of national service within the armed forces appeared first on Atlantic Council.

]]>
Eftimiades in SpyTalk on Chinese soldier training with US contractors https://www.atlanticcouncil.org/insight-impact/in-the-news/eftimiades-in-spytalk-on-chinese-soldier-training-with-us-contractors/ Mon, 22 Jan 2024 23:51:36 +0000 https://www.atlanticcouncil.org/?p=730172 Nicholas Eftimiades discusses the role of intelligence operations in the strategic competition between the United States and China.

The post Eftimiades in SpyTalk on Chinese soldier training with US contractors appeared first on Atlantic Council.

]]>

On January 19, Forward Defense nonresident senior fellow Nicholas Eftimiades was quoted in SpyTalk discussing the failure of US intelligence to detect PLA military training happening inside the US by unwitting former Navy SEALS and Army Special Forces who operate as contractors.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Eftimiades in SpyTalk on Chinese soldier training with US contractors appeared first on Atlantic Council.

]]>
Grundman quoted in Law360 on the National Defense Industrial Strategy https://www.atlanticcouncil.org/insight-impact/in-the-news/grundman-quoted-in-law360-on-the-national-defense-industrial-strategy/ Thu, 18 Jan 2024 15:49:50 +0000 https://www.atlanticcouncil.org/?p=727004 Steve Grundman was quoted in Law360 on the National Defense Industrial Strategy, addressing its ambition and lack of specifics.

The post Grundman quoted in Law360 on the National Defense Industrial Strategy appeared first on Atlantic Council.

]]>

On January 18, Forward Defense senior fellow Steve Grundman was quoted in Law360 providing an assessment of the Department of Defense’s National Defense Industrial Strategy. He emphasized a lack of specifics to address fragile supply chains, underlining the necessity for a well-defined blend of new funding and procedural approaches to realize these objectives.

The twenty five broad actions suggested by DoD are more ambition rather than action.

Steve Grundman

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Grundman quoted in Law360 on the National Defense Industrial Strategy appeared first on Atlantic Council.

]]>
Gericke featured on episode of NucleCast podcast https://www.atlanticcouncil.org/insight-impact/in-the-news/gericke-featured-on-episode-of-nuclecast-podcast/ Wed, 17 Jan 2024 19:17:43 +0000 https://www.atlanticcouncil.org/?p=735064 On January 16, IPSI nonresident senior fellow Brad Gericke spoke on an episode of NucleCast, a podcast produced by the Advanced Nuclear Weapons Alliance Deterrence Center. He discussed the situation leading up to Russia’s invasion of Ukraine and the perspective of the intelligence community during this time. 

The post Gericke featured on episode of NucleCast podcast appeared first on Atlantic Council.

]]>

On January 16, IPSI nonresident senior fellow Brad Gericke spoke on an episode of NucleCast, a podcast produced by the Advanced Nuclear Weapons Alliance Deterrence Center. He discussed the situation leading up to Russia’s invasion of Ukraine and the perspective of the intelligence community during this time. 

The post Gericke featured on episode of NucleCast podcast appeared first on Atlantic Council.

]]>
Tran authors op-ed in The Diplomat on tensions in the South China Sea https://www.atlanticcouncil.org/insight-impact/in-the-news/tran-authors-op-ed-in-the-diplomat-on-tensions-in-the-south-china-sea/ Wed, 17 Jan 2024 18:08:07 +0000 https://www.atlanticcouncil.org/?p=726241 Read the full article here.

The post Tran authors op-ed in The Diplomat on tensions in the South China Sea appeared first on Atlantic Council.

]]>
Read the full article here.

The post Tran authors op-ed in The Diplomat on tensions in the South China Sea appeared first on Atlantic Council.

]]>
Grundman on DefAero podcast discussing defense industry https://www.atlanticcouncil.org/insight-impact/in-the-news/grundman-on-defaero-podcast-discussing-defense-industry/ Wed, 17 Jan 2024 15:43:21 +0000 https://www.atlanticcouncil.org/?p=726979 Steve Grundman speaks on the Defense and Aerospace Report podcast about the National Defense Industrial Strategy and its implications.

The post Grundman on DefAero podcast discussing defense industry appeared first on Atlantic Council.

]]>

On January 17, Forward Defense senior fellow Steve Grundman joined the Defense & Aerospace Report Daily Podcast to discuss the release of the Biden administration’s first-ever National Defense Industrial Strategy. He highlighted the strategy’s potential impact on future defense initiatives and the importance of leveraging tools like the Defense Production Act Title III, while also noting the strategy’s lack of concrete guidance for the commercial defense industrial base.

I think it’s a really good complement to the National Defense Strategy…it’s not a prescription of programs and budgets per se. Instead, its purpose is to frame the problem and express the priorities by which the department is going to address the problem.

Steve Grundman

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Grundman on DefAero podcast discussing defense industry appeared first on Atlantic Council.

]]>
Experts react: What to expect after Iranian attacks on Erbil https://www.atlanticcouncil.org/blogs/menasource/experts-react-what-to-expect-after-iranian-attacks-on-erbil/ Tue, 16 Jan 2024 19:35:32 +0000 https://www.atlanticcouncil.org/?p=725604 Atlantic Council experts share their insights about the attack and what to expect next.

The post Experts react: What to expect after Iranian attacks on Erbil appeared first on Atlantic Council.

]]>
On January 15, the Islamic Revolutionary Guards Corps (IRGC) claimed responsibility for missile attacks into Erbil, the capital of the Kurdistan region of Iraq, that killed four and may have wounded as many as seventeen. The attacks largely hit civilian areas, killing a well-known Kurdish real estate developer and four members of his family. According to the IRGC, the attacks were aimed at “the destruction of espionage headquarters” belonging to Israeli intelligence agency, Mossad, in “response to the recent evil acts of the Zionist regime in martyring IRGC and resistance commanders”—an apparent reference to the deaths of IRGC Brigadier General Razi Mousavi, Hamas deputy Saleh al-Arouri, and senior Lebanese Hezbollah commander Wissam al-Tawil. They also said that attacks, which included positions in Syria, were on “anti-Iranian terrorist groups,” referring to the twin attacks by the Islamic State of Iraq and al-Sham (ISIS) in Kerman on January 3 that killed eighty-six Iranians.

Below, Atlantic Council experts share their views on what to know about the attacks and what to expect next.

Click to jump to an expert analysis:

C. Anthony Pfaff: IRGC attack against Erbil poses challenges and opportunities for the United States

Holly Dagres: The read from Iran

Thomas S. Warrick: The war in the shadows will continue

Masoud Mostajabi: The subtleties of Iranian actions across the region


IRGC attack against Erbil poses challenges and opportunities for the United States

This escalation poses a significant challenge—and possibly an opportunity—for the United States to undermine Iranian regional influence and bolster its relations with Iraq. While US facilities were not likely a target, these attacks will likely increase popular concerns that US-Iran tensions will drag them into a wider conflict. These concerns could energize the movement to remove the entire US presence from Iraq, which gathered new steam after the US strike that killed Harakat al-Nujaba leader Mushtaq al-Jawari, who had been organizing strikes against US forces in Iraq on behalf of Iran. This concern manifests in other ways that place strain on US-Iraq military relations. Recently, the chief of staff of the Iraqi Army walked on a likeness of an American flag during an observance of IRGC Quds Force Commander Qasem Soleimani’s death in Baghdad.

While some of these protests can be dismissed as political theater, the current dynamic has placed the United States in a bind, where its choices are to endure the attacks or risk being forced to withdraw. Neither, of course, are optimal. However, the Iranian strikes against putative Israeli targets in Kurdistan may present an opportunity. Whatever one believes about the merits of Tehran’s claims of an Israeli presence in Kurdistan, the missiles largely struck civilian areas, causing significant collateral damage. In doing so, the attacks exposed gaps in Baghdad’s ability to defend its sovereignty against external attack, making it even more vulnerable to Iranian pressure.

Thus, these challenges and opportunities suggest the following short-term measures that could improve US-Iraq relations and alter the current dysfunctional dynamic. To address pressure for the withdrawal of US forces, the United States could offer to increase support to Iraqi air defense forces to counter missile and drone attacks, which have increased since October 7, 2023. Doing so could diminish the effectiveness of Iran-backed attacks, mitigating the need for more active measures. Baghdad, for its part, should take this opportunity to increase pressure on the militias to cease destabilizing attacks. In the past, the Iraqi government has had little success reigning the militias in. However, with Iran now directly attacking Iraqi territory, these militias may have some incentive to distance themselves from Iran.

Dr. C. Anthony Pfaff is a nonresident senior fellow with the Atlantic Council’s Iraq Initiative, and the research professor for Strategy, the Military Profession, and Ethics at the Strategic Studies Institute (SSI), US Army War College in Carlisle, PA. 

The read from Iran

#Pink_Jacket was scrawled in Persian on the ballistic missiles that hit Erbil. The hashtag was referring to a toddler donning a pink jacket who was among those killed in the attack in Kerman at a memorial service for Quds Force Commander Qasem Soleimani on January 3. Part of the civilian casualties by the IRGC missiles included the 11-month-old daughter of multimillionaire Kurdish businessman Peshraw Dizayee, who also perished with two other members of his family. That irony wasn’t lost on Persian language social media, where many pointed out that to take revenge for a child’s death, the IRGC had killed a child in the process.

The next day, on January 16, two celebratory billboards appeared in the capital, Tehran. “Hard answer with God’s permission,” one read with an image of a missile and Hebrew text that said, “We’re going to take more revenge against the infidels.” A separate billboard also had a missile and appeared with the Hebrew text that stated, “Shelter?! Prepare your coffins…” and repeated the phrase in Persian.

From the statement issued by the IRGC to the personalized missiles and newly revealed billboards, the IRGC wants to emphasize that the goal of their attacks was “hard revenge” for the Kerman attack and the assassinations of members of the Resistance Axis. Earlier in the month, Tehran had vowed revenge, and now it had delivered.

Now the question is whether Dizayee was, in fact, a targeted assassination by ballistic missiles or whether he and his family were collateral casualties retroactively claimed by the IRGC to exaggerate the accuracy of its missiles.

Holly Dagres is editor of the Atlantic Council’s IranSource and MENASource blogs, and a nonresident senior fellow with the Middle East Programs. She also curates The Iranist newsletter.

The war in the shadows will continue

Iranian actions against the United States and US allies almost always display a peculiar sense of symmetry. Iran does something that requires retaliation in the form of sanctions, a cyberattack, a tanker seizure, or something else. Iran then retaliates—not always identically, but in some similar way. At first, Iran’s January 15 missile strike into Erbil looked like a dramatic escalation. After the dust settled and the identities of those killed became known, the peculiar sense of symmetry became painfully apparent: the Iranian regime’s target this time was not the United States but a prominent Kurdish businessman, Peshraw Dizayee, alleged by Tehran to have ties with Israel.

Regardless of whether this is true or not, eyes turned toward Israel’s December 25, 2023 strike in Syria that killed IRGC General Mousavi. His role in arming groups responsible for killing Israelis made him a legitimate military target. It remains to be seen whether Iran’s peculiar sense of symmetry was at work in Erbil on January 15, but this fits the pattern.

Iran’s hypocrisy is apparent. The Iranian ambassador to Iraq, Mohammad Kazam al-Sadegh, is affiliated with the IRGC Quds Force, labeled in 2007 as a terrorist group by the United States and, eventually, by other countries. Sadegh knows his way to Kurdistan, having been photographed with Iraqi Kurdistan President Nechirvan Barzani on September 11, 2023. While the ambassador and the Iraqi Kurdistan president—both highly skilled at the diplomatic game—look engaged in a friendly discussion, the widescreen photo gives a better sense of the frosty atmospherics. As a prominent Iraqi Kurdish statesman once told me, Kurdistan’s problem is “You can pick your friends, but you can’t pick your neighbors.” Iran’s January 15 strike painfully illustrates both truths.

Tehran could have complained through diplomatic channels and asked Baghdad or Erbil to rein in anti-Iranian behavior on Iraqi soil. Baghdad or Erbil would then have been able to insist that Iran rein in anti-American behavior by Iran and its proxies on Iraqi soil. The fact that the Iranian regime continues to use Iraq as territory from which to carry out attacks means that Tehran has little justification to complain when others do the same to it. The war in the shadows will continue.

Thomas S. Warrick is the director of the Future of DHS project at the Scowcroft Center for Strategy and Security’s Forward Defense program and a nonresident senior fellow and the Scowcroft Middle East Security Initiative at the Atlantic Council.


The subtleties of Iranian actions across the region

Launching its most extensive operation to date, the IRGC has had a busy week, targeting Syria, Iraq, and Pakistan. According to Brigadier General Amir Ali Hajizadeh, the IRGC Aerospace Force commander, the operations aimed at a “Mossad espionage base in Erbil,” used for planning terrorism in the region, particularly against Iran, and “strongholds of Daesh in Syria.” Additionally, on Tuesday, Tasnim reported strikes on the “headquarters of Jaysh al-Dhulm (Jeysh al-Adl) terrorist group” in Pakistani Balochistan. 

These actions permit Tehran to claim achievements in response to for example the recent assassination of General Seyed Razi Mousavi, addressing ISIS-claimed attacks in Kerman and Rask – some Iranian officials attribute the former to Israel – and sending a message to Iraq’s Kurdish region, accused of harboring anti-Iran subversives.  

Moreover, by avoiding targeting Americans and US infrastructure, Tehran is able to showcase its missile and drone capabilities without escalating regional tensions. Adrienne Watson, the NSC spokesperson, confirmed that “no American personnel or facilities were targeted.” From Tehran’s perspective, these attacks serve as a signal of preparedness to both domestic and international audiences, indicating that Iran has the means and will to respond to threats against Iranians and the Iranian homeland, without substantially risking a broader regional conflict involving the United States. 

These actions won’t be the final ones from the Iranians, as it aligns with Tehran’s strategy to persist in striking perceived enemies. When questioned about the possibility of such attacks continuing, Hajizadeh explicitly stated, “the fight between good and evil never ends.” 

Nevertheless, the US and Western allies would be wise to take note of these subtleties, recognizing Iran’s need to project strength while also expressing a clear reluctance to escalate into a war with the West. Analysts advocating for a more forceful response to Iran should heed these considerations.

Masoud Mostajabi is a deputy director at the Atlantic Council’s Middle East Programs.

The post Experts react: What to expect after Iranian attacks on Erbil appeared first on Atlantic Council.

]]>
Michta in RealClearWorld on the necessity of a revised US national security strategy https://www.atlanticcouncil.org/insight-impact/in-the-news/michta-in-realclearworld-on-the-necessity-of-a-revised-us-national-security-strategy/ Mon, 15 Jan 2024 20:26:00 +0000 https://www.atlanticcouncil.org/?p=725746 On January 18, an article written by Andrew Michta, Director and Senior Fellow in the Scowcroft Strategy Initiative, was featured in RealClearWorld discussing how the United States requires a new national security strategy to better address both the war in Ukraine and larger “period of protracted systemic instability worldwide.”

The post Michta in RealClearWorld on the necessity of a revised US national security strategy appeared first on Atlantic Council.

]]>

On January 18, an article written by Andrew Michta, Director and Senior Fellow in the Scowcroft Strategy Initiative, was featured in RealClearWorld discussing how the United States requires a new national security strategy to better address both the war in Ukraine and larger “period of protracted systemic instability worldwide.”

Washington is in need of a national security strategy that isn’t reactive and instead shapes the global security environment.

Andrew Michta

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Michta in RealClearWorld on the necessity of a revised US national security strategy appeared first on Atlantic Council.

]]>
Michta in Politico discussing the need for a new US national security strategy https://www.atlanticcouncil.org/insight-impact/in-the-news/michta-in-politico-discussing-the-need-for-a-new-us-national-security-strategy/ Mon, 15 Jan 2024 03:00:00 +0000 https://www.atlanticcouncil.org/?p=725737 On January 14, Andrew Michta, Director and Senior Fellow of the Scowcroft Strategy Initiative, was published by Politico on why Congress’s failure to pass the Ukraine aid package in December 2023 demonstrates that the United States should develop a new national security strategy. He argues that “the U.S. and its allies should have laid out […]

The post Michta in Politico discussing the need for a new US national security strategy appeared first on Atlantic Council.

]]>

On January 14, Andrew Michta, Director and Senior Fellow of the Scowcroft Strategy Initiative, was published by Politico on why Congress’s failure to pass the Ukraine aid package in December 2023 demonstrates that the United States should develop a new national security strategy. He argues that “the U.S. and its allies should have laid out a clear vision for victory” from the beginning of Russia’s war in Ukraine but notes that it is not too late to reverse the trend toward a frozen conflict.

Instead of repeating mantras about adapting to the emerging multipolarity, it’s high time to recognize we’ve entered a period of protracted systemic instability worldwide. It’s time for an American national security strategy that doesn’t merely speak about ‘strategic competition’ and ‘maintaining the rules-based international order’ in normative terms, but also draws a geostrategic map of the world that favors U.S. interests — as well as those of its allies.

Andrew Michta

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Michta in Politico discussing the need for a new US national security strategy appeared first on Atlantic Council.

]]>
The sentencing of a US Navy sailor is a window into Chinese espionage. Here’s how the US should respond. https://www.atlanticcouncil.org/blogs/new-atlanticist/the-sentencing-of-a-us-navy-sailor-is-a-window-into-chinese-espionage-heres-how-the-us-should-respond/ Sat, 13 Jan 2024 17:09:30 +0000 https://www.atlanticcouncil.org/?p=724859 China’s intelligence services recognize that national security information does not have to be classified to provide them with value.

The post The sentencing of a US Navy sailor is a window into Chinese espionage. Here’s how the US should respond. appeared first on Atlantic Council.

]]>
The United States and its allies and partners are under constant threat from pervasive efforts by China to collect intelligence, though this rarely makes it into the public eye. This week provided a clear reminder of this threat. On January 8, US Navy sailor Wenheng Zhao, who pled guilty in October 2023 in the Central District of California to one count of conspiring with a foreign intelligence officer and one count of receiving a bribe, was sentenced to twenty-seven months in prison and ordered to pay a $5,500 fine.

Zhao was one of two active duty US servicemembers indicted in August 2023 for providing sensitive US military information to China. The second, Jinchao Wei, was indicted for violating an espionage statute and multiple export violations in the Southern District of California. According to the indictment, he was granted US citizenship while the alleged illegal activities were taking place. (Wei is, of course, presumed innocent until proven guilty in a court of law.)

These two cases are playing out as tensions remain high between the United States and China, even after the November 2023 meeting between US President Joe Biden and Chinese leader Xi Jinping. In response to these court cases, there will be an understandable temptation for the United States to react by doing something to address Chinese espionage, and perhaps even pressure for systemic changes to the US counterintelligence approach. But big, sudden changes often create new and potentially greater vulnerabilities. Instead, policymakers should respond carefully and deliberately by seizing this moment to manage counterintelligence and security risks more effectively over the long term.

This can be done by decreasing the probability of future similar events from occurring, while avoiding creating new risks. Specifically, the response should consider focusing on prevention via training, enhanced information-sharing with allies and partners, and a shift to a more holistic risk-based personnel security approach for all US military members.

Intelligence collection doesn’t always mean stealing classified secrets

These two cases suggest that China’s intelligence services recognize that national security information does not have to be classified to provide them with value.  

Although both Zhao and Wei reportedly had secret-level security clearances, they were not assigned to particularly sensitive military occupational specialties, and there are no indications within the indictments that they passed classified information to Beijing’s intelligence services.

Wei was assigned to the USS Essex amphibious assault ship, which operates as a “Lightning carrier,” a platform for fifth generation F-35B Lightning strike aircraft. He allegedly used his phone to take photos that he provided to China’s intelligence services, while also providing information regarding potential vulnerabilities of the USS Wasp class of US Navy ship.

Zhao reportedly provided Chinese intelligence with information regarding the electrical system for a storage facility at a base in Okinawa housing a Ground/Air Task-Oriented Radar system. This radar system is used for expeditionary warfare that supports Marines in a contested or potentially contested maritime area—the kind of warfare that would matter in a conflict in the Western Pacific.

Given China’s resources, these were low-cost operations relative to the information allegedly received and a high return on investment to enhance Beijing’s hard power. As compensation for their alleged activities, Wei reportedly received between $10,000 and $15,000, while Zhao received the equivalent of almost $15,000.  

Three new steps to bolster counterintelligence and security

While these cases shed light on national security risks for the United States and its allies and partners, they also present the opportunity to justify new options for Washington to respond. That response should not, for example, be to limit the opportunities for foreign nationals to serve honorably in the US military or take measures that could damage recruitment and retention. Rather, it should take careful, measured steps to reinforce the foundations of counterintelligence and security. There are three steps policymakers should take next:

1. Focus more on prevention relative to treatment

In the medical community, doctors think of solutions in terms of prevention and treatment. For national security, the United States must do both, but in this instance, prevention—via training—should be the focus.

Specifically, the Department of Defense should enhance its counterintelligence threat awareness and reporting training program. This can be done by increasing the frequency of the training, presenting the information in different ways, and requiring a signed acknowledgement of responsibility from the training recipient. Such prevention measures would require additional resources for the Department of Defense counterintelligence and security system, but it would be worth the cost since the enhanced training requirements would decrease risk and potential costs overall.

2. Mobilize allies and partners to work together on counterintelligence

While protecting the integrity of the criminal justice process, the United States should consider sharing as much information as possible with its allies and partners about the methods that China’s intelligence services use to conduct their operations, particularly US allies and partners in the Indo-Pacific, since they are likely being targeted using similar methods. 

Specifically, the US counterintelligence community should host periodic events with its allies and partners to exchange information regarding how Beijing’s intelligence services target military members. This will help educate their military personnel regarding the evolving threat, including the types of cover used to approach potential targets. In the case of Zhao, the Chinese intelligence officer reportedly portrayed himself to Zhao as a maritime economic researcher, who needed information in order to “inform investment decisions.”

3. Establish a more holistic approach to personnel security that better integrates counterintelligence

Finally, the Department of Defense should consider enhancing the current security clearance-based system with a more holistic, risk-based personnel security approach. This would include those US military members who do not require access to classified information.

How might this work? There are various policies and systems already in place for personnel security and information security, especially for individuals who hold top secret security clearances and those who work in sensitive compartmented information facilities (SCIFs). Those important safeguards for security clearance holders should remain, but there are currently disconnects between security considerations (Do the duties of a position require working with sensitive information?) and counterintelligence findings (What information might China or other countries want?). The goal, then, should be to more closely integrate security and counterintelligence. Such an approach would fuse counterintelligence information regarding the evolving capabilities and intentions of foreign intelligence services with information about the duties of the position.

The risks of national security information being provided to foreign intelligence services have always existed and can never be eliminated, so the objective should be to optimally manage those risks. This could best be accomplished by investing in training, increasing sharing with allies and partners, and shifting to a more holistic risk-based personnel security approach for all US military members. 

Given the long-term and dynamic challenges of US-China strategic competition, now is the time to adapt US counterintelligence and security policy to effectively meet those challenges posed by China’s intelligence collection efforts.


Andrew Brown is a nonresident fellow with the Atlantic Council’s Indo-Pacific Security Initiative, where he specializes in defense and intelligence issues. He was previously a criminal investigator with the Department of Defense and was assigned to the Office of the Director of National Intelligence (ODNI).

The views expressed in this article are the author’s and do not reflect those of the Department of Defense or ODNI.

The post The sentencing of a US Navy sailor is a window into Chinese espionage. Here’s how the US should respond. appeared first on Atlantic Council.

]]>
What Kenya’s proposed mission to Haiti says about Nairobi’s foreign policy https://www.atlanticcouncil.org/blogs/africasource/what-kenyas-proposed-mission-to-haiti-says-about-nairobis-foreign-policy/ Thu, 21 Dec 2023 16:45:56 +0000 https://www.atlanticcouncil.org/?p=717597 Success in Ruto’s foreign policy approach depends, in part, on the success of this mission to Haiti—one that will be hard to come by.

The post What Kenya’s proposed mission to Haiti says about Nairobi’s foreign policy appeared first on Atlantic Council.

]]>
Kenya, under President William Ruto, is reorienting its foreign policy approach to Africa and its diaspora, seeking to be a leader on the continent and across the Global South. Its proposed mission to Haiti emphasizes this keen interest.

In the aftermath of the assassination of Haitian President Jovenel Moïse in 2021, the Caribbean republic has seen escalating gang violence that has threatened the political system and security. Between January and August of this year, 2,439 Haitians were killed, 951 were kidnapped, and 902 were injured. On October 3, the United Nations (UN) Security Council adopted resolution 2699, which approved a multinational mission, led by Kenya, to help the Haitian National Police defeat the onslaught of criminal gangs perpetrating violence and other crimes. Although the mission is UN-authorized, it is not an official UN peacekeeping mission. Kenya plans to lead the mission by sending over a thousand officers, a number that will be supplemented further by the Bahamas, Jamaica, and Antigua and Barbuda.

An intervention in a Caribbean state by an African country could perplex some given the vast physical distance between the regions and a lack of historic military and security support. However, the planned deployment aligns closely with Ruto’s foreign relations agenda.

Under Ruto’s presidency, Kenya has stepped up to play a more active role in regional and international politics and to secure for itself a leadership role in championing African interests. Kenya hosted the first Africa Climate Summit in September which concluded with the Nairobi Declaration, a document laying out a consensus among participating African countries about their climate priorities. Ruto also recently announced that Kenya will no longer require visas for visitors from all countries beginning January 2024 in an effort to boost tourism and international connectivity.  

A policing mission to Haiti could further raise Kenya’s profile as a champion of African interests. While there has been little collaboration between African countries and Haiti historically, many Haitians are a part of the African diaspora. Since Haiti’s 1804 revolution and independence, the country has experienced repeated bouts of instability further worsened by nearly two decades of occupation by the United States (from 1915 to 1934), and subsequent UN-approved intervention missions, including one led by Brazil that ran from 2004 to 2017. For Kenya to achieve its newly oriented foreign-policy goals through this intervention, it would have to avoid repeating the failures seen in past missions and steer clear of channeling US paternalism.

In October 2022, Acting Haitian Prime Minister Ariel Henry authorized a request for foreign intervention through a written appeal to international partners. However, observers including the National Haitian American Elected Officials Network and the Family Action Network Movement are highly skeptical of further intervention and are concerned that supporting the unelected Henry government could worsen the nation’s political crisis. Those organizations have called on the Biden administration to withdraw US support for the mission.

Critics in Kenya have been asking another question: Who asked Kenya, specifically, to intervene? Officially, Kenya volunteered to lead the security force on July 29 in a statement by former Minister of Foreign Affairs Alfred Mutua. According to Mutua, the commitment came after a request by the “Friends of Haiti Group of Nations.” However, some observers argue that Kenya is leading the intervention to be a good “friend” to the United States. In September, the United States pledged one hundred million dollars in support to the intervention; days later, the United States and Kenya signed a defense agreement that included resources and support for security deployments.

Putting theories and unknowns aside, it is clear that Kenya is taking a newly proactive approach to the crisis in Haiti. That new approach underscores Ruto’s atypical foreign policy strategy, which aims to distinguish Kenya from its African peers globally and add to Nairobi’s list of accomplishments as a pan-African leader. Success in achieving that strategy could pave the way for greater influence in regional and international politics, setting Kenya up to challenge South Africa and Nigeria, who have historically been regional hegemons. But success in Ruto’s foreign policy approach depends, in part, on the success of this mission to Haiti—one that will be hard to come by.

To be sure, Ruto’s plan has faced numerous domestic challenges. On November 16, Kenya’s high court extended an order blocking the mission’s deployment pending a final decision in January 2024. Despite the court order, the mission was approved by the Kenyan Parliament.

There have also been signs that public support is mixed, as some people have questioned Nairobi’s priorities, arguing that it should focus on protecting lives in Kenya first. Currently, insurgencies are underway along the Somalia border and cattle banditry and clashes between nomadic pastoralists have challenged communities in Northern Kenya.

Amnesty International has also condemned the deployment, not just because of a “troubling history of abuses” associated with past interventions in Haiti, but also because of extrajudicial killings and excessive force used by the Kenyan police. These concerns about human rights violations raise questions as to whether the Kenyan police will be able to succeed in Haiti where other missions have failed.

Regardless, the first batch of police officers have begun training for their planned mission in Haiti. In preparation for the deployment, the director general of the Haitian National Police, alongside a delegation from the Haitian government, visited Kenya last week. However, in early November, Interior Minister Kithure Kindiki asserted that police officers will not be deployed to Haiti “unless all resources”—perhaps including extra funding from the United Nations, recently requested by Kenya—“are mobilized and availed.”

Former Kenyan President Uhuru Kenyatta oriented Nairobi’s foreign policy more closely towards China. Ruto, on the other hand, appears more interested in seeking out partnerships with the West—particularly the United States. This year alone, at least six high-level US officials have visited Kenya: First Lady Jill Biden, United States Agency for International Development Administrator Samantha Power, Secretary of Defense Lloyd Austin, Trade Representative Katherine Tai, Ambassador to the United Nations Linda Thomas-Greenfield, and Special Presidential Envoy for Climate John Kerry. Kenya and the Millennium Challenge Corporation also signed a sixty-million-dollar threshold program focused on urban mobility and growth in September.

At the same time, Ruto’s administration has also developed a new policy focused on pan-Africanism and, in its dealings beyond the continent, South-South cooperation. If Kenya were to achieve success in Haiti, which would require learning from the tough lessons of past interventions while incorporating the aspirations of Haitians, its global profile could benefit, and Nairobi could secure a status as a reliable ally to the United States both on the continent and beyond.

It remains to be seen whether Kenyan police will eventually be deployed to Haiti. If the deployment occurs, watch the mission closely: Success in helping Haiti secure its future, if attained properly and without repeating mistakes of the past, could see Kenya amplify its bid to claim a bigger seat on the world stage.


Sibi Nyaoga was a young global professional at the Atlantic Council’s Africa Center.

The post What Kenya’s proposed mission to Haiti says about Nairobi’s foreign policy appeared first on Atlantic Council.

]]>
Evolving cooperative security approaches for tomorrow’s realities https://www.atlanticcouncil.org/in-depth-research-reports/report/evolving-cooperative-security-approaches-for-tomorrows-realities/ Wed, 20 Dec 2023 21:08:29 +0000 https://www.atlanticcouncil.org/?p=714421 US security cooperation, which are military aid activities led or executed by the US Department of Defense, is immensely valuable if done right and can help the United States achieve its goal from the 2022 National Security Strategy (NSS) by building a strong coalition of allies to confront shared challenges.

The post Evolving cooperative security approaches for tomorrow’s realities appeared first on Atlantic Council.

]]>
Table of contents

Introduction

The United States should adapt its approach to security cooperation to ensure allies and partners are more highly capable, stable, and resilient in an era of great power competition. US security cooperation, which are military aid activities led or executed by the US Department of Defense, is immensely valuable if done right and can help the United States achieve its goal from the 2022 National Security Strategy (NSS) by building a strong coalition of allies to confront shared challenges.

The last decade has seen rapid and profound changes in geopolitical realities, technological developments, and US and allied concepts for both what national security objectives should be and how to achieve them. This has had broad implications for all facets of military operations and planning, and the security cooperation enterprise is no exception. While the US Department of Defense’s approach to security cooperation has been evolving and improving over the same period, lessons learned from recent conflicts—along with shifts in the geopolitical context—point to the need for a deeper re-conceptualization of generating high-end cooperative security.

This paper reframes elements of US security cooperation, particularly with the United States’ most capable allies and partners, and proposes small but realistic reforms that could improve the value and utility of US security cooperation activities. In many cases, those responsible for addressing these issues are already taking steps in this direction; still, it is critical to amplify, draw attention to, and reinforce the arguments in favor of these efforts. This paper draws upon discussions and workshops with experts from across the vast security cooperation enterprise, including participation from US and allied industry, academia, and government entities.

Back to top

Defining key security cooperation terminology

In simplistic terms, military aid is an extension of diplomatic efforts, and most of these efforts are led by the Department of State and categorized as security assistance. Military aid activities that are led or executed by the Department of Defense (DOD) are broadly categorized as security cooperation and can range from the provision of training and equipment, to embedded advisors, joint exercises, meetings between senior leaders, and even forms of humanitarian assistance and disaster response (HA/DR) undertaken by military units1.

While conversations around security cooperation tend to narrowly focus on “train and equip” objectives, doing so ignores the vast array of other incredibly important security cooperation activities—such as key leader engagements (KLE), institutional capacity building through the Ministry of Defense Advisor (MODA) program, and professional development courses—which build the capacity and capability of less advanced US allies and partners in more indirect ways, and arguably have greater potential return on investment (ROI) than traditional, systems-oriented security cooperation activities. These activities are not just about the cost vs impact, however, as they are often critical enablers for all systems-based cooperation. No amount of military-to-military cooperation or interoperability can be effective if the foundation of institutional conditions is missing. For example, Ukraine’s success in absorbing and employing vast amounts of Western military aid is built upon institutional capacity-building investments made over the last decade. Nontraditional and nonmilitary approaches to security cooperation will only become more critical as the proliferation of new technologies expand the battlespace to include the space, cyber, Arctic, and information domains. Moreover, many of the most pressing security threats fall outside the military domain completely, such as the risks posed by economic instability, competition for influence and trust-worthy information and a changing climate.

President Joe Biden meets with military and civilian defense leaders at the White House, including Secretary of Defense Austin and Chairman of the Joint Chiefs of Staff Gen. Milley, 2022. Source: Lisa Ferdinando, US Department of Defense

Security cooperation activities are national geopolitical tools that are employed by the DOD on behalf of the US government to achieve national and defense objectives. Although it is called aid, it is not charity. These activities are meant to bolster US national security, and often in a cost-effective way. They are a means to achieving geopolitical and national security objectives. Even so, the sovereignty of US allies and partners is important and they must always have the final say in what and how they build and deploy their military capabilities, regardless of how they are sourced. What makes the US-led alliance network so powerful is that, unlike its competitors, the United States sees global security and prosperity—enabled by a rules based-order that protects nations small and large—as in its core interest.

Differentiating between the types of cooperative security partners and approaches

Security cooperation means and ends vary by nation and region. The diversity of partner nations means that US security cooperation objectives and activities with each country are similarly diverse to match the partner’s capacity, size, level of training, and funding. As the objectives differ, so, too, should the basis and metrics for evaluating the effectiveness and therefore the value of different security cooperation activity. For instance, military aid that is used as a package to achieve political concessions will look distinct from that used to assist nations in maintaining internal security, responding to natural disasters, or protecting themselves against a foreign aggressor. The objectives of each US security cooperation activity should be policy-led, and have a clear articulation of the objective, why it is being sought, and how success will be measured. Unfortunately, this has not historically been the case. In 2017, the National Defense Authorization Act (NDAA) included reforms around security cooperation to improve DOD’s approach to this issue. Despite this, change is happening slowly and unevenly, and there is still a lack of understanding of the value and objectives of different types of security cooperation activities and how they apply to different categories of allies and partners.

This paper focuses in on two specific categories of US allies and partners as described in the short-lived Guidance for the Development of Allies and Partners (GDAP). First, “most capable” partners encompassing advanced militaries with some near-peer capabilities (e.g., the United Kingdom and Japan) and, second, “frontline” nations facing potential aggression and direct threat (e.g., Ukraine and Iraq). In both categories, the US aim is to build the military capacity and capability2 of an allied or partner nation to fight alongside the United States in combined operations. In certain circumstances, this is done by supporting partner forces to undertake contingency operations on their own without US presence, being enabled by US forces, or utilizing US authorities and agreements (also known as the “by, with, and through” strategy)—thereby reducing the requirement for direct action by US forces themselves.

Back to top

The modern threat landscape: What it means for security cooperation

A Polish Leopard 2 Tank is covered by US paratroopers during a combined training exercise in Poland, 2022. Source: US Army photo by Sgt. Garrett Ty Whitfield

Like all facets of military operations, security cooperation should be strategy-driven and therefore threat-informed—the threat environment has changed, and so, too, must security cooperation. During the post-Cold War era, when there were few clear and present threats and Russia was the primary adversary, US security cooperation activities promoted presence, dependability, and engagement across the globe. Following the 9/11 attacks, US security cooperation activities shifted toward capacity-building to support counterterrorism and counterinsurgency operations largely in the middle east, still with few limits as to where and with whom. Now, as the United States refocuses its efforts in an era of strategic competition with China and Russia, it must similarly reimagine and broaden its approach to security cooperation. All elements of US national power should be mobilized and coordinated to achieve stated objectives. While US practitioners recognize the need to evolve, the US defense enterprise is not changing quickly enough and at a scale large enough to meet the magnitude of the threats at hand. Particularly, the security cooperation enterprise must evolve to prioritize those partners who play a critical or central role in achieving specific objectives and recognize the impact of emerging and advanced technologies.

Prioritization of partnerships

Today’s strategic environment is characterized by pervasive contestation with near-peer competitors across multiple domains, and prioritization of efforts to tackle these challenges has become imperative. The United States and its allies and partners can no longer do a little bit of everything, everywhere and expect uncontested results. As highlighted in the 2022 National Defense Strategy (NDS), the United States will need to accept risk in some areas and strategically expend its limited resources where they will have the greatest effect. In doing so, the United States must be realistic about which allies and partners could (and would) undertake military actions alongside the United States in a high-end, conventional contingency. In the likely case that only a few partners are willing or capable of undertaking frontline roles in a high-end fight, the United States ought to rethink what capabilities they require to play an effective role—which, in many cases, will mean a larger quantity of second-tier or legacy capabilities such as F-16s or simpler 3rd party capabilities such as Leopard 2 tanks rather than a handful of the most advanced and cutting-edge systems like F-35s and Abrams tanks. DOD’s GDAP guidance provided a helpful starting point for letting the roles of allies and partners guide capability and capacity decisions in security cooperation. However, changes in the strategic landscape have altered the roles of allies and partners, which necessitated a reframing of the security cooperation focus with them. If the United States is realistic about the roles allies and partners play in each region and in relation to US national objectives, then US priorities and therefore its acceptance of risk in certain regions or nations, may change. This discussion is not receiving proper attention in Washington, DC or elsewhere, least of all in the public domain.

Emerging and advanced technologies

Advancements in military technology, and the subsequent changes in the way conflicts are being fought, have further implications for the roles of allies and partners and the capabilities and capacities the United States seeks to build through security cooperation. This is most evident from the war in Ukraine and the role security cooperation played in assisting Kyiv. Ukraine, a smaller and less technologically advanced military force, can—when sufficiently supplied, trained, and motivated—impose significant losses on Russia, a larger and more sophisticated force (supposedly the world’s third most advanced and capable), using a combination of legacy and ‘second tier’ equipment, supplemented with some key ‘tier 1’ capabilities and an array of cheaper alternatively sourced systems (such as the highly effective Turkish made Bayraktar TB2.) The value and force multiplier effect of even a handful of exquisite weapons systems, particularly the HIMARs rocket launchers, when combined with a larger quantity of older legacy systems, and when employed with appropriate operational concepts and planning, can have a dramatic impact. Additionally, Ukraine’s ability to absorb massive amounts advanced Western designed systems into a force not oriented to operate them demonstrates both how important those high-end systems remain and suggest the need for a rethinking of a military force’s real-world absorptive capacity under the right conditions. That said, the difficulty Ukraine has faced in achieving decisive gains during its counter offensive—even when equipped with high-end Western capabilities—demonstrate how challenging highend military maneuver is for offense now, and that recent technological developments have shifted the balance back towards a natural advantage in defense. For security cooperation purposes, this means a first principles reassessment is needed of each ally and partner—not only of the role the United States wants a partner to play, but also a rethinking of the tools and systems needed to achieve the necessary capability to fulfill it.

Back to top

Challenges to twenty-first century security cooperation

While the war in Ukraine, as well as other historical cases, have demonstrated the impact of security cooperation on a nation’s ability to fight, it has also highlighted key challenges facing the security cooperation enterprise.

First, the conflict in Ukraine has both exposed and exacerbated the NATO alliance’s insufficient industrial capacity for weapons and ammunition production to sustain a protracted high-end conflict. The United States and its allies have supplied incredible amounts of equipment and ammunition to Ukraine at the expense of drawing down their domestic stocks in some cases—which will likely take years to replace. Putting aside the impact this has on the United States’ readiness and ability to execute other military contingencies in the short term, it is unclear how well it could sustain itself in a more costly protracted conflict in which the United States were a direct combatant—let alone also supplying critical allies. As it stands, there are already promises of equipment and ammunition that are unfulfilled. Allies and partners cannot fight with weapons they do not have, and the United States cannot provide what it cannot produce. Moreover, the challenge for both sides in the conflict in finding personnel and equipment necessary to generate combat power raises questions about the sustainability of any nation in supporting a protracted high-end fight.

Second, expansive arsenals of weapons are of little utility if there is not political will to participate in the conflict. Take, for instance, the opening stages of international efforts to establish a no-fly zone over Libya during its 2011 civil war. European militaries not only struggled with insufficient stocks of advanced precision air munitions to undertake sustained airstrikes on their own, but also struggled to build a widespread coalition of willing partners. This was despite several European nations being strong proponents of the intervention. In reality, the United States employed much of the military capability—particularly at the outset and once ammunition supplies ran low—because partners either lacked key capabilities or the sufficient risk appetite to put the capabilities they did have in danger against what was then the second largest, if aged and limited, surface-to-missile network in Africa. While European nations have been steadfast supporters of Ukraine, and have now overtaken the US in absolute terms of aid provided. However, against a more advanced defense, with higher political stakes, and in more importantly where it occurs in regions distant from those nation’s immediate interests, it is difficult to predict how many allied and partner nations will commit significant forces in a high-end fight. This ought to inform the level of cooperative security resources allocated across allies and partners.

US Air Force, French and Royal Air Force fighter aircraft participate in formation flight. Source: US Air Force photo by Staff Sgt. Alexander Cook

Third, while the United States and its allies and partners aspire to reach a level of interoperability with one another, balancing this with cost and capacity creates a challenging conundrum. Interoperability is often a defining characteristic of train and equip efforts, encompassing a spectrum of functions from interoperable communications systems to enable deconfliction of actions, through to crews of different nations serving together on other nations systems (at its most exquisite and aspirational), as has been suggested in the recent submarine-focused elements of the AUKUS agreement between Australia, the United Kingdom, and the United States. The challenge is that US equipment is often too expensive for many partners to acquire in sufficient numbers, which leads them to look for cheaper alternatives from other—and sometimes adversarial—suppliers. As warfare becomes increasingly networked and data-driven (i.e., software- rather than hardware-driven), systems whether from the United States or another country, must be interoperable or unacceptable limitations and risks will rise under operational conditions.

Fourth, as with many DOD activities, there exists a disconnect between the strategic planning, force planning, and security cooperation communities. Effective planning and coordination with allies on capabilities and force development first requires cohesive planning within these three communities. However, cross-community collaboration is often limited due to distinct organizational cultures, methodologies, incentives, languages, priorities, and decision processes. In order to achieve strategy-driven and force-informed security cooperation activities, these groups must talk to one another in a uniform language to inform, coordinate, and mutually support key priorities.

Finally, with every space contested—across all elements of national power—risks are omnipresent, and the risk calculus of US allies for standing with the United States against an adversary become much more complex, nuanced, and with greater tradeoffs to consider. This is especially true when considering China and Russia, who are increasingly interconnected in the economies and energy grids of US allies and partners. In this environment, platitudes, well-intentioned sentiments, and policy statements must result in meaningful actions—such as improving the sharing of information and collaboration in technology development—that demonstrate the value and collaborative intentions of the DOD.

The challenges here are unlikely to reduce over time— systems will continue to become more sophisticated, and budgets will continue to be constrained. The United States must start by deciding what it wants and needs from its partners, and let that inform the way in which it designs its security cooperation systems and activities.

Back to top

The path ahead

A number of steps can be taken to advance and evolve US cooperative security approaches, but a shift in mindset—particularly, in how the United States views and values security cooperation— must lay the foundation to achieving long-term change. The ideas below could help foster or complement this cultural shift.

Information and technology sharing: Take a “collaboration-first” mentality with the closest and most capable allies

A soldier uses a radio comm, 2020. Source: US Army

While US adversaries cannot easily replicate, short-cut, or catch up on the advantage offered by the United States’ robust network of alliance and partnerships, the United States can easily squander it. If the United States fails to evolve the depth and quality of its relationship with key partners; takes frontline partners for granted; or treats relationships as transactional; then the return on investment will be marginal and relationships may erode over time.

Therefore, to maximize the value of the network, DOD should take a “collaboration-first” mentality with its closest and most capable allies in information and technology sharing. For example, rather than a reflexive move to classify documents as Not Releasable to Foreign Nationals (NOFORN) out of an over-abundance of caution or lack of proper training which unnecessarily constrains information-sharing with likeminded nations, DOD personnel should seek to be as collaborative as possible. While reforms are underway across DOD to improve issues of over-classification, these efforts must be broadened to encompass the way classification is taught, the mentality of leadership and desk officers, and even adjustments in simple systems, such as changing the order of drop-down classification options in digital interfaces so that NOFORN is not the top (and laziest) choice. The United States can also learn from its friends: In some allied nations, classification of information as NOFORN-equivalent requires approval by director and above leadership. Of course, this does not mean all information should be shared—or that classifications should be abandoned—rather it means that unnecessary barriers to information sharing ought to be further examined, and the mindset changed from a simplistic ‘better to be safe than sorry’ to considering what might opportunities or benefits might be lost by not sharing, and a realistic assessment of the actual risk of sharing.

This mentality is as important—if not more so—in technology sharing as it is with information sharing: While information is often critical at a single point in time, technological advantage has a lasting impact and therefore faces even stricter access constraints. There also exists a longer history of intelligence-sharing arrangements, and so processes are more mature. The Five Eyes information sharing arrangement (between the United States, United Kingdom, Canada, Australia, and New Zealand) was formally established after World War II while the National Technology and Industrial Base (NTIB) arrangement (a roughly equivalent research and development (R&D) agreement) was only formalized in the 1990s. Today, partnerships like AUKUS offer the opportunity to trial technology sharing with the United States’ closes allies and potentially export this model to other likeminded nations, particularly looking at Pillar 2 which creates space for the collaborative development of critical technologies.

A convening of AUKUS partners, including Secretary of Defense Lloyd Austin III, British Secretary of State for Defense Ben Wallace, and Australian Defense Minister Richard Marles, 2022. Source: US Navy photo by Petty Officer 2nd Class Alexander Kubitza

In the AUKUS context, efforts at reforming specific bottle necks and challenges are underway, such as the Keeping Our Allies Leading in Advancement (KOALA Act) and TORPEDO Act along with a variety of others exemptions. These developments are welcome and critical, but they are yet to be progressed, and approach the problem in a largely disjointed and piece-meal way that is insufficient to address all concerns, even for just these two key partners. In the medium term, the AUKUS framework ought to be viewed as a pathfinder, with lessons learned through this collaboration and key elements of the approach expanded to other allies who can be considered as “most capable”.

Moreover, while there is no doubt that changes and improvements in specific elements of the process is both welcome and valuable—for instance earlier releasability of updated capabilities could potentially halve the timeframes for building FMS cases. While eliminating transactional licenses or removing the need for recertification after approval for transfers would reduce the bureaucratic burden by reducing duplication without increasing risk, it is mostly piecemeal and disjointed—there is a broader shift in attitude and culture across multiple agencies that is needed to truly increase competitiveness. All US government agencies involved in the process should consider whether their organizational culture and staff training is sufficiently modernized for the new fight, but there are specific pain points for allies within the community. For instance, the allies consider the Defense Technology Security Agency (DTSA) to be monolithic and outdated in its approach to foreign nations, without sufficient consideration to the context of individual relationships. The teams within the Department of State that oversee the FMS processes are perceived to lack coordination with each other and could modernize their approaches by learning lessons from the Department of Commerce teams who oversee dual-use technologies. At the Pentagon, there are anecdotal stories of senior allied military officials being left at the entrance because of mix-ups with visitor registrations, and US staffers preparing talking points for meetings with them that were labelled NORFORN. Senior officials understand the importance of allies and have an intent to remedy these issues, but too often there is a disconnect between the staff working directly with allies, the senior leadership and the bureaucrats who manage the enabling processes. Remedying these issues would not only improve the process and eliminate outdated barriers, but also improve the perception and trust in the United States as an effective partner and ally.

A US paratrooper trains a Polish soldier during a combined training event with Poland, 2022. Source: US Army photo by Master Sgt. Alexander Burnett

US personnel must also understand the value of collaboration, rather than viewing security cooperation as a one-way street in which the benevolent superpower bestows gifts on its friends. Not only does this undermine the relationships and trust of US allies, but it also means the United States may miss opportunities to gain from new niche technologies home-grown by allies, unique operational insights from allies’ own geo-political context, opportunities for experimentation that a smaller and more agile force can undertake, or even foreign-born talent and expertise. Particularly, the DOD could boost the Foreign Comparative Testing (FCT) program and drop requirements for a potential technology to be sponsored by a service. As part of the Undersecretary of Defense for Research and Engineering, the FCT program seeks to find, assess, and test high readiness level technologies from foreign countries to see if they could be of use to US forces. These programs should be given the remit and resources to freely scout the best-in-class capabilities from across the network of alliances and find ways to adapt and adopt them into the US military.

Increase cooperation in mutual and shared planning and production

As the security environment evolves, allies and partners may shift their thinking about what capabilities to acquire from the United States, as well as the depth of integration. Interoperability has long been the pinnacle aspiration for allied operations, shaping force planning and systems procurement. However, although it remains desirable, many nations are now more wary of creating dependencies. This may result from decades of operating together in the Middle East; effects of more complex geopolitical realities; the very real considerations of cost, timelines, and supply chain capacity; a realization of the difficulty of attaining true interoperability; or simply from a shift in mindset. It may also reflect the growth and maturation of third-nation suppliers within the US partner ecosystem (such as South Korea and Taiwan). Regardless, if the United States and its partners are to find the right balance between quantity, quality, and interoperability of their forces, careful consideration is needed to identify which systems need to be US-sourced, which can be US-designed and foreign built, which can be foreign built to interoperable standards, which need to be the most exquisite in capability, and which legacy systems are sufficient with the right enhancements. All nations do this already, but the lessons from Ukraine’s success is absorbing massive amounts of military aid, along with a study of the realities of that conflict, warrants a careful and in-depth reassessment of the what, how, and why of such decisions.

Three F-35A Lighting IIs flying during a refueling mission near Phoenix, Arizona, 2019. Source: US Air Force photo by Airman Brooke Moeder

Supply chain fragility and capacity issues may3 also be addressed through enhanced allied manufacturing capabilities. The United States should prioritize finding alternate means of fulfilling partner capability needs, either through bolstering co-production in third nations, increasing the options of cheaper and simpler versions of US systems, or creating pathways to integrate allied national capabilities into US operational systems (e.g., communications systems, Common Operating Picture, and other informational and targeting systems). This approach has been demonstrated through the F-35 program, but could be extended to many more systems and platforms. As systems shift from hardware-centric to software-centric, this process should become easier and increase opportunities for collaboration. That said, the shift to software-centric capability thinking needs to be deliberate and intentional, integrating the allies-first mentality and exploring creative ways to collaborate.

Elevate the strategic prioritization and invest first principles planning of security cooperation activities

Having the right capabilities is meaningless without the right strategies, concepts and plans to employ them effectively. However, current security cooperation activities are part of a lengthy and process-heavy planning system, making it difficult to elevate the strategic thinking of security cooperation. Currently, it is easier for US defense planners to retro-fit desired activities to broad strategic intents for a country or region than for them to begin the security cooperation process with hard analysis of the strategic intent and let that guide the development of the proposed activity. It takes years—even decades—to identify, acquire and stand up a sophisticated combat system such as a fighter jet or naval combatant. When strategic focus shifts from, for instance, irregular counterterrorism to near-peer conventional operations, it is easier to shift the justification for an airframe from ‘close air support’ to ‘air dominance’ with the shift in armaments than it is to begin the process over with a consideration of whether it is needed in the new context. To be sure, the platform may still be relevant, or the benefits of continuing with its acquisition justified in the new context. This paper does not advocate for flip-flopping on expensive projects every few years, but there are plenty of examples through history where those shifts have come too late, so a hard rethink and reevaluation is needed when these strategic shifts occur. Moreover, when thinking about military capability-building, the US government too often lets the technology or the platform drive the analysis—often at the behest of a partner who might prioritize prestige over operational need. Instead, the analysis should help planners in determining the best capabilities to fit a given nation’s needs.

Taking a strategic lens to planning requires specialist skills, knowledge, and experience, but the security cooperation workforce is under-resourced relative to this task. The workforce requires staff with a higher quantity of training and understanding at every level to enable more thorough planning activities, and leaders need to invest in workforce development in this sector commensurate with the strategic effects it can generate. The roles of security cooperation liaisons across the DOD and State Department are as critical as any other in the diplomatic and planning sectors, and US policymakers need to elevate and invest in them to reflect that criticality. As part of this shift, the United States must recognize the importance of personal relationships between US planners and allied counterparts and support them to achieve common goals. The Defense Security Cooperation University has recognized the need for a well-educated workforce and has already begun a process to reform its education and certification systems. Finally, all levels of the workforce require close coordination and examination: While US planners engage directly with and understand well ally and partner nations, there is often a disconnect between these action officers and the higher echelons of leadership and policy. Shared knowledge and relationships ought to be translated across the hierarchy.

The human element is often discarded as too hard to quantify or assess in debates around the value and effectiveness of security cooperation. While certainly difficult to quantify, to dismiss the value of human capital disregards the most valuable aspect of that cooperation. Therefore, in seeking to improve oversight, accountability, and effectiveness, the US government must necessarily evolve its concept of the ROI of these activities. The building of goodwill and personal affections generated through people-to-people contact, the spreading of organizational values and culture, and the opportunities created by building people-centered networks are invaluable; they are likely to be the most resilient and vital links in times of crisis and contingency.

Back to top

Conclusion and recommendations

Security cooperation can have strategic effects. In an era of increased geopolitical complexity, strategic competition, shifting tactical considerations driven by emerging technologies, and an increasing range of non-traditional security threats, closer integration and collaboration with US allies and partners is critical. Just as all elements of DOD activities must adapt to these changing conditions, security cooperation approaches must also evolve.

While the core of the US approach is sound, seemingly small shifts in mentality, culture, focus, and approach can have deep and meaningful impacts in the way the United States is perceived by allies and the ROI from these relationships—even if they are difficult to quantify or measure. Treating allies as peers and ensuring the United States’ actions towards them matches the rhetoric, trusting them with informational and technology sharing, and removing small but impactful hurdles can have a dramatic impact. The United States must reconsider and explore new ways to develop capabilities and provide the tools allies and partners need to ensure they have the capacity to meaningfully contribute to shared security goals, including alternate versions of US systems, co-production, and integrating third-party allied systems.

The United States can also learn lessons from recent conflicts to create new tools to enable partners to respond to unexpected regional security crisis and conflict. Finally, DOD leadership can enable the reform and elevation of security cooperation by realigning its place in planning and reporting hierarches, investing in the workforce that undertakes the planning and execution of the activities and ensuring strategic intent and guidance is infused at every level. While US competitors can not readily catch up to the United States’ longstanding and carefully curated advantage, enacting the following recommendations can prevent the erosion of that edge and maximize the ROI provided by alliances and partnerships:

  • Recommendation 1: DOD should take a “lean-to-collaboration-first” mentality with its closest and most capable allies in information and technology sharing. In addition, the DOD must prioritize AUKUS Pillar 2 as a key strategic goal, and as it develops and evolves it must act as a pathfinder for wider reform on this topic.
  • Recommendation 2: DOD should increase the pathways to adopt and adapt allied technological developments. For instance, DOD can do so by boosting the Foreign Comparative Testing (FCT) program and dropping requirements for a potential technology to be sponsored by a service, giving them the remit and resources to freely scout the best-in-class capabilities from across the network of alliances, and find ways to adapt and adopt them into the US military.
  • Recommendation 3: The United States must look for ways to reduce unnecessary and counterproductive burdens of ITAR, such as by eliminating transactional licenses for AUKUS members and removing the need for recertification after approval for transfer has already been agreed upon, and modernizing releasability processes to speed up FMS case development.
  • Recommendation 4: The United States should explore alternate means of fulfilling partner capability needs, either through increased co-production in third nations, increasing the options of cheaper and simpler versions of US systems, or creating pathways to integrate allied national capabilities into US operational systems. Moreover, it should take a deliberate and intentional approach to exploring the opportunities available through a transition from hardware-centric systems to software-centric capability in order to integrate the allies-first mentality and explore creative ways to collaborate.
  • Recommendation 5: The US government must ensure security cooperation policy- and strategic goal-setting is first and foremost ‘threat-informed’ with deep consideration of the partner’s current capability gaps, needs, and future intentions. Further, they should consult more deeply and closely ‘most capable’ allies to enable country plans to evolve existing concepts and intents into operationalized plans with clear roles and responsibilities that each partner can plan for.
  • Recommendation 6: DOD leadership should invest in the security cooperation workforce in a way commensurate with the importance of allies and partners and the strategic effects that security cooperation can generate, expanding it in quantity and improving its quality by investing more in the training of those who undertake it. Moreover, approaches should be shifted to prioritize the importance of person-to-person relationships, while the insights gained by that workforce need better feedback channels to every level of planning to ensure insights are actioned effectively.

Back to top

Acknowledgements

Sponsored By

Lockheed Martin

This report was generously sponsored by Lockheed Martin Corporation. The report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions.

About the author

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

1    Security assistance can, for instance, involve aid and support to police and other non-military security forces. In contrast, DOD security cooperation activities almost exclusively involve another formal foreign military and can cover almost any DOD interaction with that partner to build military- or security-related capacity, or achieve military or security interests. The scope and scale of activities considered to fall under the security cooperation umbrella is quite broad, and often overlapping with State Department-led security assistance activities. Foreign Military Sales (FMS), for instance, is approved and led by State, but executed by the DOD.
2    A military capability is the sum total of inputs required to generate a desired military effect in an operational context—i.e., what function can a military force successfully complete (e.g. the ability to undertake armored operations, intercept enemy missiles, or move personnel or supplies via air). These ‘inputs’ include everything needed to undertake that function – the personnel, training, logistics, infrastructure, operating concepts, enabling systems, and the equipment itself. Capacity, on the other hand, is the quantity of a capability that a military force can generate and employ—i.e., how much of that function can it undertake.
3    Supply chain and manufacturing capacity around the world is constrained and, in many cases, there are only so many suppliers of certain components globally. Therefore, it will not be a panacea to the challenges, though increased and steady demand signals may motivate partner nations to invest in expanding their industrial capacity.

The post Evolving cooperative security approaches for tomorrow’s realities appeared first on Atlantic Council.

]]>
The 5×5—2023: The cybersecurity year in review https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-2023-the-cybersecurity-year-in-review/ Wed, 13 Dec 2023 05:01:00 +0000 https://www.atlanticcouncil.org/?p=714286 A group of Atlantic Council fellows review the past year in cybersecurity, which organizations and initiatives made positive steps, and areas for improvement going forward. 

The post The 5×5—2023: The cybersecurity year in review appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

It has been a busy year in cybersecurity and in the land of policy. On March 2, 2023, the Biden administration released its long-awaited National Cybersecurity Strategy, laying out an ambitious plan to maintain the United States’ advantage in cyberspace and boost the security and resilience of critical technical systems across the economy and society. The document was followed by its Implementation Plan and the National Cyber Workforce and Education Strategy later that summer.

This year saw other noteworthy developments, including cybersecurity failures that resulted in major hacks of organizations ranging from T-Mobile and 23andMe to critical infrastructure in Guam and the Ukrainian military amidst its war with Russia.  There has been no shortage to discuss in 2023, so we brought together a group of Atlantic Council fellows to review the past year in cybersecurity, which organizations and initiatives made positive steps, and areas for improvement going forward. 

Editors of the editor note: The 5×5’s founder and inaugural editor, Simon Handler, is moving on to new adventures, but it bears a note of thanks to Simon for his wit and work ethic in taking this series from an idea through to forty-two issues over the last four years. The series continues, but meanwhile thank you, Simon, and good luck. 

#1 What organization, public or private, had the greatest impact on cybersecurity in 2023? 

Amélie Koran, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council

“Progress Software, the makers of the MOVEit file transfer service which has been the gift that has kept on giving this year when it comes to notable breaches this year. It has impacted private and public sector organizations and over sixty million individuals around the world, with more than 80 percent of the impacted organizations based in the United States. There was rarely a cybersecurity-adjacent news story in 2023 that did not have a component tied to this software.” 

John Speed Meyers, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; principal research scientist, Chainguard

“Since there is not, to a first approximation, a scale on which cybersecurity has been or is measured, it is hard for me to say anything objective. That said, assuming the scale extends below zero, I would like to vote for C and C++ software developers.” 

Justin Sherman, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; founder and chief executive officer, Global Cyber Strategies

“There are, in some ways, too many to pick from—both good and bad. On the positive side in 2023, the United Kingdom’s National Cyber Security Centre continues to roll out voluntary, systemic internet security protections for British networks and organizations, most recently offering its free Domain Name System (DNS) security service to schools. Such decisions exemplify the concept of security at scale, identifying the points with great ‘leverage’ improve security, something with which US policy still struggles. On the side of undermining US cybersecurity, the Chinese government’s expanded efforts to require companies to disclose software vulnerabilities to the state increase a number of hacking risks to the United States and plenty of other countries.” 

Maggie Smith, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; director, Cyber Project, Irregular Warfare Initiative

“I think everyone’s mind immediately goes to Microsoft and its ongoing efforts to assist Ukraine. But I think the company’s impact on cybersecurity goes beyond the all-consuming narrative around the role of the private sector before, during, and in the aftermath of conflict. In September, I read a great post by Cynthia Brumfield on the <Meta>curity Substack (I highly recommend subscribing to its ‘Best Infosec-Related Long Reads for the Week’) about the technical blunders made by Microsoft that gave Chinese actors access to US government emails. For me, it tied a bow around how I feel about how to approach cybersecurity: there is no silver bullet, and no one is ever truly secure. China’s hack highlighted how a company that is literally helping prevent catastrophic cyberattacks can simultaneously be the victim of one. This is a dichotomy inherent to the domain of cyberspace and the impact of seeing it so publicly with Microsoft was my 2023 cybersecurity ‘woah’ moment.” 

Bobbie Stempfley, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; vice president and business unit security officer, Dell Technologies

“It is hard not to say that the Security and Exchange Commission (SEC) has had the greatest impact on cybersecurity, given how active it has been in this space. That being said, recognizing the National Institute for Standards and Technology and its publication of post-quantum encryption standards for three of its four selected algorithms and intention to evaluate the next wave of algorithms has great impact on national security.” 

#2 What was the most impactful cyber policy or initiative of 2023? 

Koran: “I would say that the US National Cybersecurity Strategy would count in this category because it was released, debated, and followed with an implementation plan. Getting any policy or directive out of the government and through the gauntlet of reviews, markup, critique, and public consumption is to be lauded. Is it perfect? No. Is it a good start? Yes. For it to succeed and the United States to continue to lead in these policy areas, policymakers need maintain, revise, and consider it a living document. For the implementation plan, leaders need to realize that these were lofty goals with aggressive timelines—many of which may be missed—but to keep trying.” 

Meyers: “Overlooking the aforementioned lack of a cybersecurity impact scale, I would nominate the Internet Security Research Group’s Prossimo project or, more parochially, the creation of Wolfi, a new security-first Linux distribution.” 

Sherman: “The 2023 US National Cybersecurity Strategy is particularly significant because of its strong, explicit bent toward regulation. It is the product of an important, positive, and long overdue decision to focus US cyber policy on where and why companies are not investing in cybersecurity, rather than continue to speak purely about public-private partnerships and ignore the failures of the market to address the risks to citizens, businesses, and the country. As a point of comparison for this shift, the 2023 cyber strategy mentions ‘regulation’ or some variant of it forty times—while the previous National Cyber Strategy, released in 2018, did not say ‘regulation’ once.” 

Smith: “For impact in 2023, the Department of Defense (DoD) Cyber Strategy is at the top of my list because it places a hard stop on DoD by clearly defining its jurisdictional limits. With the rise of ransomware and other forms of pervasive cybercrime, US Cyber Command has often worked to support other US entities to combat attacks. Many viewed DoD’s activity as blurring the line and stepping dangerously close to getting involved in domestic cybersecurity. The 2023 DoD Cyber Strategy clearly draws the line: The Department, in particular, lacks the authority to employ military forces to defend private companies against cyber-attacks. It may do so only if directed by the President, or (1) if the Secretary of Defense or other appropriate DoD official approves a request for defense support of civil authorities from the Department of Homeland Security, Federal Bureau of Investigation, or another appropriate lead Federal agency; (2) at the invitation of such a company; and (3) in coordination with the relevant local or Federal authority. Given this—and the limited circumstances in which military cyber forces would be asked to defend civilian critical infrastructure—the Department will not posture itself to defend every private sector network.” 

Stempfley: “The Delaware Court of Chancery ruling that expands the duty of care from ‘directors’ to ‘officers’ and takes an expansive view of what an officer is at a company.  The ruling in the McDonald’s Corporation Stockholder Derivative Litigation, while not getting the same attention as the SEC rule or the National Cyber Strategy, is creating impact by lining up top-to-bottom conversations about cyber risks in organizations. Additionally, it is likely to lead to more standardization and clarity around the role of the Chief Information Security Officer and other relevant officers.”

#3 What is the most important yet under-reported cyber incident of 2023?

Koran: “The T-Mobile data breaches. If we answer the question of ‘what day is it?’ and reply ‘another day for a T-Mobile breach,’ the company has not learned from its long history of breaches, nor has regulatory framework aided in curbing the regularity and impact of these breaches. While other telecommunications companies have not had as many regular lapses as T-Mobile has had, one wonders what makes them different than the others and if the issue can be remedied. Additionally, the company has decided to cut more jobs and the only thing keeping people away from sensitive areas of the company is a sign on the door of a data center with a strongly worded message of ‘please do not steal any more data.’” 

Meyers: “Using a loose definition of ‘incident,’ I would like to nominate the Cyber Safety Review Board’s decision to investigate the extortion activities of Lapsus$ prior to investigating the Russian intelligence agencies’ epic SolarWinds hack.” 

Sherman: “Among others—recognizing that I am cheating on this response by picking a few—a Chinese state-sponsored group called Volt Typhoon hacked US critical infrastructure systems, including in Guam, which speaks to the cyber-focused risks associated with any potential kinetic conflict with Beijing in the future; hackers exploited the log4j vulnerability to hack into devices and then sell the information to ‘proxyware’ services, which speaks to the intersection of major vulnerabilities and the cryptojacking, adware, and other similar markets; and Russia’s military intelligence agency built malware specifically targeting Android devices to spy on Ukrainian devices and, for a period, gained access to the Ukrainian military’s combat data exchange.” 

Smith: “Earlier this year genetic testing company 23andMe was hacked multiple times. For a long time, I have wondered about mail-order DNA kits and how they store, protect, and manage an individual’s data—consumer genetic testing data, for example, does not fall under the Health Insurance Portability and Accountability Act (HIPAA). As someone who has done genetic testing for a medical reason and felt the ripple effects of what it can reveal, the 23andMe hacks confirmed my fears that sensitive, personal genetic information gathered for commercial purposes may put marginalized groups at risk if stolen. Many genetic mutations, for example, fall in the ‘founder mutation’ category, meaning the mutation is observed with high frequency in a group that is or was geographically or culturally isolated, in which one or more of the ancestors was a carrier of the altered gene. Therefore, it is relatively easy to determine a person’s ethnicity if a founder mutation is present. 23andMe tests for many known founder mutations because they do tell people a lot about their personal history. With antisemitism at peak levels and the first 23andMe hack targeting those of Ashkenazi Jewish heritage, I think the hacking of commercial genetic data deserves a lot more attention.” 

Stempfley: “Ransomware has gotten a great deal of coverage, from the Ransomware Task Force to its highlights in the Verizon Data Breach Report (VDBR) and the financial impact—so what is under-reported in ransomware? The now documented impact to public safety. Early in the year, published research explicitly tied ransomware at hospitals and health care delivery points to impact to patient care. This study showed that in 44 percent of the cases that were studied patient care was impeded leading to negative patient outcomes. This report was published in the Journal of American Medicine Association a mainstream medical journal, not in a security publication.” 

More from the Cyber Statecraft Initiative:

#4 What cybersecurity issue went unaddressed in 2023 but deserves greater attention in 2024? 

Koran: “Not to flog the buzzwords, but better forward-leaning policies and regulations toward security in artificial intelligence (AI) and large language model (LLM) services deserve more attention. Putting these tools and services on the market well before their safety has been successfully worked out, vetted, and peer reviewed greatly increases risk to critical and non-critical infrastructure. While these tools may not be directly flipping switches at power plants and hospitals, the impact of their generated content on mis- and disinformation, at a time when the public is not critically thinking about their output, is dangerous. Even non-LLM or AI-based tools that are labelled as being backed or run by these technologies not only engender a false sense of safety and completeness but also fuel the hype train.” 

Meyers: “The ungodly amount of time that software professionals spend identifying, triaging, and remediating known software vulnerabilities. I thought computers were supposed to make our lives better.” 

Sherman: “Some of the most important protocols for internet traffic transmission globally, such as the Border Gateway Protocol (BGP), remain fundamentally insecure, and many companies and organizations still have not implemented the available cybersecurity improvements. Policymakers should also remember, amid excitement, fear, and craze about generative AI, to think about the cybersecurity of physical internet infrastructure that underpins GenAI—such as the cloud computing systems used to train and deploy models.” 

Smith: “In March, the Environmental Protection Agency (EPA) released a memorandum stressing the need for states to assess cybersecurity risk to drinking water systems and issued a new rule that added cybersecurity assessments to annual state-led Sanitary Survey Programs for public water systems. However, the EPA rescinded the rule after legal challenges. Attorneys general in Iowa, Arkansas, and Missouri, joined by the American Water Works Association and the National Rural Water Association, claimed that making the cybersecurity improvements were too costly for suppliers and those costs would pass to the consumers. Importantly, EPA Assistant Administrator Radhika Fox warned, ‘cyberattacks have the potential to contaminate drinking water, which threatens public health.’ I hope to see more action to protect our public water systems, as well as other systems critical to public health and welfare.” 

Stempfley: “The impact of Generative AI on entry-level positions in the cyber workforce [deserves greater attention]. The cyber workforce shortage has been widely reported, as has the challenge that many new entrants to the field have experienced, but we have not begun to talk about how the impacts from this technology will be disproportionately aligned to those least experienced in the field, potentially doing away with most entry level roles. If this happens, it will require us to think about the workforce in different ways.” 

#5 At year’s end, how do you assess the efficacy of the Biden administration’s 2023 National Cybersecurity Strategy?

Koran: “In a short word, it has been ineffective—despite, as I note above, being the most impactful. Barring the momentum of the software bill of materials (SBOM) message train, the suggested movements by public and private sector organizations to align with the strategy have been resisted or questioned, even though many of the ideas and efforts proposed are laudable. There was not a lot of momentum for these groups to push some of these efforts, and it will take years, not weeks or months, to meet the strategy’s goals. The strategy is a way finder, but Congress—in disarray for quite some time—needs to act to power it. Until Congress passes legislation and appropriations that support government efforts, private sector organizations will have little reason to align unless the market demands change. Everything else has also been overshadowed by global events and politics, and momentum to achieve the goals set out by the strategy will be hard to come by.” 

Meyers: “To be determined. Perhaps it shifted the Overton window on software security and liability, though I suspect that general suspicion of large technology companies did that more than the issuing of any one strategy.” 

Sherman: “The Biden administration’s strategy, particularly with its emphasis on regulation, is an important and long-overdue shift in how the US government is messaging and advancing its cybersecurity policy. However, there is still much to be done, and it is not yet clear exactly how the administration intends to implement the emphasis on regulation in practice—the implementation guidance for the National Cybersecurity Strategy entirely omitted certain sections of the Strategy itself.” 

Smith: “I think it is too early to assess the efficacy of the strategy, but I do think that it is a step forward. As a wild example, the October 22 60 Minutes brought the Five Eyes (United States, Australia, New Zealand, United Kingdom, and Canada) intelligence chiefs together for an interview—something that has never happened before! Before the interview they released a rare joint statement to confront the ‘unprecedented threat’ China poses to the innovation world, and that from quantum technology and robotics to biotechnology and artificial intelligence, China is stealing secrets in various sectors. The best part about the interview, in my opinion, is that it is conducted in a sparse, dimly lit room with all the chiefs sitting around a non-descript round table, adding to the spook factor!” 

Stempfley: “The National Cybersecurity Strategy, its associated implementation plan, and workforce strategy have been important documents and have certainly set the national direction—this direction has served the administration well in domestic and international discussions. The strategy’s influence in the federal budget process and in those elements of industry that do not typically engage in public private partnerships have not been as substantive as hoped.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—2023: The cybersecurity year in review appeared first on Atlantic Council.

]]>
A maritime blockade of Taiwan by the People’s Republic of China: A strategy to defeat fear and coercion https://www.atlanticcouncil.org/content-series/atlantic-council-strategy-paper-series/a-maritime-blockade-of-taiwan-by-the-peoples-republic-of-china-a-strategy-to-defeat-fear-and-coercion/ Tue, 12 Dec 2023 14:00:00 +0000 https://www.atlanticcouncil.org/?p=709566 Marek Jestrab considers a naval blockade of Taiwan by the People's Republic of China and advances recommendations for the United States, Taiwan, and likeminded nations to resist and respond to a blockade.

The post A maritime blockade of Taiwan by the People’s Republic of China: A strategy to defeat fear and coercion appeared first on Atlantic Council.

]]>
FORWARD DEFENSE
STRATEGY PAPER LAUNCH

The United States faces an increasingly challenging international security environment with ongoing conflicts in Europe and the Middle East. Tensions are also rising across the Taiwan Strait. With Xi Jinping charging his military to give him the ability to invade Taiwan by 2027, US and allied defense strategists are rightly concerned about a military contingency in the Taiwan Strait. Yet, while an invasion poses the greatest threat to Taiwan’s sovereignty, a naval blockade might be the most viable option for China.

In this installment of the Atlantic Council Strategy Papers Series, 2022-2023 Senior US Navy Fellow Marek Jestrab articulates a vision to prevent and, if needed, defeat a maritime blockade of Taiwan by China. This strategy paper demonstrates that a maritime blockade is the most strategically viable action for the PRC, that Taiwan is uniquely vulnerable to a blockade, and that a blockade is both a present and enduring challenge. The author presents specific actions for Taiwan, the United States, and like-minded nations with the goal of deterring and, if deterrence fails, defeating a PRC blockade of Taiwan.  

The only predictable element of warfare is that it is inherently unpredictable; a near-singular focus on a Chinese invasion by force risks catching the Taiwanese, US, and likeminded militaries unprepared in the event of a non-kinetic naval blockade.

Stephen J. Hadley, 20th National Security Advisor

Executive summary

Blockade: The most strategically viable option for the PRC 

The People’s Republic of China’s intention to unify Taiwan with the mainland is clear. Leveraging decades of sustained military modernization, the PRC possesses the capability and regional overmatch of maritime capacity required to execute a blockade of Taiwan. The specific actions that the PRC could execute will be discussed as part of this paper, but the term “blockade” in the context of this strategy refers to the PRC using coercive actions to prevent merchant shipping from having freedom of navigation in the waters surrounding Taiwan, and sealing off Taiwan’s seaports to prevent merchant shipping from being able to enter or exit the island.

A blockade is the most likely and dangerous scenario, due to Taiwan’s reliance on maritime trade to sustain its economic prosperity. Moreover, a nonkinetic blockade is appealing to the PRC, as it is the lowest level of coercive action that could remain below the threshold of open hostilities and still achieve its national objectives. The PRC’s maritime threat would be a coercive act, designed to instill fear in the Taiwanese population and the merchant shipping industry.  

The PRC views the existence of Taiwan as a direct threat to its national sovereignty. Because of these perceived threats, the strategic plans of the PRC call for resolution of the “Taiwan question” before China is able to achieve its desired “national rejuvenation” by 2049. To accomplish this goal, the PRC refuses to renounce the use of force to compel unification of Taiwan with the mainland. 

Additionally, the Russia-Ukraine war has made clear that unprovoked invasions of neighboring countries are simple for the world population to understand, and for leaders to rally against. Unlike an invasion, a blockade does not present the same strategic-messaging flaws. Moreover, the PRC’s military strategy indicates an openness to blockades and other uses of “restraint warfare,” which the People’s Liberation Army (PLA) defines as seeking to avoid war first through military preparedness and powerful conventional and strategic forces that act in concert with political and diplomatic efforts to “subdue enemy’s forces without fighting.”1

All these factors point to a maritime blockade of Taiwan as the PRC’s most strategically viable option. Therefore, what is required is a strategy specifically tailored to deterring and, if deterrence fails, defeating a PRC maritime blockade of Taiwan. The major elements of this strategy include Taiwan investing in capabilities that help demonstrate the resilience to resist, the United States maintaining the capability to sustain Taiwan in the face of a blockade, and like-minded nations providing enabling capabilities and additional maritime capacity.

The focus of this paper is on a nonkinetic blockade, but it is worth noting that there are multiple scenarios in which the PRC could utilize maritime advantages in its attempt to unify Taiwan with the mainland. A fundamental challenge of these actions is that the PRC can dynamically scale the operations based on evolving conditions.  

Potential blockade scenarios

  • Kinetic blockade: Focusing effort only on the maritime domain, and the merchant shipping that is vital to sustaining Taiwan’s economic activity, the PRC could attack to sink or disable any merchant ship transiting to Taiwan—clearly constituting an act or acts of war. A coalition response would utilize the same forces that would be vital to countering an invasion scenario and PRC maritime forces. These include long-range precision fires from land-based missile batteries, standoff attacks by aircraft and surface ships, and undersea attacks from submarines. Comprehensive missile-defeat capabilities in the space, cyber, and electronic-warfare domains would also need to be employed to assist in the survivability of merchant shipping.  
  • Nonkinetic blockade: In this scenario, which is the focus of this paper, the PRC would use advantages of mass—enabled by having the world’s largest navy and coast guard, and a government-funded and government-controlled maritime militia—to prevent merchant shipping from entering ports in Taiwan. The PRC has used these tactics on a smaller scale in disputed maritime areas in the South China Sea.  
  • Sporadic and tailored blockade: Utilizing some combination of the kinetic and nonkinetic actions described in this paper, the PRC could slowly erode Taiwan’s will to resist and that of like-minded nations. The PRC could conduct this effort over a longer period that is deliberately unpredictable. The merchant-shipping industry might evaluate the waters around Taiwan as unsafe and disputed, in turn causing insurance-premium increases that prevent the business case for continuing to sail merchant ships to and from Taiwan’s maritime ports.   
  • Embargo/quarantine: The PRC could utilize its maritime forces to attempt to enforce an “embargo” that would prevent certain products from entering Taiwan. The PRC would leverage its success at shutting out Taiwan from international organizations, claiming the action as a “domestic matter” and no concern of the international community. Utilizing the world’s largest coast guard, the PRC would inspect merchant ships transiting to Taiwan or force them to divert to the mainland. 

While there is no consensus on a perfect term to describe the possible coercive actions that the PRC could employ in the maritime domain, “blockade” is utilized in this paper as it is the best available and most wildly understood term.2

This paper puts forth a strategy to prevent and, if needed, defeat a PRC blockade of Taiwan. This is consistent with the US government’s existing One China Policy, with a legal basis grounded in the Taiwan Relations Act of 1979, the US-PRC Joint Communiques of 1972, 1978, and 1982, and President Ronald Reagan’s Six Assurances to Taiwan of 1982.3

What is required is a strategy specifically tailored to deterring and, if deterrence fails, defeating a PRC maritime blockade of Taiwan.

Commander Marek Jestrab, Academic Year 2022-23 Senior US Navy Fellow

Taiwan’s unique vulnerability to blockade

The PRC today possesses the maritime force structure needed for regional overmatch in a blockade scenario. The Chinese Communist Party (CCP) commands the world’s largest navy, the world’s largest coast guard, and a massive government-subsidized maritime militia. From 2005 to 2022, the People’s Liberation Army Navy (PLAN) has added 135 ships to its inventory, while in the same period the US Navy added just two.4 

Located only one hundred nautical miles from mainland China, Taiwan is uniquely vulnerable to a blockade. Taiwan’s dependence on maritime trade is evidenced by the imbalance of its gross domestic product (GDP) in relation to its port activity: Taiwan is the world’s twenty-first largest economy by GDP, yet requires the world’s sixth greatest number of port calls by container ships to sustain this level of economic activity. Taiwan’s largest vulnerability is its energy sector, as it relies on maritime trade to import nearly 98 percent of its energy. 

PRC coercive actions in a maritime blockade of Taiwan

A PRC nonkinetic blockade of Taiwan would consist of a series of coercive actions that are uniquely scalable, and even reversible if the CCP does not believe they will be successful at that time. The goal of these coercive actions would be to create fear of maritime shipping and urge the Taiwan population to force negotiations in which the PRC has maximum leverage over Taiwan. A nonkinetic blockade by the PRC would likely include:

  • Strategic messaging to warn countries against interfering in an “internal dispute”; 
  • Clearly visible maritime intelligence, surveillance, and reconnaissance (ISR) and military aircraft presence; 
  • People’s Armed Forces Maritime Militia (PAFMM) swarming and ramming merchant shipping;
  • Chinese Coast Guard (CCG) harassing and attempting “law-enforcement” interdictions;
  • PLAN ships acting as barriers to transit and clearly visible live-fire exercises;
  • Offensive cyberattacks on government organizations and financial institutions;
  • Severing or holding at risk undersea cables that connect Taiwan to the world;
  • Missile exercises from mainland China that land in the waters surrounding Taiwan;
  • Clearly visible deployment of sea mines; and
  • Limited covert and deniable submarine attacks on merchant shipping.  

Counter-blockade response by Taiwan and the United States

A coalition response coordinated among Taiwan, the United States, and likeminded nations would be needed to restore deterrence. The desired end state would demonstrate the ability to sustain Taiwan’s economy indefinitely in the face of a PRC blockade. Senior leaders of the coalition would likely seek response options that manage the horizontal and vertical escalation of the conflict. Counter blockade actions by Taiwan, the United States, and like-minded nations would likely include: 

  • Condemnation through coordinated strategic messaging, with a focus on the harm caused by the PRC’s actions to the global economy;  
  • Taiwan demonstrating resilience and a will to resist, through implementing resource-rationing programs and reserve-force mobilization;  
  • Targeted sanctions against the PRC that limit its access to global financial markets and critical technology; 
  • Maritime ISR being continuously deployed to document the PRC’s actions; 
  • Reflagging of merchant shipping to coalition national flags that the PRC would be hesitant to attack;  
  • Escort of merchant shipping through the PRC forces by coalition naval warships;  
  • Mine countermeasure forces identifying minefields for merchant shipping to avoid; and 
  • Defensive cyber operations.

Actions to defeat the fear and coercion of a PRC Blockade  

Deterring the PRC from even attempting a blockade requires a strategy that communicates to the PRC that its attempted coercive act would fail and prove to be a grave miscalculation. To communicate this message, an international coalition is required that can demonstrate the capability, ability, and will to sustain Taiwan’s economy indefinitely if it were confronted with a blockade. Implementing this strategy would require that:

  • Taiwan demonstrate the resilience to resist;
  • The United States demonstrate the capability to respond; and
  • Like-minded nations demonstrate enabling capabilities and maritime capacity. 

To read the full strategy paper, download the PDF.

Strategy Paper Editorial board

Executive editors

Frederick Kempe
Alexander V. Mirtchev

Editor-in-chief

Matthew Kroenig

Managing Editor

Andrew A. Michta

Editorial board members

James L. Jones
Odeh Aburdene
Paula Dobriansky
Stephen J. Hadley
Jane Holl Lute
Ginny Mulberger
Stephanie Murphy
Dan Poneman
Arnold Punaro

Lead author

This strategy paper contains the author’s personal views, and do not represent official positions of the US Navy or Department of Defense.  

The author would like to thank Matthew Kroenig, Clementine Starling, Markus Garlauskas, Joseph Webster, and Kitsch Liao for their review and feedback. The author would also like to thank Julia Siegel and Shreya Lad for their editing and administrative support.

With a Foreword by

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

1    “2023 Report on Military and Security Developments Involving the People’s Republic of China,” US Department of Defense (DOD), October 19, 202, https://media.defense.gov/2023/Oct/19/2003323409/-1/-1/1/2023-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF
2    Bradley Martin et al., “Implications of a Coercive Quarantine of Taiwan by the People’s Republic of China,” RAND Corp., 2022, https://www.rand.org/pubs/research_reports/RRA1279-1.html.
3     Susan V. Lawrence and Caitlin Campbell, “Taiwan: Political and Security Issues,” Congressional Research Service, April 26, 2023, https://crsreports.congress.gov/product/pdf/IF/IF10275.
4    Ronald O’Rourke, “China Naval Modernization: Implications for U.S. Navy Capabilities—Background and Issues for Congress,” Congressional Research Service, May 15, 2023, https://crsreports.congress.gov/product/pdf/RL/RL33153/267.

The post A maritime blockade of Taiwan by the People’s Republic of China: A strategy to defeat fear and coercion appeared first on Atlantic Council.

]]>
Threats from Yemen are increasing. It’s time to redesignate the Houthis. https://www.atlanticcouncil.org/blogs/menasource/its-time-to-redesignate-the-houthis/ Mon, 11 Dec 2023 17:07:23 +0000 https://www.atlanticcouncil.org/?p=714828 Ever since the 2021 lifting of FTO status, the world has witnessed the increased threats emanating from Yemen, which include recent repeated attacks on commercial ships with drones and missiles

The post Threats from Yemen are increasing. It’s time to redesignate the Houthis. appeared first on Atlantic Council.

]]>
When the Joe Biden administration reversed the Donald Trump administration’s 2021 Foreign Terrorist Organization (FTO) designation and the Specially Designated Global Terrorist (SDGT) designation of the Houthi rebels, the stated intent was to support peace efforts, enable humanitarian relief, and deliver aid. Unfortunately, while the near-immediate reversal of the FTO status was meant to assist the millions of impoverished Yemenis dependent on foreign aid, this move emboldened the Houthis. Counter to de-escalation or peace, since the 2021 lifting of the FTO and SDGT status, there has been a steady and deadly escalation of Houthi attacks on civilian targets, regional partners, and United States interests in the Middle East. Efforts to deter the threatening posture and capabilities of the Houthis are not working.

The Houthi rebels are funded and trained by Iran. As non-state proxies of the Islamic Republic, the Houthis remain a pernicious threat to regional stability, security, and global commerce. Through their Houthi proxies, Iran has purposefully targeted civilians across borders to project their power in the Middle East against Israel, Saudi Arabia, and the United Arab Emirates (UAE). The pattern of threats from the Iran-backed Houthis has even forced sanctions from the United Nations Security Council in response to the systematic targeting of civilians.

Stay updated

This Week in the Mideast Newsletter delivers the best Atlantic Council expert insights and analysis on the Middle East and North Africa directly to your inbox. Subscribe now.

Ever since the 2021 lifting of FTO status, the world has witnessed the increased threats emanating from Yemen, which include recent repeated attacks on commercial ships with drones and missiles, the seizure of a cargo ship in November, and the launching of missiles toward Israel. On December 3, the US Navy disabled and shot down three Houthi drones during a persistent drone and missile attack on several commercial vessels in the Red Sea. In response to the latest attacks, US officials have emphasized consideration of “appropriate actions” and declared that “the entire world needs to step up together.” 

When the Houthis fired at US Navy ships in 2016, the US aptly responded with a barrage of Tomahawk missiles, destroying three Houthi-controlled radar sites. Today, however, as President Biden and his top cabinet members are assessing the conditions of increasing risks to Americans in the Middle East, they are also factoring in the regional sensitivities associated with the increasingly unstable United Nations-mediated truce among the warring parties in Yemen. Such assessments will include a posture review of the Houthis’ threat capability to American interests since 2021 and how to counter their associated risks.

There are perennial US measures to disrupt terrorist facilitation, such as the targeted sanctions announced on December 7, but they are not enough to address the Iran-sponsored threats emanating from Yemen. Yes, further US and international diplomatic pressure, targeted sanctions, and precision counterterrorism operations can be applied, but more needs to be done. The immediate actions the Biden administration can take now—absent a US military response—include the FTO re-designation of the Houthis

Such an FTO re-designation will keep Houthis firmly accountable for their transregional attacks on civilian populations, infrastructure, and commercial shipping. Further, with the FTO designation applied, the president can be publicly steadfast in clarifying that the US will not fail to protect its interests and that it will aggressively support its partners in the defense of their sovereign territory from the Houthis’ terrorist attacks. Short of FTO designation, the president can also re-designate the Houthis as an SDGT entity. This would at least allow the Treasury Department to freeze any US-held assets of the Houthis and their backers and restrict Houthi backers’ access to US financial institutions. Biden can also implore the international community to support collective naval efforts to keep the Bab el-Mandeb Strait—linking the Red Sea and the Gulf of Aden—open and navigable for commercial shipping.

The strong and decisive action of FTO designation is clearly not the only foreign policy tool available for the US to disrupt support to terrorist facilitation, but it is a timely one that can be immediately deployed concurrently to the considerations for other courses of action.

R. Clarke Cooper is a nonresident senior fellow with the Atlantic Council’s Scowcroft Middle East Security Initiative and is the founder and president of Guard Hill House, LLC. He previously served as assistant secretary for political-military affairs at the US Department of State.

The post Threats from Yemen are increasing. It’s time to redesignate the Houthis. appeared first on Atlantic Council.

]]>
Michta in Verkkouutiset discussing civic responsibility for defense https://www.atlanticcouncil.org/insight-impact/in-the-news/michta-in-verkkouutiset-discussing-civic-responsibility-for-defense/ Fri, 08 Dec 2023 14:47:31 +0000 https://www.atlanticcouncil.org/?p=714091 On December 6, Dr. Andrew Michta, director and senior fellow with the Scowcroft Strategy Initiative, was featured in a Verkkouutiset article. Michta contends that the abolishment of conscription into the United States armed forces has led American civilians to be disconnected from citizen soldiers. He advocates for a “new form of civic service focused on […]

The post Michta in Verkkouutiset discussing civic responsibility for defense appeared first on Atlantic Council.

]]>

On December 6, Dr. Andrew Michta, director and senior fellow with the Scowcroft Strategy Initiative, was featured in a Verkkouutiset article. Michta contends that the abolishment of conscription into the United States armed forces has led American civilians to be disconnected from citizen soldiers. He advocates for a “new form of civic service focused on national defense.”

Citizenship is about taking responsibility for one’s country. We seem to have forgotten that it is about owning the nation’s destiny and shared responsibilities towards people we have never met, because they are also part of our nation.

Andrew Michta

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Michta in Verkkouutiset discussing civic responsibility for defense appeared first on Atlantic Council.

]]>
Sales and Warrick testify for the House Homeland Security hearing on Iranian threats to national security https://www.atlanticcouncil.org/insight-impact/in-the-news/sales-and-warrick-testify-for-the-house-homeland-security-hearing-on-iranian-threats-to-national-security/ Thu, 07 Dec 2023 18:59:34 +0000 https://www.atlanticcouncil.org/?p=698823 The post Sales and Warrick testify for the House Homeland Security hearing on Iranian threats to national security appeared first on Atlantic Council.

]]>

The post Sales and Warrick testify for the House Homeland Security hearing on Iranian threats to national security appeared first on Atlantic Council.

]]>
Melcangi interviewed on ISPI Podcast on Egypt and Palestinian refugees https://www.atlanticcouncil.org/insight-impact/in-the-news/melcangi-interviewed-on-ispi-podcast-on-egypt-and-palestinian-refugees/ Thu, 07 Dec 2023 18:59:29 +0000 https://www.atlanticcouncil.org/?p=698857 The post Melcangi interviewed on ISPI Podcast on Egypt and Palestinian refugees appeared first on Atlantic Council.

]]>

The post Melcangi interviewed on ISPI Podcast on Egypt and Palestinian refugees appeared first on Atlantic Council.

]]>
Warrick quoted in The Washington Post on Senate U.S. boarder bill https://www.atlanticcouncil.org/insight-impact/in-the-news/warrick-quoted-in-the-washington-post-on-senate-u-s-boarder-bill/ Thu, 07 Dec 2023 18:53:38 +0000 https://www.atlanticcouncil.org/?p=707517 The post Warrick quoted in The Washington Post on Senate U.S. boarder bill appeared first on Atlantic Council.

]]>

The post Warrick quoted in The Washington Post on Senate U.S. boarder bill appeared first on Atlantic Council.

]]>
Michta in Hospodářské Noviny discussing transatlantic arms production capabilities https://www.atlanticcouncil.org/insight-impact/in-the-news/michta-in-hospodarske-noviny-discussing-transatlantic-arms-production-capabilities/ Thu, 07 Dec 2023 00:46:18 +0000 https://www.atlanticcouncil.org/?p=713358 On December 4, Andrew A. Michta was quoted in a Hospodářské Noviny piece that discusses the state of global industrial defense bases and their ability to impact the war in Ukraine. Michta warns that Europe and America are slow to start arms production — both in their support of Ukraine, and their own domestic defenses. […]

The post Michta in Hospodářské Noviny discussing transatlantic arms production capabilities appeared first on Atlantic Council.

]]>
original source

On December 4, Andrew A. Michta was quoted in a Hospodářské Noviny piece that discusses the state of global industrial defense bases and their ability to impact the war in Ukraine. Michta warns that Europe and America are slow to start arms production — both in their support of Ukraine, and their own domestic defenses. Michta also advances solution to ameliorate this defense predicament, including the idea of conscription to boost soldier count.

The Russians and the Chinese are not building their forces to deter us, which would be the Western approach. But they do it because of aggression…”

Andrew Michta

The post Michta in Hospodářské Noviny discussing transatlantic arms production capabilities appeared first on Atlantic Council.

]]>
Charai in The National Interest: Remembering Henry Kissinger https://www.atlanticcouncil.org/insight-impact/in-the-news/charai-in-the-national-interest-remembering-henry-kissinger/ Wed, 06 Dec 2023 15:13:44 +0000 https://www.atlanticcouncil.org/?p=712951 The post Charai in The National Interest: Remembering Henry Kissinger appeared first on Atlantic Council.

]]>

The post Charai in The National Interest: Remembering Henry Kissinger appeared first on Atlantic Council.

]]>
Fake history is a crucial weapon in Vladimir Putin’s bid to destroy Ukraine https://www.atlanticcouncil.org/blogs/ukrainealert/fake-history-is-a-crucial-weapon-in-vladimir-putins-bid-to-destroy-ukraine/ Tue, 05 Dec 2023 20:46:15 +0000 https://www.atlanticcouncil.org/?p=712597 The invading Russian army is not the only enemy Ukraine faces; the Kremlin propaganda and false historical narratives that drive and justify the invasion are arguably just as deadly, writes Ihor Smeshko.

The post Fake history is a crucial weapon in Vladimir Putin’s bid to destroy Ukraine appeared first on Atlantic Council.

]]>
It is doubtful Vladimir Putin actually believes much of the anti-Ukrainian propaganda coming from the Kremlin’s echo chamber. After all, few educated people would. Still, he and his colleagues have little choice but to vigorously counter Ukraine’s compelling national narrative of a country emerging from centuries of imperial subjugation and reclaiming its place among the European family of nations. Russia’s response has focused on denying Ukraine’s right to exist. The Kremlin’s use of false historical narratives delegitimizing Ukraine is a key element of Russia’s broader campaign to destroy the Ukrainian state and nation. As such, it is worthy of far more international attention than it currently receives.

Ukraine’s story is straightforward, unlike the tall tales promoted by the Russian authorities. Contrary to the Kremlin’s claims, Ukraine is a democratic, unified nation with a distinct and varied history stretching back more than a thousand years. In no way is modern Ukraine Russia’s “younger sibling.” In fact, it could easily be argued that the opposite is true. According to its own origin story, Russia emerged from the medieval Kyivan Rus state centered on the Ukrainian capital city. Christianity and European culture came to Russia via Ukraine.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The many different puzzle pieces that make up Putin’s official version of the deeply troubled historical relationship between Russia and Ukraine simply don’t add up. His claims of a common past and shared identity conveniently ignore centuries of oppressive policies and forced russification imposed on Ukrainians by the Russian imperial authorities throughout the Tsarist and Soviet eras.

Nevertheless, Putin has deployed his distorted vision to argue that the two countries are one nation and that, in essence, there is a civil conflict currently underway among the people of Ukraine. This is a people that voted 92 percent in favor of independence in 1991, with majorities in every single region of the country. It is also a people that staged two revolutions since becoming independent in order to remain both free and democratic.

Recent polls consistently indicate that Ukrainians do not want to surrender a single inch of occupied land to Russia in exchange for an end to what Putin euphemistically calls his “special military operation.” Ukrainians and global audiences overwhelmingly recognize this “operation” as a war of aggression that has cost hundreds of thousands of lives over the past twenty-one months, in addition to the thousands killed during the previous eight years of hostilities following Russia’s 2014 invasion of Crimea and eastern Ukraine’s Donbas region.

Despite Putin’s insistence that Ukrainians are actually Russians (“one people”), the differences between the two countries are now more immediately apparent than ever. Today’s Ukraine is a democracy, though at times a messy one. In stark contrast, Putin’s Russia is a dictatorship, a top-to-bottom power vertical led by one man.

The invading Russian army is not the only enemy Ukraine faces; the Russian propaganda that drives and justifies the invasion is arguably just as deadly. Moscow does everything it can to silence Ukrainian voices and make sure that the history of Ukraine is viewed through Russia’s very selective and murky prism. These indoctrination efforts target Russians, Ukrainians, and also international audiences in different ways but with equal gusto.

For many years, it has been apparent that Western politicians, policymakers, and commentators are particularly susceptible to Russian’s anti-Ukrainian propaganda due to their often limited knowledge of the relevant regional history. Today, it has become more important than ever to counter Russia’s false historical narratives, as international support for Ukraine could very well determine the outcome of the war.

If Russian propaganda is not blunted, the average voter in Western countries will be left face-to-face with the fake Ukrainian history disseminated internationally by the Kremlin and its networks of allies and agents. These falsehoods include the central message that there is no separate Ukrainian people or Ukrainian state. Instead, there is only Russia.

This twisted logic allows Putin to claim, with a poker face, that Russia is not waging war against the Ukrainian people, despite the unprecedented bloodshed since February 2022. It forms the basis of his claim that Russia’s full-scale invasion is really an attempt to liberate Ukraine from “Nazis.” According to Putin, Ukraine is part of Russia, so the Western world has no right to interfere in what is essentially an internal affair.

The Kremlin’s weaponized version of history has helped garner high levels of domestic support for Putin and his invasion of Ukraine within Russia itself, if one is to take as gospel the integrity of opinion polls conducted in a dictatorship. Whether these surveys are genuinely representative or not, it is clear that there is no meaningful anti-war movement in today’s Russia.

Little can realistically be done at present about the state of public opinion inside Russia. The real danger is that Russian disinformation regarding Ukrainian history will be allowed to further influence opinion throughout the West and raise doubts over the legitimacy of Ukraine’s fight for survival. This could diminish the supply of military and other support at a time of Ukraine’s greatest need. That would be a tragedy for Ukraine and a disaster for the wider Western world, with grave consequences for the future of international security.

Ihor Smeshko is a Ukrainian politician and former head of Ukraine’s Defense Intelligence and Security Service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Fake history is a crucial weapon in Vladimir Putin’s bid to destroy Ukraine appeared first on Atlantic Council.

]]>
Michta in City Journal discussing the Hamas attack https://www.atlanticcouncil.org/insight-impact/in-the-news/michta-in-city-journal-discussing-the-hamas-attack/ Fri, 01 Dec 2023 21:54:13 +0000 https://www.atlanticcouncil.org/?p=711017 On October 10, an article by Dr. Andrew Mitcha, director and senior fellow of the Scowcroft Strategy Initiative, was published in City Journal on the implications of Hamas’s attack on Israel for strategic competition. Michta argued that the attack demonstrates that mass is still key on the battlefield and the possibility of a wider war […]

The post Michta in City Journal discussing the Hamas attack appeared first on Atlantic Council.

]]>

On October 10, an article by Dr. Andrew Mitcha, director and senior fellow of the Scowcroft Strategy Initiative, was published in City Journal on the implications of Hamas’s attack on Israel for strategic competition. Michta argued that the attack demonstrates that mass is still key on the battlefield and the possibility of a wider war across theatres is sooner than many expect. He also advocated for rebuilding the defense-industrial capacity of the United States and Europe before asserting that “we should stop talking about our strategic priorities in terms of values and ideals alone, for these won’t resonate with the American people.”

We urgently need a debate on national security that evokes not only norms and values but also the geostrategic and geoeconomic interests of the United States. We have no time to waste.

Andrew Michta

The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world.

The post Michta in City Journal discussing the Hamas attack appeared first on Atlantic Council.

]]>
Deliberate nuclear use in a war over Taiwan: Scenarios and considerations for the United States https://www.atlanticcouncil.org/in-depth-research-reports/report/deliberate-nuclear-use-in-a-war-over-taiwan-scenarios-and-considerations-for-the-united-states/ Thu, 30 Nov 2023 14:54:09 +0000 https://www.atlanticcouncil.org/?p=651669 Matthew Kroenig argues the US and the PRC would have incentives to use nuclear weapons in a Taiwan war. The US must deter PRC nuclear use.

The post Deliberate nuclear use in a war over Taiwan: Scenarios and considerations for the United States appeared first on Atlantic Council.

]]>
FORWARD DEFENSE
REPORT RELEASE

The Scowcroft Center for Strategy and Security’s Forward Defense program is delighted to share our latest report: Deliberate Nuclear Use in a War over Taiwan: Scenarios and Considerations for the United States. This report by Matthew Kroenig, the Atlantic Council’s vice president and senior director for the Scowcroft Center for Security and Strategy, aims to foster a deeper understanding of the prospects for nuclear use in the context of a potential invasion of Taiwan by the People’s Republic of China.

The report examines the potential deterrent, coercive, and warfighting roles of nuclear weapons for the United States and China in such a contingency, evaluating possible targets, employment logics, and implications. The report examines potential scenarios in which China might use nuclear weapons to deter US and allied intervention in support of Taiwan, to coerce a halt to US and allied support to Taiwan, and to defeat Taiwanese and US forces. It also evaluates how the United States could use nuclear weapons for deterrent, coercive, and warfighting roles. The report assesses various possible targets for each side’s possible nuclear employment and assesses the implications of such actions on security globally and in the greater Indo-Pacific.


Other scholars have recognized the risk of a US-China war over Taiwan inadvertently escalating to nuclear use, but few have thought through each party’s rational incentives to deliberately employ nuclear weapons and how a nuclear exchange might play out.

Matthew Kroenig

Main arguments

  • China might use its nuclear forces to support an invasion of Taiwan and deter a US response. If China used nuclear weapons against the United States, it would need to respond with nuclear forces. Several targets could be chosen for a US nuclear response, including People’s Liberation Army (PLA) Navy vessels, militarized islands in the South China Sea, PLA beachheads in Taiwan, and various mainland targets. The selection of these targets could have varying impacts on the conflict and different levels of risks escalation.
  • The United States should consider nuclear first use if conventional forces cannot stop a Chinese invasion force from reaching Taiwan.
  • The United States needs strategic clarity toward Taiwan, including an explicit pledge to defend Taiwan from an unprovoked Chinese invasion and possibly the extension of a US nuclear umbrella over Taiwan.

Recommendations

The report recommends policy shifts, diplomacy, military preparation, and investments to deter conventional and nuclear war over Taiwan.

  • Deterrence of conventional war: The first step towards avoiding nuclear war is to prevent a conventional war that could escalate. The United States should work closely with its allies and Taiwan to create an effective deterrent to Chinese aggression.
  • Strategic clarity and nuclear umbrella: The United States should pledge to defend Taiwan from an unprovoked Chinese invasion and consider extending its nuclear umbrella over Taiwan. This could discourage Chinese nuclear use by creating a credible threat of a powerful US response.
  • Dialogue with Taiwan: Ongoing dialogue with Taiwan is essential to understand the risks of nuclear escalation, plan for possible US nuclear use, and help prepare Taiwan to operate effectively after a nuclear detonation.
  • Communication with China: The United States should convey to China that its mainland will not be immune from nuclear retaliation if China employs nuclear weapons against US or allied forces.
  • Hardening and dispersal of US facilities: US military installations in the region should be protected against attacks through strategies such as dispersion and hardening.
  • Improvements to US nuclear forces: The United States should modernize its strategic nuclear forces and consider additional theater nuclear options, including developing capabilities to target moving naval vessels.
  • Broadening of homeland missile defense plans: Given the potential for limited nuclear use, US missile defense should also be scoped to include limited nuclear attacks from China (or Russia), not just from rogue states.

About the author

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Deliberate nuclear use in a war over Taiwan: Scenarios and considerations for the United States appeared first on Atlantic Council.

]]>
The 5×5—Veteran perspectives on cyber workforce development https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-veteran-perspectives-on-cyber-workforce-development/ Wed, 29 Nov 2023 05:01:00 +0000 https://www.atlanticcouncil.org/?p=707775 In honor of National Military Veterans and Families Month, a group of veterans discuss their transitions from the military to the cyber workforce and suggest ways to improve the process for others. 

The post The 5×5—Veteran perspectives on cyber workforce development appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

On November 3, the Atlantic Council’s Cyber Statecraft Initiative hosted “Joining forces: Veteran perspectives on cyber and tech workforce development” to discuss transitioning veterans interested in careers in cybersecurity and cyber policy. The veteran community is diverse but the transition out of uniform to civilian work is a well-recognized and widely challenging shift, both for servicemembers and their families.  

In July 2023, the Biden administration released the National Cyber Workforce and Education Strategy, aimed at developing and maintaining the United States’ cybersecurity advantage through a skilled workforce. The Strategy highlights the importance of attracting veterans to careers in cybersecurity, given that the community is comprised of “diverse, and technologically skilled … people who have served the country and are committed to mission success.” Enhancing career pathways for servicemembers and the veteran community to join the cyber workforce can go a long way toward both meeting the urgent demand for cyber talent while providing job opportunities to those aspiring to meaningful careers beyond the military. 

To continue these conversations, and in honor of National Military Veterans and Families Month, we brought together a group of veterans to discuss their own transitions from the military to the cyber workforce and suggest ways to improve the process for others. 

#1 What are the barriers to entry for veterans seeking careers in cybersecurity? What is one way for hiring managers to overcome or mitigate them? 

Nicholas Andersen, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; chief operating officer, Invictus International Consulting; former US Marine Corps

“A typical barrier for veterans seeking a career in this field is that hiring managers may not be familiar with the missions throughout the military cyber community; they may only focus on experiences that are like those of typical applicants. We sometimes see the same challenges with traditional pathways to technology jobs, where managers are more inclined to hire applicants with degrees. Hiring managers need to shift their thinking from traditional qualification to focusing on competencies. Hiring managers should be thinking about how they can find the most competent people to fill these critical roles within their companies and what skills do they need to have?” 

Cait Conley, senior advisor to the director, Cybersecurity and Infrastructure Security Agency; former US Army

“Leaving the military and starting a new career either in the private sector or in federal or state government can be an intimidating (and outright confusing) process, especially if the military has been the servicemember’s only career experience. Hiring managers and leaders can make a huge difference here. They can show incoming veteran teammates that joining the team not only matters but is a priority. They can put in extra time to explain the application process and help veterans seeking to join their team navigate any questions or challenges that may come up during the process.” 

Steve Luczynski, senior manager, Accenture Federal Services; chairman of the board, Aerospace Village; former US Air Force

“One challenge that is not necessarily specific to cybersecurity is translating military experience to corporate roles, especially when cybersecurity job descriptions often have a difficult time adequately capturing the nature of the work to be done. Hiring managers and human resources teams would benefit from ensuring that they have someone on their teams, or easily accessible, to read resumes and provide explanations for military roles. I know servicemembers invest significant effort in attempting to remove jargon from their resumes, but that additional perspective from someone who shares their background ensures valuable skills are not lost simply because of an imperfect resume.” 

Brandon Pugh, director, cybersecurity and emerging threats, R Street Institute; US Army

“The transition for servicemembers into most civilian career fields presents challenges, and cybersecurity is no exception. It is imperative for servicemembers and veterans to learn from and network with those who have successfully transitioned before them and with those who are working in the field already. Hiring managers play a key role and should strive to proactively create a culture internally of hiring and supporting veterans, including linking job seekers to veterans at their organizations. I can attest firsthand that many individuals in the cyber field are willing to be a resource, and veterans should seek mentors early on in their job search.” 

Maggie Smith, nonresident senior fellow, Cyber Statecraft Initiative, Digital Forensic Research Lab (DFRLab), Atlantic Council; director, Cyber Project, Irregular Warfare Initiative; US Army

“A major barrier for many veterans is higher education and credentialing. While the military provides funding opportunities to pursue a degree while serving, access to those opportunities is often difficult—operational tempo, field training requirements, and other time constraints often prevent or deter a servicemember from taking classes. Additionally, most civilian certification opportunities are based on work role, meaning servicemembers who are not in cyber-related career fields are unlikely to encounter opportunities to earn credentials unless they pursue them on their own time—which, as discussed above, is often unpredictable and in short supply! I have encountered lots of soldiers in non-cyber military occupational specialties with an affinity for computers, networking, and technology but their lack of job experience in a cyber field, lack of any credentials, and a high school diploma prevent them from pursuing cybersecurity as a career. Expanding apprenticeship programs and revisiting job application requirements, as not all roles require a four-year degree, could get more veterans into cybersecurity.” 

#2 What kinds of military activities provide relevant experience for cybersecurity roles? 

Andersen: “I have seen plenty of non-technical veterans who transitioned to technical fields after they left active duty, but those with experience in cybersecurity, information technology, and intelligence make up the majority of the people in these roles. Servicemembers should take full advantage of tuition assistance and local technology training classes while they are still in the military! This does not cost them anything but time and can lead to any servicemember transitioning into a technology role if that is his or her desire.” 

Conley: “Today, technology is a fundamental factor in warfare. Regardless of branch, military experience provides critical thinking and risk management skills essential to succeeding in any cybersecurity role. From day one of basic training, servicemembers learn how to identify, assess, and manage risk—a foundational mental model for cybersecurity professionals. Servicemembers also learn how to lead teams under stressful conditions in operating environments where technical tools are as integral as the humans themselves. Servicemembers, sometimes without even realizing it, have experienced the operational integration of a myriad of technologies from communication platforms and electronic warfare sensors to satellite systems and machine learning data aggregation tools. Those perspectives can provide unique insights into understanding and mitigating risk in changing environments.” 

Luczynski: “Cybersecurity is comprised of a wide array of specializations in which high-level, broad governance and policy skills are more valuable in some domains than the deeply technical skills required in other domains. Security teams combining these diverse skillsets share the common need to prepare and then practice implementing response plans, which occurs often in the military. The ability to train in this manner, especially where open and honest after-action sessions can occur, is highly relevant and valuable in most cybersecurity roles.” 

Pugh: “Direct cyber experience while in uniform is very helpful when looking to transition to cyber roles in the civilian workforce, and servicemembers can have experiences that civilians do not from their service. It is important to realize, however, that individuals who have served in different fields are still valuable in cybersecurity, especially because servicemembers often are good at handling competing demands in high stress environments, are educated and/or have practical experience in professional settings, and often have security clearances already. These can all be beneficial in the cybersecurity field.” 

Smith: “This is a tricky question because it changes from service to service and, I would argue, every servicemember has a cybersecurity role to play! My own experience in the Army started when I enlisted in the Signal Corps and, later, I commissioned as an intelligence officer before becoming a cyber officer when the Army created the branch in 2014. I consider those three branches the Army’s trifecta—each has work roles that will result in an attractive resume. However, within every branch, there are opportunities to gain skills that technology companies and cybersecurity firms want: leadership, multi-tasking, curiosity, and mental agility. I think the challenge that many veterans face is translating their experience for the private sector so that companies can see their potential impact.” 

#3 What are some positive US government initiatives to assist veterans in entering the cyber workforce? Where is one place for the US government to improve on this front? 

Andersen: “Number one on the list must be the Department of Defense’s (DOD) SkillBridge Program, which is unmatched for the opportunities it provides to get firsthand experience with companies and have the military safety net while servicemembers consider their next career move. The generic Transition Assistance Program will not prepare servicemembers to exit the military successfully. The government needs to focus more on transitioning back to civilian life as a simple acknowledgement that the military is still part of regular society. Educating oneself, building savings, and addressing health needs are not tasks to begin at the end of a period of service. Those are tasks that are critical to making certain that our servicemembers return to civilian life ready to lead within communities and contribute to a different mission.” 

Conley: “While there is always room for improvement, I am incredibly proud of the work that the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Homeland Security have done to promote cybersecurity learning for the veteran community. One of the most impactful ways that CISA contributes to helping transitioning veterans is by operating and maintaining the National Initiative for Cybersecurity Careers and Studies (NICCS), an online training initiative and portal. NICCS offers over eight-hundred and fifty hours of course content on a variety of important cybersecurity topics such as cloud security, ethical hacking and surveillance, risk management, malware analysis, and more. While it does not come with any formal cybersecurity certification, it does provide critical knowledge and insight for veterans to feel confident about their foundational understanding of cybersecurity.” 

Luczynski: “The DOD’s SkillBridge career transition program is an incredible partnership between industry and servicemembers of all ranks and experience levels as they transition out of the military. In short, it is an internship where servicemembers can experience working outside the military as they look for their next role. Continuing to improve awareness among servicemembers about these opportunities and increase the industry participants will ensure that this program is a continued success.” 

Pugh: “Over time, the military has put more emphasis on assisting servicemembers with their transitions, including facilitating opportunities for them to work with industry and to pursue cyber certifications while in uniform. One challenge is that there are many programs and opportunities to assist with transition run by the government, nonprofit organizations, and industry. Knowledge of these programs and knowing where to start is not always straightforward, which is one area in which the government and military can do better.” 

Smith: “The new-ish Skillbridge program provides transitioning servicemembers with a chance to gain civilian work experience—any field, not just cybersecurity—through industry training, apprenticeships, or internships over their last one-hundred eighty days of service. Frankly, I am looking forward to taking advantage of this program when I retire in a couple years; it is a chance to spread my wings and test out a company or try something completely new. Even with Skillbridge, I think the military can do more. The Army is experimenting with a pilot program to allow soldiers to submit their retirement paperwork two full years before their anticipated end of service. That allows soldiers more time to plan for their life in retirement, but it is difficult to provide the same timeline for soldiers leaving service before they hit twenty years. Focusing on mid-career transitions and providing junior enlisted members with additional resources, such as career counseling, college counseling and application assistance, Department of Veterans Affairs, and financial benefits courses, could lead to better outcomes for veterans.”

More from the Cyber Statecraft Initiative:

#4 What is the biggest mistake you made (or avoided) in preparing for your transition from the military? 

Andersen: “The biggest mistake that I made was focusing on my own transition out of the Marine Corps as a series of boxes to be checked. Successfully entering the civilian workplace was highly dependent on networking and having a support system of people who have previously done it themselves. I almost ignored this critical piece for too long.” 

Conley: “I know a lot of veterans out there who struggle to find the same level of fulfillment in their career after the military, which sometimes leads them to question leaving the military in the first place. For me, after two decades in uniform with numerous deployments and over a decade in the special operations community, this was an important consideration when I looked at my next career choice. I knew that being part of a team with a mission focused on service and defending the Homeland was a necessity for me. That clarity helped me identify the best path forward for this new stage in my career. That is why I chose CISA. I know that I am not the only one either—veterans make up 40 percent of CISA’s workforce. Every day of my professional career—in or out of uniform—I have been excited to go to work because I know what I am doing makes a difference.” 

Luczynski: “I tended to focus on my role at the time and short-term goals. Shifting to a longer-term approach and investing the time to consider my options gave me the benefit of having more time to prepare. I developed a better understanding of where my experience could be best applied while fulfilling my family and personal goals.” 

Pugh: “I have been fortunate to serve in the military and now I am an active-duty military spouse. Before becoming a military spouse, I did not fully appreciate the unique employment challenges that military families face from their spouse’s military career caused by frequent moves and/or living in locations without the right job prospects. However, there are many opportunities for military spouses in cyber and many resources are available for them as well, along with some that are geared specifically toward spouses.” 

Smith: “So… I have less than one thousand days until I will retire so at this stage, my mistakes are still in the future! However, what I am doing now is working with a mentor to work towards retirement milestones, identify people, jobs, and work roles that I find interesting, and really think through my transition. My mentor currently has me reaching out to people to conduct information interviews to talk to them about their careers, gather information about their company, and things like that. I have also prioritized doing things like this 5×5 because I want to keep academia’s door open to me, and remaining engaged in research will benefit me in the long run. I know I will make mistakes, but I am working hard on my transition plan in the hopes that I can mitigate risk and identify hazards before it turns into a dumpster fire!” 

#5 What is the most important piece of advice you would share with a veteran interested in entering a career in cybersecurity or cyber policy? 

Andersen: “This is a field that is constantly shifting and no one expert can sit on their laurels hoping that they will still be relevant in a few years’ time. Find a group of likeminded people that will push you to grow, and you will be surprised by how many rewarding experiences come your way. And if you are heading back to school using your GI Bill, make sure to join your local Cyber 9/12 Strategy Challenge team!” 

Conley: “Recognize and own your value. Military service has taught you to be a good teammate, put mission first, and always remember that values matter. This combination of grit, selflessness, and reliability are rare qualities—and invaluable assets for any high performing security team. Be proud of your service history and look forward to what more good you can do!” 

Luczynski: “Do not be afraid to ask for help! Reach out to your former supervisors and subordinates to learn what they do and what roles are available, review your resume, or help you grow your network. It does not matter that you have not spoken in a long time; that is understandable and easily fixed. I strive to put in as much energy toward helping folks now as so many did to help me during my own departure from the Air Force.” 

Pugh: “There are many paths one can take within the cyber field. Too often people think opportunities within cybersecurity are very technical and that a technical background is essential. While those roles exist and are needed, there are many other ways to work in the cyber field, including in policy, law, and education, among many others.” 

Smith: “I love this question because it presents the chance for me to champion the need for cybersecurity professionals with public policy experience and vice versa! I am a public policy nerd that happens to work in cyber—I started my Army career in an electronic maintenance shop repairing radios and later found myself getting my PhD in public policy as a cyber officer. One of my former students is currently doing a master’s degree at the Massachusetts Institute of Technology in technology and public policy—a match made in heaven! People often say that cybersecurity is a team sport, and I understand ‘team’ (and you will be hard pressed to convince me otherwise) as a multidisciplinary team, comprised of individuals with diverse backgrounds and skillsets coming together to craft a security strategy. Because humans are the ones who use technology, cybersecurity can never be just a technical field! However, cyber policy can never be just public policy. Just as cyberspace is the only domain of warfare that is totally dependent upon and spans the other domains of warfare (maritime, land, air, space) to exist, cyber policy is the only domain of policy that spans all other public policy domains (e.g., healthcare, education, transportation). Understanding of how technology works and its role in society is critical to crafting useful cyber policy.” 

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—Veteran perspectives on cyber workforce development appeared first on Atlantic Council.

]]>
Ten challenges to implementing Force Design 2030 https://www.atlanticcouncil.org/in-depth-research-reports/report/ten-challenges-to-implementing-force-design-2030/ Sun, 26 Nov 2023 02:29:41 +0000 https://www.atlanticcouncil.org/?p=692017 Bruce Stubbs points out key questions for the success of the US Marine Corps's Force Design 2030.

The post Ten challenges to implementing Force Design 2030 appeared first on Atlantic Council.

]]>
For several years, Washington has endured a contentious debate about the Marine Corps’ Force Design 2030. On the surface, the debate focuses on the Marines’ definition of its future roles and missions, obscuring a higher-order question. At its core, this debate is really an argument about how much anti-access/area denial (A2/AD) and amphibious lift capabilities the nation needs and can afford.1

With its Force Design 2030, the Marine Corps clearly resets its warfighting priorities by unmistakably stating what it will do and, most importantly, what it will not do, which is the sine qua non of good strategy. Many defense analysts in Washington have rightly commended the Marines for such unambiguous planning and organizational integrity.2 Indeed, the Marines’ efforts serve as an example to the other US military services on how to conduct force planning correctly with strategy in the lead.


[T]he United States lacks a coherent and agreed-on theory of the application of military power—one that reflects a clear and feasible theory of victory—for the most demanding operational problems or the specific warfighting challenges associated with US efforts to plan for military contingencies. There is no joint understanding of how each component will fight as part of a unified whole, and individual services continue to develop major concepts largely in isolation.3

The Marines wrote Force Design 2030 with an eye on sea-denial operations in the Indo-Pacific theater. The use of Marine Corps units to contribute to Navy sea-denial operations against an opposing navy by launching anti-ship cruise missiles represents an entirely new mission for the Marine Corps that does not take it back to its roots.4 The Marine Corps envisions reinforced platoon-sized units to “maneuver around the theater, moving from island to island, to fire anti-ship cruise missiles” to counter and deny sea control to Chinese forces. In addition, the Marines foresee their units “establishing and operating expeditionary advance base sites that can host and enable a variety of missions such as long-range anti-ship fires, forward arming and refueling of aircraft, intelligence, surveillance, and reconnaissance of key maritime terrain, and air-defense and early warning.”5

Implementing the Marines’ A2/AD capabilities requires as many as thirty-five new Navy amphibious ships to transport the new Marine units to land-based deterrence and warfighting positions, especially those located in the archipelagic and maritime nations of the Indo-Pacific theater.6 Fielding these new Marine A2/AD and Navy amphibious lift capabilities has raised a number of issues. This commentary identifies ten key challenges, but, like Congressional Research Service (CRS) reports, it does not offer solutions. Resolving these issues with objective analysis will help support informed decision-making regarding the implementation of Force Design 2030.

Amphibious assault ship USS Bataan (LHD 5) transits through the Red Sea, Aug. 8, 2023. (US Navy photo by Mass Communication Specialist 3rd Class Riley Gasdia.)

Issue #1: Navy acquisition priorities

Setting priorities is the essence of good strategy and strategic planning. Since 2013, the Navy has consistently identified the Columbia (SSBN-826) class ballistic missile submarine (SSBN) program as its number-one acquisition program. In January 2023, Admiral Michael Gilday, the chief of naval operations (CNO), announced the Navy’s next tier of acquisition priority as (1) the Next Generation Air Dominance Family of Systems (NGADS), (2) the future destroyer DDG(X), and (3) the future attack submarine SSN(X).7 Only the Navy has a shipbuilding account; the Marines do not. Procurement of the thirty-five new Navy amphibious ships is a Marine top priority.8 If the Navy’s shipbuilding budget does not grow to accommodate the acquisition of these new ships, what must the Navy stop or reduce procuring to pay for this new class of amphibious ships?

Issue #2: Navy procurement costs for thirty-five new amphibious ships

These new amphibious ships will be around two to four hundred feet in length with a displacement of around four thousand tons and a crew of no more than forty sailors.9 The Marines are looking to buy these thirty-five ships at about $100 million to $130 million apiece starting in fiscal year (FY) 2022, with estimated total acquisition costs of between $3.5 billion and $4.5 billion.10 However, total acquisition costs may well be too optimistic.11 According to the CRS, under the Navy’s FY2024 budget submission, the average cost for each of the first six ships would approach $150 million. Given the analysis in two authoritative reports, the total acquisition costs may well be higher than the services’ estimates.12

  • A November 2022 Congressional Budget Office (CBO) report noted, “the Navy’s next-generation guided-missile destroyer (DDG(X)) could cost up to $3.4 billion a ship, while its next-generation SSN(X) attack submarine could cost up to $7.2 billion each.”13 In addition, the average cost of each of the new Columbia-class submarines could be well over $8 billion each.14 The CBO report summarized that the Navy’s “total shipbuilding costs would average about $30 billion to $33 billion (in 2022 dollars) over the next 30 years, which is 14 percent to 18 percent more than the Navy [currently] estimates.”15
  • The second report, a June 2023 Government Accountability Office (GAO) document, warned that Defense Department “programs are by and large failing to deliver their promised capabilities on time and under budget, a problem that a government watchdog says helped drive taxpayer costs up by $37 billion over the past two years.”16

Given the Navy’s track record on acquisition costs and delivery times for its previous surface ships, is the range of acquisition costs from $3.5 billion to $4.55 billion for thirty-five new Navy amphibious ships credible?

The Arleigh Burke-class guided-missile destroyer USS Paul Ignatius (DDG 117) sails the Baltic Sea on June 9, 2023. (US Navy photo by Mass Communication Specialist 1st Class Zac Shea.)

Issue #3: Navy operations and maintenance costs for thirty-five new amphibious ships

Currently, the Navy is struggling to maintain its current fleet of around 299 crewed ships.17

  • The Navy Times in June 2023 reported that the Navy fleet’s overall material condition declined slightly in FY2022, “‘resuming a slight but steady negative trend’ that has occurred since [FY]2017, according to the Navy’s annual Board of Inspection and Survey, or INSURV, report released by the Navy on Friday.”18
  • In July 2023, Bloomberg News reported, “Delays at naval shipyards mean that nearly 40% of US attack submarines are out of commission for repairs, about double the rate the Navy would like, according to new data released by the service.”19
  • Military.com reported in July 2023 that it is not just submarines experiencing maintenance delays. The USS Boxer (LHD-4), a Wasp-class amphibious assault ship, has been in a maintenance status since June 2020.20

While not publicly stated, a widely held opinion within the Navy is that the service with almost three hundred crewed ships has funding to maintain fully only around 265 ships.21 Underscoring this belief is the fact that 40 percent of the Navy’s attack submarines “are in maintenance and repair facilities at any given time. This puts the fleet at roughly 30 deployable boats at best, rather than the 40 to 45 expected at operating level.”22 Further evidence of insufficient operating and maintenance funding comes from a September 2023 GAO report, which says that “just 55% of the Pentagon’s F-35 Joint Strike Fighter fleet was mission capable as of March 2023 … driven by factors like a lack of depot capacity, insufficient supply of spare parts and overreliance on contractors.”23 Indeed, CNO Gilday has implicitly substantiated this judgement when he clearly stated, “We can’t really afford to have a Navy bigger than the one that we can sustain.”24

If the Navy’s operations and maintenance (O&M) budget does not grow to fund the addition of thirty-five crewed ships, what must the Navy stop or reduce doing in terms of missions and functions to pay for the O&M costs of this new ship class?

Issue #4: Marine A2/AD capabilities

To strike Chinese and Russian A2/AD targets and surface ship targets, such as an amphibious assault force, Force Design 2030 calls for the Marines to use the Navy/Marine Corps Expeditionary Ship Interdiction System.25 This system uses the Naval Strike Missile (RGM-184A NSM Block 1) launched from an uncrewed variant of the Joint Light Tactical Vehicle for short-range targets. The Marines will also use this vehicle to mount a single Mk.41 vertical launch system cell to fire the BGM-109 Tomahawk cruise missile against long-range targets.26

Separately, but with Marine and Navy coordination, the US Army is developing a robust weapon system to strike Chinese and Russian land-based A2/AD networks with its new Multi-Domain Task Forces. Major components of its system include missile artillery batteries for short-, mid-, and long-range precision fires. The mid-range system is labelled as the Strategic Mid-Range Fires System, or Typhon Weapon System. At present, a Typhon battery has four trailer-based launchers to fire either the RIM-174/SM-6 or BGM-109 Tomahawk cruise missiles. The former missile has a demonstrated anti-ship capability and currently is the only real US military capability for intercepting incoming highly maneuverable hypersonic weapons. According to The War Zone, the door is “wide open to the possibility of future Army [Typhon] batteries being employed against a wide variety of targets in the future.”27

The Navy is also developing a system that is identical to the Army’s Strategic Mid-Range Fires System. In September 2022, the Navy announced “it recently demonstrated a road-mobile ground-based launching system” for its multi-purpose SM-6 missiles and Tomahawk land-attack cruise missiles.28 The Navy’s system, designated as the MK 70 Payload Delivery System, uses the combat-proven MK 41 Vertical Launching System (VLS) technology to provide mid-range precision fire capabilities. The launcher is housed within a forty-foot container equipped with four VLS strike-length missile cells, loaded onto a tractor trailer. Sometime in 2023, the Navy plans to demonstrate its ability to fire an AGM-88G Advanced Anti-Radiation Guided Missile Extended Range from this ground-based launcher for suppression and destruction of enemy air defenses.29

Are Marine A2/AD capabilities as outlined in Force Design 2030 duplicative or complementary to Army capabilities? How much total US military capability to counter Chinese and Russian A2/AD capabilities is enough and affordable?

Issue #5: US Army landing craft capabilities

The Army is procuring a new class of landing craft, designated the Maneuver Support Vessel–Light (MSV-L), to replace its Vietnam War–era LCM-8 class. With a stern ramp and a beach ramp, this 117-foot-long (amphibious) ship is designed to carry a single Army main battle tank at a speed of twenty-one knots for a range of 360 nautical miles in high sea states, through the littorals in support of land-based operations.30

To complement the MSV-L, the Army plans to build a four hundred–foot landing ship designated the Maneuver Support Vessel–Heavy (MSV-H) with a payload of around twelve main battle tanks, and a minimum design speed of eighteen knots. The Army’s MSV-L specifications roughly align with the Navy’s Landing Ship Medium (LSM). Brigadier General Samuel Peterson stated the “MSV-H program has been developed with Marine Corps and Navy partners in mind.”31

Are the Navy’s new class of amphibious warships (the LSM) to transport the Marines’ A2/AD capabilities duplicative or complementary to US Army landing craft capabilities? Does the US military need both classes of amphibious ships or would one suffice? How much total US military capability to transport Marine and Army capabilities is enough and affordable?

Issue #6: Strategic assumption for unimpeded access

The employment of both Marine and Army land-based A2/AD weapon systems rests entirely upon the strategic assumption for unimpeded access to deterrence and warfighting geographical positions located on the sovereign territory of partner nations. Without sovereign territory access, Marine and Army A2/AD capabilities will become wasted assets. The United States cannot simply guarantee iron-clad, unconstrained entry into the archipelagic and maritime nations of the Indo-Pacific theater with the exception of treaty allies, such as Japan. However, the United States can obviously guarantee this access to NATO member nations in the European theater. This issue has not gone unnoticed:

  • In July 2023, CRS recommended, “Congress might examine ongoing efforts to secure Army long-range precision fires unit basing in both Europe and the Indo-Pacific region.” CRS cited a May 2022 statement by the secretary of the Army that “the Army did not yet have basing agreements for long-range systems but ‘discussions were ongoing’ with a number of countries in the Indo-Pacific region.”32
  • A May 2023 RAND study on ally and partner views about conflict with China concluded, “Several other regional countries—notably India, Indonesia, Malaysia, and Vietnam—have very strong traditions of nonalignment and display no evidence of being willing to volunteer to join a war that does not directly involve them.” The study further noted, “The governments of many U.S. allies and partners have publicly stated that they are not interested in hosting American ground-launched long-range strike capabilities.”33
  • An August 2023 RAND Commentary reported, “There is little question that New Zealand will continue to pursue an independent foreign policy, albeit perhaps a quietly Western-aligned one, when it comes to China. Washington should not become disillusioned with Wellington, but it should not hold high expectations about cooperation on China issues either.”34
  • The Wall Street Journal in August 2023 reported, “Allies such as Japan and the Philippines, which control many of the most advantageous locations for these small teams, would need to consent to the U.S. using their territory in a conflict, which isn’t guaranteed.”35
  • Nikkei Asia published in August 2023, “While countries like Cambodia are acutely sensitive to being seen as subordinate to China, they seem resigned to playing that role. Few are caught up in the kind of ideological debates that prevail in Washington. The catchphrase that one hears throughout Southeast Asia to describe foreign policy is ’friends to all, enemies to none,’ which is another way of telling the U.S. the nations will sit out of any conflict. ‘We don’t see China from an ideological perspective,’ said one Indonesian official, ‘but as just another country.’”36
  • The Australian reported in August 2023, “Support for AUKUS [the trilateral security pact among Australia, the United Kingdom, and the United States] will remain a key part of the Labor Party’s platform despite an internal dispute and a spirited debate on the floor of the national conference on Friday. After a delay to allow Prime Minister Anthony Albanese to speak, Defence Minister Richard Marles moved to include a ’statement of detail,’ offering specific reasons for Labor’s support of the historic trilateral pact inked by the previous Coalition government in a bid to quell internal unrest.”37
  • A September 2023 RAND report commented that a US strategic assumption for unimpeded base access during a conflict “certainly does not hold true in the Indo-Pacific, where many countries would want to remain aloof from a U.S.-China conflict.”38

While relations with key US allies and partners are, for the most part, moving in the right direction for assured access, US national interests will not always coincide with the allied and partner nations’ national interests. In September 2023, Turkish President Recep Tayyip Erdoğan stated that Turkey would finally support Sweden’s NATO membership if the United States sold Turkey F-16 fighters.39 At almost the same time, Poland announced “it will stop providing [the newest] weapons [that Poland is buying] to Ukraine amid a growing dispute between the two countries over a temporary ban on Ukrainian grain imports.”40 As a reminder, “South Korea has prohibited its weapons from being sent to Ukraine, and Britain and the United States are trying to rebuild their own stockpiles as NATO urges its members to bolster depleted reserves as a safeguard.”41 Wrong strategic assumptions about national interest or what a potential enemy will or will not do have huge consequences. Canadian historian and professor at the University of Oxford Dr. Margaret MacMillan warned military strategists and planners not to “draw conclusions about the actions and thinking of the other side which fit the scenarios they were developing.” She underscored her insight that prior to World War I (WWI), “[The] French chose to believe that the Germans would not use the reserves in the right wing, [and] the Germans hoped the invasion of Belgium would not bring Britain in against them.”42

Those WWI strategic assumptions proved fatally flawed. Likewise, are the Marines’ and Army’s strategic assumption for unimpeded access to ground-based deterrence and warfighting positions located on the sovereign territory of partner nations for its counter A2/AD capabilities guaranteed? Much strategic risk and emerging warfighting capabilities, as well as expenditure of capital, are resting on this single assumption about access. Is the potential for lack of access a single point of failure for these A2/AD capabilities? If access is not ironclad, what are the alternatives? While the US military must make planning assumptions, it must also have a Plan B should an assumption fail to prove out.

Issue #7: Marine Corps ship priorities for the Navy’s acquisition

Former Deputy Secretary of Defense Robert O. Work has authoritatively explained the rationale for the new class of thirty-five amphibious ships. He wrote:


[T]he commandant concluded that assembling a large amphibious force within the range rings of the Chinese anti-access and area denial network will not be possible. Two decades of wargaming and campaign analysis support his judgment. Instead, he envisions a Marine Corps operating in close support of the Navy’s new distributed maritime operations concept43 with smaller, distributed, and low-signature “stand-in forces.” Two decades of wargaming and campaign analysis support his judgment.44

If it is not possible to assemble “a large amphibious force within the range rings” of the Chinese A2/AD networks, then what is the Marines’ rationale for its planned requirement of thirty-one large amphibious assault ships?45 (These ships are also known as the L-class ships.) Mark Cancian, at the Center for Strategic and International Studies, observed that the controversy over the number of amphibious ships “would die down if the Marine Corps offered a strong wartime rationale for 31 large amphibious ships.” He noted that the Marines argue that peacetime presence and crisis response require thirty-one L-class amphibious assault ships, as supported by the historical record. However, according to Cancian, the weakness of the Marines’ argument “is that the Marine Corps wants to build extremely capable and expensive platforms that it has already argued are vulnerable in wartime. If the main requirement is peacetime employment, then different and much cheaper platforms would suffice.”46

US Marines return to Amphibious Transport Dock USS New Orleans (LPD 18) on Oct. 3, 2022. (US Marine Corps photo by Sgt. Danny Gonzalez.)

Additionally, if “two decades of wargaming and campaign analysis” supported the requirement for this new class of small amphibious ships, did the Marines and Navy ignore the data’s implications for the L-class ships? It seems unlikely that the United States would entertain the introduction of ground forces into mainland China and for what end—Beijing regime change or even a 1942 Dieppe-like raid?47 Dr. Jerry Hendrix, a senior fellow at the Sagamore Institute, has stated that the Marine Corps has


…been less than convincing on the role of amphibs in the future fight and the need for Joint forcible entry and amphibious assault. No one has really made the sale about where that’s going to happen, outside of beaches on the Korean Peninsula. No one tells me where they’re going to be doing the amphibious assault into Taiwan or how it’s relevant to the European situation. … tell me why they’re important … so that I can figure out what the argument is.48

The Office of the Secretary of Defense may have similar concerns about the deterrent value generated by thirty-one L-class amphibious assault ships loaded with Marines conducting presence operations. It is likely that the Office of the Secretary of Defense questions the return on investment of these amphibious ships for a high-end conflict with China. However, a war with China would be global, and the L-class ships formed into amphibious-ready groups with their embarked Marines could, for example, act as the key means for a global horizontal escalation campaign against the Chinese economic assets that directly underpin China’s status as a superpower state. For example, they could neutralize the Chinese military base in the Republic of Djibouti to provide US control over multiple nearby maritime chokepoints to include the southern entrance into the Red Sea. To be fair, the L-class amphibious assault ships have great utility in the wider strategic campaign, beyond the operational aspects and confines of the Sino-American conflict in the Indo-Pacific.

In a budget-constrained environment, CNO Gilday noted that “as the service prepares for a potential fight against China, it must prioritize programs most relevant to that conflict.”49 Are thirty-one large amphibious assault ships relevant to a Chinese warfight? Are the acquisitions priorities of Landing Ship Medium and the big deck amphibs the same or is one more important than the other?

As of late June 2023, the Navy supported the Marines’ requirement for thirty-one large amphibious ships. On June 20, 2023, the Navy quietly submitted to Congress its classified Battle Force Ship Assessment and Requirement Report, indicating that the “Navy had a ‘future objective’ in the Report for 31 amphibious ships and that the analysis affirmed the amphibious ship total.”50

Is the Marine Corps’ rationale for thirty-five new amphibious ships consistent with its rationale for thirty-one large amphibious assault ships? If the Navy can fund the acquisition of only either the thirty-five new amphibious ships or the thirty-one large amphibious assault ships, which one has the higher priority between the two types of amphibious lift capabilities?

Issue #8: Joint Force acquisition priorities

In a possible future war with China, the Chinese will almost certainly immediately destroy the Navy’s principal logistical nodes in Japan: six major fuel oil depots; the Urago ammunition depot; and the Yokosuka naval base, which is the only facility in the Western Pacific that can repair aircraft carriers.51 Guam would likely suffer the same fate, and there is little available back-up basing in the so-called Second Island Chain. The fighting then would extend across the Indo-Pacific theater, likely becoming global in scope as well as growing into a long war of attrition and sustainment. The logistical challenges would be immense, with the Chinese greatly benefitting from interior lines of communication.

Should war occur, the Chinese will likely follow the example set by the Imperial Japanese military on December 10, 1941. With one large aerial attack, the Japanese destroyed the US Navy’s Cavite naval base, whose “facilities served as the operational home of the US Asiatic Fleet and together constituted the Navy’s largest base in the Pacific west of Pearl Harbor.”52 In fact, Cavite was the only Navy ship repair facility in the western Pacific. With his major operating base virtually demolished, Admiral Thomas Hart, US Asiatic Fleet commander, ordered Cavite abandoned. After Cavite’s loss, the Navy conducted ad hoc logistics support for its ships, as it ceded the operational theater to the Imperial Japanese Navy.53

In a war with China, US lines of communication will stretch for thousands of miles from the homeland to the operating areas. These sea lines of communication, as well as US ports, will require protection because China has the means and the will to interdict and sever these lines to isolate US fighting forces and prevent their sustainment.

The USS Truxtun, right, and Canadian ships MV Asterix, middle, and Montreal conduct a replenishment in the Red Sea, May 3, 2023. (Navy Petty Officer 1st Class Kenneth Blair.)

In August 2023, the Wall Street Journal reported in an article about the Marines that “the U.S. must figure out how to deploy, supply and provide medical care for troops over the Indo-Pacific’s vast distances.”54 RAND analysts Bradley Martin and Christopher G. Pernin have confirmed this reporting about the inadequate state of the logistics capabilities for a war with China. In their June 2023 report, Martin and Pernin stated:


The U.S. Joint Force cannot effectively fight a war in the Pacific without the ability to sustain the fight from the United States. There is no concept and no investment plan that even begins to address the shortfall from the points where U.S. Transportation Command delivers strategic lift to the point where frontline forces need to receive the supplies. Intra-theater lift over water will require significant new capabilities, which no service has so far fully funded, just as no service has as yet been assigned responsibility for providing these capabilities—nor does the Department of Defense show any signs of designating a responsible party. In the absence of a unifying and coherent plan, the different services are moving forward with their own initiatives for intra-theater logistics.55

These are sobering observations.56 As mentioned, CNO Gilday noted that the Navy “must prioritize programs most relevant” to a conflict with China. What can be more relevant to a conflict with China than logistics, especially with a US Navy conducting distributed operations, likely without the availability of Guam? Logistics ships to sustain combat, submarine tenders to rearm submarines, and oilers to refuel distributed forces across the vast Pacific distances may be more needed by the Navy than a new class of thirty-five amphibious ships. From a joint force perspective, how does the Marine Corps’ acquisition priorities for A2/AD and sealift capabilities compare with other capability requirements, such as the Navy’s logistics ships and inventories of weapons?57

Moreover, in March 2022, the US military’s Indo-Pacific logistics posture further worsened with the permanent closure of the Red Hill Bulk Fuel Storage Facility in Oahu, Hawaii, by the secretary of defense.58 With twenty massive fuel tanks, this centrally located facility had a capacity of 250 million gallons of ship and aircraft fuel to support current operations and act as wartime reserve.59 Its replacement, according to the Indo-Pacific Command Strategic Fuel Storage Plans, consists of leveraging commercial infrastructure to provide a mix of undisclosed storage facilities scattered across the Indo-Pacific theater.60 It is not clear how the lack of ready access to fuel will affect US military strategy.61

Issue #9: Priority naval warfighting missions and size of the US Navy’s fleet

In a war with China, Navy forces would protect the new class of thirty-five amphibious ships transporting the Marines to A2/AD warfighting positions. In addition to delivering and protecting the Marines, the Navy will need to sustain the Marines and protect the sustainment force supporting these widely dispersed Marines once in their firing positions. The Navy will also need to deliver and protect these Marines should they relocate to other firing positions. Sustainment will be a major operational factor, given the high rate of expected missile fires in a war of attrition versus the small quantity of missiles the Marines will bring to its warfighting positions.

It is not just the Marines that require Navy support. The US Army may also require the Navy to protect the Army ships delivering the Army’s A2/AD capabilities to its firing positions. As discussed above, the Army is procuring its own A2/AD delivery forces with a fleet of maneuver support vessels (also known as amphibious ships) to transport its Multi Domain Task Forces. These Army ships have very limited self-protection and require naval over-watch for operations in non-benign environments.

Note, to some observers, it is not entirely clear how the Marines, “holding and fighting from small forward outposts during a conflict,” expect “Navy ships to resupply such outposts under fire.”62 In April 2023, FerryBridge Group Managing Director Bryan McGrath commented that he “can’t yet pin the Marine Corps down on its use case” for the new class of thirty-five amphibious ships. He stated that when the Marine Corps talks about this ship in a fight, “they talk about how it’s going to get out of the way,” noting the difficulty involved in such an operation. He concluded that “Congress should look really carefully at it.”63

Nonetheless, the Navy will be hard-pressed to provide sufficient forces to protect the delivery and sustainment of geographically distributed Army and Marine A2/AD forces. In a war with China over Taiwan, the Navy would face enormous demands for its forces to conduct an array of vital missions around the globe. Some of these missions may have a higher priority than escorting and sustaining Marine and Army A2/AD capabilities scattered across the archipelagic and maritime nations of the Indo-Pacific theater.64

A few examples of these other competing high-priority missions include the following:

  • Destroy the Chinese military forces invading Taiwan and deny Chinese achievement of its objectives
  • Protect and defend Japan, South Korea, and Australia
  • Isolate and strangle China from its war-making resources by maritime blockade
  • Destroy Chinese forces beyond the Indo-Pacific theater, such as those at Djibouti
  • Conduct active homeland defense to include not just Hawaii and Guam but also continental US Navy bases and critical transportation nodes, such as commercial seaports65
  • Maintain active surveillance of Chinese ballistic missile submarines
  • Protect US sealift forces sustaining the joint force from US ports to the Indo-Pacific delivery ports
  • Protect the Navy’s combat logistics force sustaining the widely distributed naval forces
  • Deter Russia, Iran, and North Korea as opportunistic adversaries as well as from conducing malicious behaviors
  • Maintain active surveillance of Russian ballistic missile submarines
The Ohio-class ballistic missile submarine USS Maine (SSBN 741), May 9, 2023. (US Marine Corps photo by Lance Cpl. Emily Weiss.)

While fighting the Chinese and deterring all other enemies, the Navy must be mindful to maintain its combat credibility throughout the duration of the conflict, especially for the purposes of eventual war termination. Clearly, the US Navy must avoid—in strategic terms—a “means-ends” misalignment. In short, the United States cannot lose its Navy defending Taiwan.66

Furthermore, while the Navy has around three hundred crewed ships, it will not have all of these ships initially available for the fight. A number of ships will be in some form of repair status, to include long-term maintenance. Others, unfortunately, that are pier-side in ports will likely be destroyed or severely damaged in the Chinese initial strikes, as the Chinese have the advantage to select the time and place to commence hostilities, not to mention enormous quantities of munitions. Moreover, given Chinese capabilities, US Navy ship losses in port may not just occur in Japan and Guam, but in Pearl Harbor, San Diego, and Bremerton. The naval contributions of allied nations, such as Japan and Australia, will obviously offset some level of the non-availability of US Navy forces.

In the event of a war with China, does the joint force have a clear understanding of all the competing mission priorities and the associated implications to force development and force design? Is the joint force confident its Marine and Army warfighting capabilities can get to the fight and not become wasted assets?

Issue #10: War termination

Per its most current strategy, Advantage at Sea and Naval Doctrine Publication-1 Naval Warfare (NDP-1), the US Navy places a priority emphasis on its sea control function over its other four functions, to include power projection. NDP-1 states, “Sea control is foremost among the naval functions, as it enables all others.”67 The Navy refers to sea control as both a core function and as a capability; however, the term also means a strategic and operational end state. The Navy does not achieve sea control for the sake of sea control, but rather for a larger, higher-order purpose. In a war with China or Russia, pursuing sea control must lead to war termination and not to attrition warfare.68

While the US Navy must emphasize sea control, especially to destroy the Chinese surface ships and amphibious forces assaulting Taiwan, the US Navy also needs to consider the implications of Chinese systems destruction warfare. The Chinese military recognizes war as “a contest among numerous adversarial operational systems. System destruction warfare, not annihilation warfare,” is the People’s Liberation Army’s current theory of victory to win the “informationized” conflicts.69 This warfare mode conducts “war in all seven domains simultaneously (land, sea, air, space, cyber, electromagnetic, and psychological),” and requires durable, resilient information networks superior to the adversary.70 In a possible war with China, a July 2023 Hudson Institute report observed:


Rather than narrowly focusing on sinking PLA [People’s Liberation Army] amphibious ships, the DoD [Department of Defense] should equip U.S. forces to attack the approach of systems destruction warfare itself by complicating and degrading PLA sensemaking through electromagnetic and cyber warfare, targeted attacks, and unexpected US force compositions or tactics. … By attacking the PLA strategy more than its forces, this line of effort would enable more cost-effective US intervention and provide a better toolbox for persistent and sustained campaigning activities.71

In a war with China, is the fastest, most effective way for the Marines and Navy to achieve war termination for them to focus more on sea control or on systems destruction warfare against Chinese networks?72

The Nimitz-class aircraft carrier USS George H.W. Bush (CVN 77), front, and the Ticonderoga-class guided-missile cruiser USS Leyte Gulf (CG 55) transit the Adriatic Sea, Jan. 15, 2023. (US Navy photo by Mass Communication Specialist 3rd Class Samuel Wagner.)

Conclusion

At a higher level, the debate over the Marine Corps’ future roles and missions is also a debate about how much A2/AD and amphibious lift capabilities the nation needs and can afford. Unfortunately, there is an absence of a unifying and coherent joint force strategy and plan to direct this debate to produce from the individual US military services a single “joint fighting machine.” As recommended in a July 2023 RAND study, defense planning “efforts will be immeasurably enhanced if all stakeholders have a shared understanding of how joint and combined forces are intended to fight in the future.”73

In the absence of authoritative guidance, the individual services are moving forward with their own initiatives such as the Marines’ Force Design 2030. The Joint Staff has produced a classified Joint Warfighting Concept Version 3.0 that describes in conceptual terms how the services will fight and lists concepts for required military capabilities. It is unclear how binding the document’s guidance is on the individual services. It is also unclear if what is best for the Marines is also best for the joint force and the nation.74

This report focuses on the diagnosis of the implications of Force Design 2030, not on their prescription. It is reasonable to suggest that for any prescription, the US military needs to both solve how much A2/AD and amphibious lift capabilities the nation needs and can afford as well as address the assured access issue along with the lack of joint comprehensive guidance on a possible future war with China. Moreover, the US military must develop a prescription within the context of whether the US Navy faces an inflection point in the character of war as “Ukraine destroys more Russian warships.” The Royal Navy’s first sea lord, Admiral Sir Ben Key, has commented that “uncrewed vessels and automation have delivered a ‘dreadnought moment,’ alluding to advances in propulsion, gunnery, and armor that led the British and German navies to overhaul their strategies in the early 1900s.”75 Former Chairman of the Joint Chiefs of Staff General Mark Milley agrees with Admiral Key. In May 2023, General Milley declared, “We are undergoing the most fundamental change in the character of war ever in recorded history,” with our ability to see and shoot accurately at great distances.76 Indeed, General David H. Berger, the 38th commandant of the Marine Corps (2019-2023), recognized the increasing vulnerability of the Navy’s large amphibious ships to advances in Chinese detection capabilities (a key concern of this report as well). This recognition convinced him to advocate for a new class of small amphibious ships to transport Marine Littoral Regiments into combat.

The issues raised in this report have merit regarding the implementation of Force Design 2030. They deserve close examination. Hopefully, this will occur without opposition from the shipbuilding industry and domestic politics. Not to do so increases the risk of potentially repeating the US Navy’s expensive and disastrous experience implementing its vision for littoral warfare, with the littoral combat ship as the vision’s centerpiece. Despite mounting evidence for almost two decades that it was the wrong ship at the wrong time for the wrong war, funding continued for its acquisition, despite efforts by Defense Secretaries Chuck Hagel in 2014 and Ashton B. Carter in 2015 to halt its production.77 As the ship lacks combat value for a high-end warfight against China, the Navy is finally discarding these ships as fast as it can. The Navy cannot afford another repeat performance as it implements Force Design 2030.

About the author

Bruce Stubbs served on the Chief of Naval Operations (OPNAV) staff from June 2011 to September 2022 as the director of strategy and strategic concepts (OPNAV N7), the director of strategy (OPNAV N3/5), and the deputy director of strategy and policy (OPNAV N3/5). Prior to those assignments, he served on the secretary of the Navy’s immediate staff from June 2008 to May 2011 with responsibility for the coordination and implementation of Maritime Domain Awareness programs, policies, and related issues across the Defense Department.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

Report

Jul 7, 2023

Building a navy fighting machine

By Bruce Stubbs

Bruce Stubbs explores the barriers impeding the US Navy’s approach to strategy development and force planning and offers recommendations for reform.

Defense Industry Defense Policy
1    Force Design 2030 initiatives are informed by two operational concepts: Littoral Operations in a Contested Environment and Expeditionary Advanced Base Operations. See Andrew Feickert, “U.S. Marine Corps Force Design 2030 Initiative: Background and Issues for Congress,” Congressional Research Service, June 30, 2023.
2    Former Deputy Secretary of Defense Robert Work concisely explained Force Design 2030. He wrote that it “envisions a Marine Corps operating in close support of the Navy’s new distributed maritime operations concept with smaller, distributed, and low-signature ‘stand-in forces.’ The idea is this: Properly executed, stand-in forces persisting close to China within contested spaces can gain and maintain a capability to rapidly strike targets while denying a coherent picture of the fleet to adversaries. Marine forces extend the fleet’s ability to sense and make sense of the environment while becoming an unavoidable obstacle to enemy actions. It does this as an inside force, disintegrating an adversary’s system from the inside out and providing opportunities for the fleet to exploit.” See Robert Work, “Marine Force Design: Changes Overdue Despite Critics’ Claims,” Texas National Security Review, The Strategist, Vol. 6, No. 3, Summer 2023.
3    Michael J. Mazarr, “Defending without Dominance: Accelerating the Transition to a New U.S. Defense Strategy,” RAND Corporation Perspective, September 2023. He further commented that few service “concepts are fully aligned among the military services, and the ways in which each service’s concepts would nest into the others’ ideas is often poorly understood. … These examples reflect one of the most obvious symptoms of U.S. strategic incoherence: a widespread reliance on buzzwords rather than clear, rigorously defined concepts designed to solve specific operational problems.”
4    While the Marine Corps has its roots in the maritime domain, it has shallow ones for developing and conducting rocket and missile fires as compared to the Army. From the Corporal, Honest John, Pershing I and II, Guided Multiple Launch Rocket System, and Army’s Tactical Missile System artillery, to name but a few, the Army has a long legacy of the development and employment of land-based rocket and missile systems.
5    Ronald O’Rourke, “Navy Medium Landing Ship (LSM) (Previously Light Amphibious Warship [LAW]) Program: Background and Issues for Congress,” Congressional Research Service, Updated August 7, 2023.
6    Mallory Shelbourne, “Marine Corps Requirements Call for 9 Light Amphibious Ships per Regiment,” USNI News, February 14, 2023. According to this news article, Lt. Gen. Karsten Heckl, deputy commandant for combat development and integration, and Vice Adm. Scott Conn, deputy chief of naval operations for warfighting requirements and capabilities (OPNAV N9), “crafted requirement language that says the ultimate requirement is 35, but ‘the initial operational inventory will be 18.’” The Marines require nine amphibious ships, formally designated by the navy as Landing Ship Medium, for each of its three new Marine Littoral Regiments and eight spares for a total of thirty-five ships.
7    Sam LaGrone, “CNO Gilday: Next-Generation Air Dominance Will Come ahead of DDG(X) Destroyer,” USNI News, January 18, 2023.
8    “The EABO [Expeditionary Advanced Base Operations] concept was developed with an eye toward potential conflict scenarios with China in the Western Pacific. Under the concept, the Marine Corps envisions, among other things, having reinforced-platoon-sized Marine Corps units maneuver around the theater, moving from island to island, to fire anti-ship cruise missiles (ASCMs) and perform other missions so as to contribute, alongside Navy and other U.S. military forces, to U.S. operations to counter and deny sea control to Chinese forces. The LSMs would be instrumental to these operations, with LSMs embarking, transporting, landing, and subsequently reembarking these small Marine Corps units.” See O’Rourke, “Navy Medium Landing Ship.”
9    Ibid.
10    Megan Eckstein, “Landing Ship Medium Requirements in Final Approvals with Navy, Marines,” Defense News, April 4, 2023.
11    The Navy has almost a perfect record of underestimating the acquisition costs of its ships. For example, the Littoral Combat Ship was “originally supposed to cost no more than $220 million dollars each, which had helped sell them to Congress in the first place. But the final price tag rose to about $500 million each.” See Joaquin Sapien, “The Inside Story of How the Navy Spent Billions on the ‘Little Crappy Ship,’” ProPublica, September 7, 2023.
12    O’Rourke, “Navy Medium Landing Ship (LSM).”
13    Sam LaGrone, “DDG(X) Destroyer Could Cost up to $3.4B a Hull, SSN(X) Attack Boat up to $7.2B, Says CBO Report,” USNI News, November 11, 2022.
14    Ronald O’Rourke, “Navy Columbia (SSBN-826) Class Ballistic Missile Submarine Program: Background and Issues for Congress,” Congressional Research Service, March 31, 2023.
15    Eric Labs, “An Analysis of the Navy’s Fiscal Year 2023 Shipbuilding Plan,” Congressional Budget Office, November 10, 2022.
16    Justin Katz, “Major Weapon System Costs Rose $37 Billion over Past Two Years: GAO,” Breaking Defense, June 9, 2023.
17    Joseph Trevithick, “Navy’s New 381-Hull Fleet Plan Recommits to Big Amphibious Warfare Ships,” The Drive, July 19, 2023.
18    Geoff Ziezulewicz, “Fleet’s Material Condition Keeps Getting Worse, New INSURV Report Says,” Navy Times, June 2, 2023.
19    Anthony Capaccio, “Nearly 40% of U.S. Attack Submarines Are out of Commission for Repairs,” Bloomberg News, July 11, 2023.
20    In July 2023, KPBS San Diego commented, “Since entering a San Diego dry dock in June 2020 the amphibious assault ship Boxer has spent just seven days at sea and hasn’t left San Diego for 13 months.” See Andrew Dyer, “After Three Years and $200M in Upgrades, Why Can’t the USS Boxer Get to Sea?” KPBS Radio and Television Station, San Diego, CA, July 27, 2023; Konstantin Toropin, “After 2-Year Overhaul, Navy Confirms USS Boxer Can’t Get Underway,” Military.com, July 27, 2023.
21    The defense analyst Bryan Clark has written: “Within realistic peacetime budgets, the U.S. Navy cannot buy and sustain a force of more than about 280 ships given the current makeup of the fleet.” See Bryan Clark, “Adm. Franchetti, Biden’s Pick for CNO, Should Focus on the Short Game,” Navy Times, August 21, 2023.
22    Seth Cropsey, “The Sorry State of America’s Submarine Fleet,” Wall Street Journal, September 29, 2023.
23    Michael Marrow, “Only 55 Percent of F-35s Mission Capable, Putting Depot Work in Spotlight: GAO,” Breaking Defense, September 21, 2023.
24    Loren Thompson, “The Navy Says It Can’t Afford to Fully Modernize. So What Should It Give Up?” Forbes, August 3, 2021.
25    A2/AD targets primarily consist of networks of information systems that enable understanding of the battle space to include, for example, key nodes for command and control, targeting, and fusion and dissemination of intelligence, surveillance, and reconnaissance data. For the Chinese military, these components provide the means for its theory of victory.
26    Joseph Trevithick, “Navy Unveils Truck-Mounted SM-6 Missile Launcher in European Test,” The War Zone, September 14, 2022.
27    Ibid.
28    Ibid.
29    Joseph Trevithick, “Navy to Test Ground-Launched Version of New Radar-Busting Missile,” The War Zone, February 17, 2023.
30    Jen Judson, “US Army Seeks New Watercraft to Beef Up Indo-Pacific Capability,” Defense News, October 13, 2022. See also Ashley Roque, “With Indo-Pacific in Mind, Army Eyeing Heavy Support Ship Prototyping Competition,” Breaking Defense, March 1, 2023. “US Army plans to field two new watercraft variants to ferry troops and equipment around in the Indo-Pacific region are taking shape with a possible upcoming prototyping competition for a heavy vessel and a program ‘re-baseline’ of the service’s lighter vessel, according to service officials.”
31    “U.S. Army’s Next Heavy Landing Ship May Outclass Marine Corps’ LSM,” Maritime Executive, March 2, 2023.
32    Andrew Feickert, “The U.S. Army’s Strategic Mid-range Fires (SMRF) System (Formerly Mid-range Capabilities [MRC] System),” Congressional Research Service, July 6, 2023.
33    Michael J. Mazarr, Derek Grossman, Jeffrey W. Hornung, Jennifer D. P. Moroney, Ashley L. Rhoades, and Andrew Stravers, “U.S. Major Combat Operations in the Indo-Pacific: Partner and Ally Views,” RAND Corporation, May 2023.
34    Derek Grossman, “New Zealand’s New Prime Minister Is Making Nice with China,” Nikkei Asia, August 9, 2023. Grossman is a RAND senior defense analyst.
35    Mike Cherney, “U.S. Marines Switch Gears amid China Strife,” Wall Street Journal, August 3, 2023.
36    Richard McGregor, “China’s Grip on Southeast Asia Tightens as U.S. Influence Wanes—from Vietnam to Indonesia, development aid and ‘Asian values’ drive Beijing’s dominance,” Nikkei Asia, August 16, 2023. McGregor is a senior fellow at the Lowy Institute in Sydney, Australia. He also noted: “At the opening of a conference on Chinese politics in Hanoi late last year, the Vietnamese host was quick to reassure the delegates. ‘Talking about a country’s political system,’ she said, ‘is not the same as interfering in a country’s political system.’ Few countries know China as well as Vietnam and are as adept at handling it, with skills learned over hundreds of years of managing cross-border trade and skirmishes and, sometimes, war—on land and at sea. Yet the fact that the Vietnamese felt compelled to open a closed-door talkfest on Xi Jinping and his mastery over the Chinese Communist Party with a disclaimer underlines how southeastern nations are struggling with Beijing’s growing strength and assertiveness.”
37    Ellen Ransley and Courtney Gould, “AUKUS to Stay as ‘Difficult’ Debate Lays Bare Labor Party Unrest,” The Australian, August 18, 2023.
38    Mazarr, “Defending without Dominance.”
39    Ben Hubbard, “Erdogan Says Turkey’s Parliament Will Ratify Sweden’s Entry into NATO if the U.S. Sells Turkey Fighter Jets,” New York Times, September 26, 2023.
40    Mitchell McCluskey, Mariya Knight, and Jessie Yeung, “Poland Will Stop Providing Weapons to Ukraine as Dispute over Grain Imports Deepens,” CNN, September 21, 2023.
41    Lara Jakes, “E.U.’s Lack of Arms Hobbles Aid to Ukraine,” New York Times (International Edition), September 26, 2023.
42    Margaret MacMillan, “Strategy, War Plans, and the First World War,” in The New Makers of Modern Strategy: From the Ancient World to the Digital Age, ed. Hal Brands (Princeton, NJ: Princeton University Press, 2023), 493. (Dr. MacMillan is the author of the best-selling history book Paris 1919.)
43    This concept “calls for U.S. naval forces to operate at sea in a less concentrated, more distributed manner, so as to complicate an adversary’s task of detecting, identifying, tracking, and targeting U.S. naval forces, while still being able to bring lethal force to bear against adversary forces.” See O’Rourke, “Navy Medium Landing Ship (LSM).”
44    Work, “Marine Force Design.”
45    “10 U.S.C. 8062(b) requires the Navy to include not less than 31 operational amphibious warfare ships. The 31 amphibious ships are to include not less than 10 LHA/LHD-type ‘big deck’ amphibious assault ships, with the remaining amphibious ships within the total of not less than 31 amphibious ships being LPD/LSD-type amphibious ships. The Navy’s force of amphibious ships at the end of FY2022 included 31 larger ships, including 9 amphibious assault ships (2 LHAs and 7 LHDs), 12 LPD-17 Flight I class ships, and 10 older LSD-41/49 class ships. The Navy’s FY2024 budget submission projects that the Navy at the end of FY2024 will include 29 larger amphibious ships, including 9 LHA/LHD-type ships, 13 LPD Flight I class ships, and 7 LSD-41/49 class ships.” See Ronald O’Rourke, “Navy LPD-17 Flight II and LHA Amphibious Ship Programs: Background and Issues for Congress,” Congressional Research Service, Updated August 23, 2023.
46    Mark Cancian, “To Cool the War over Amphibs, the Navy and Marines Need a Clearer Justification,” Breaking Defense, June 27, 2023.
47    Megan Eckstein, “Marines Want 31 Amphibious Ships. The Pentagon Disagrees. Now What?” Defense News, May 2, 2023.
48    Josh Luckenbaugh, “31 Amphibious Ships Are ‘Not Enough,’ Expert Says,” National Defense Magazine, April 5, 2023.
49    RAND analysts Bradley Martin and Christopher G. Pernin report that in the Indo-Pacific area of responsibility, “Intra-theater lift over water will require significant new capabilities, which no service has so far fully funded, just as no service has as yet been assigned responsibility for providing these capabilities—nor does the Department of Defense show any signs of designating a responsible party. In the absence of a unifying and coherent plan, the different services are moving forward with their own initiatives for intra-theater logistics.” Bradley Martin and Christopher G. Pernin, “So Many Questions, So Little Time for Pacific Logistics,” Breaking Defense, Commentary, June 23, 2023.
50    Sam LaGrone, “Navy Raises Battle Force Goal to 381 Ships in Classified Report to Congress,” USNI News, July 18, 2023.
51    Toshi Yoshirara, “Chinese Views of Future Warfare in the Indo-Pacific: First Strike and U.S. Forward Bases in Japan” in The Road to Pearl Harbor: Great Power War in Asia and the Pacific, ed. John H. Maurer and Erik Goldstein (Annapolis, MD: Naval Institute Press, 2022).
52    John J. Domalgalski, “Disaster at Cavite,” Naval History Magazine, Vol. 32, No. 6, December 2018.
53    Ibid.
54    Cherney, “U.S. Marines Switch Gears.”
55    Martin Bradley and Christopher G. Pernin, “So Many Questions, So Little Time for Pacific Logistics,” Breaking Defense Commentary, June 23, 2023.
56    Breaking Defense reported in August 2023: “The challenge of resupplying forces across vast distances in the Indo-Pacific in the event of a fight is still vexing the Pentagon, with a key Air Force logistician saying that “though there are several options to solve the problem, officials aren’t sure what path might be best.” According to Breaking Defense, US Air Force Colonel James Hartle, the associate director of logistics, headquarters, US Air Force, stated that keeping the forces resupplied “is probably the largest conundrum of them all as we look at this problem set. I don’t think we have a good answer yet.” See Michael Marrow, “‘Largest Conundrum of Them All’: Air Force Still Unsure How to Keep Forces Supplied in Indo-Pacific,” Breaking Defense, August 30, 2023.
57    Retired US Navy Admiral Mark Montgomery and Bradley Bowman have noted, “Wargaming and operational exercises show that long-range strike weapons are America’s most reliable tool to both win a conflict with China and reduce U.S. casualties. Because of the cost of long-range strike systems, the U.S. military will require a large and mixed inventory of expensive, high-lethality weapons and less expensive swarming munitions.” See Mark Montgomery and Bradley Bowman, “Five Urgent Steps to Prevent American Military Defeat in the Pacific,” Defense News, June 12, 2023.
58    “Statement by Secretary of Defense Lloyd J. Austin III on the Closure of the Red Hill Bulk Fuel Storage Facility,” Department of Defense, Press Release, March 7, 2022.
59    Craig Hooper, “New U.S. Pacific Defense Crisis as Navy Missteps Threaten Hawaii Fuel Depot,” Forbes, December 7, 2022.
60    Department of Defense, “Closure of Red Hill Bulk Fuel Storage Facility in Oahu, Hawaii and Redistribution of Fuel in Accordance with INDOPACOM Strategic Fuel Storage Plans Permanent Closure of Red Hill,” Fact Sheet, March 7, 2022.
61    US Army Colonel Jon Klug, an assistant professor at the US Army War College, has written: “Despite old military wisdom, logistics often gets short shrift in professional publications outside those specifically focused on the subject. Current practice in the Russo-Ukrainian War validated that the importance of logistics upon military strategy is alive and well in the Twenty-first Century. In conclusion, logistics affect military strategy by circumscribing the ways, defining the time horizon required to achieve the desired ends, and determining the level of risk.” See Jon Klug, “Establishing the Realm of the Possible: Logistics and Military Strategy,” Military Strategy Magazine, Vol. 9, No. 1 (summer 2023).
62    Bradley Peniston, “State of the Navy 2023,” Defense One, March 2, 2023.
63    Luckenbaugh, “31 Amphibious Ships Are ‘Not Enough,’ Expert Says.”
64    In a potential war with China, US Congressman Mike Waltz (R-FL) has noted that such a war “with any level of attrition in the Pacific could quickly turn catastrophic [for the United States] without sufficient warships, combat logistics vessels, and merchant ships. Outnumbered and without the capacity to replace, refuel, and provision our troops, we would struggle to deliver victory.” See Mike Waltz, “America Needs a National Maritime Strategy,” Real Clear Defense, September 27, 2023.
65    The US strategic assumption that “the U.S. homeland would be largely immune from attack” is no longer valid … not only because of the risk of nuclear escalation (even with such adversaries as North Korea) but also because of advanced cyber and biological weapons and the potential for long-range conventional attacks. In any future conflict, the United States will have to assume that the homeland will be drawn in and that the conflict may not be able to stay limited to conventional weapons.” See Mazarr, “Defending without Dominance.”
66    Retired US Navy Admiral Mark Montgomery and Bradley Bowman have noted, “Repeated wargaming of Taiwan conflict scenarios in the 2027-time frame demonstrates that even if the United States acts promptly and decisively once the conflict begins, American military forces would often be stretched too thin to support Taiwan quickly enough to prevent a fait accompli.” See Mark Montgomery and Bradley Bowman, “Five Urgent Steps to Prevent American Military Defeat in the Pacific,” Defense News, June 12, 2023.
67    The US Naval Service uses these enduring functions as its primary means to pursue national objectives in peace and war: (1) sea control; (2) power projection; (3) deterrence; (4) maritime security; and (5) sealift. Department of the Navy, Naval Doctrine Publication-1 Naval Warfare, April 2020, 22-23; Office of the Chief of Naval Operations, Navy Tactical Reference Publication 1-02 (NTRP 1-02), Navy Supplement to the DOD Dictionary of Military and Associated Terms, April 2019.
68    In the maritime theater of the Indo-Pacific, a likelihood exists that both an adversary and the United States could experience mutual sea denial, just like the Germans and the British experienced in the North Sea during WWI. See Andrew Krepinevich, “Maritime Warfare in a Mature Precision-Strike Regime,” Center for Strategic and Budgetary Analysis, April 13, 2015.
69    Jeffrey Engstrom, Systems Confrontation and System Destruction Warfare—How the Chinese People’s Liberation Army Seeks to Wage Modern Warfare, RAND Corporation, July 2018.
70    Ibid.
71    Ezra Cohen and Dan Platt, “Campaigning to Dissuade: Applying Emerging Technologies to Engage and Succeed in the Information Age Security Competition,” Hudson Institute, July 13, 2023.
72    An example of systems destruction warfare is the 1940 conquest of France in forty-six days by the German Army against an equal, if not superior, force in terms of net assessment. In large part, the inability of the British and French Army high commands to counter their great confusion and disarray generated by the German Army attacks through the Ardennes and neutral Holland facilitated the loss of allied warfighting effectiveness through a series of piecemeal defeats. The French Army was not destroyed; the Germans captured almost 1.6 million French soldiers and much of its equipment intact, not to mention the British prisoners of war and forty-six thousand British Army vehicles.
73    David A. Ochmanek, Anna Dowd, Stephen J. Flanagan, Andrew R. Hoehn, Jeffrey W. Hornung, Michael J. Lostumbo, and Michael J. Mazarr, “Inflection Point: How to Reverse the Erosion of U.S. and Allied Military Power and Influence,” RAND Corporation, July 2023. See also Mazarr, “Defending without Dominance.” He commented that “A second persistent challenge facing U.S. defense strategy is that none of the extant ideas amounts to a truly comprehensive strategy—a coherent design for the alignment of means to achieve ends through specified ways.”
74    Dr. Steve Wills, a naval analyst at the Center for Maritime Strategy, Naval League of the United States, noted in September 2023, “The United States Navy has been without an operational level of war strategy to guide its force size, design, and employment since June 1990.” What documents the Navy has produced do not “provide a concrete operational strategy for how the Navy would be employed in war.” See Steve Wills, “The United States Navy Needs an Operational Level of War Strategy to Inform Fleet Design,” Center for International Maritime Security, September 25, 2023.
75    Defense One reported that “hours after Ukraine destroyed a Russian Kilo-class submarine sitting in dry dock, Britain’s top naval officer hailed a new era of naval warfare.” Admiral Key commented, “We’re once again facing something completely new, a paradigm shift.” See Sam Skove, “Navies Face ‘Dreadnought Moment,’ British Admiral Says,” Defense One, September 13, 2023.
76    Mark Milley, “How to Avoid a Great-Power War,” A Conversation with General Mark Milley, Chairman of the Joint Chiefs of Staff, Foreign Affairs Podcast, May 2, 2023.
77    Sapien, “The Inside Story of How the Navy Spent Billions on the ‘Little Crappy Ship.’” The article quoted a retired US Navy vice admiral who stated: “politics is king in the shipbuilding business.” The article also noted, “Once a massive project gains momentum and defense contractors begin hiring, it is politically easier to throw good money after bad.”

The post Ten challenges to implementing Force Design 2030 appeared first on Atlantic Council.

]]>
The role of nuclear weapons in a Taiwan crisis https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-role-of-nuclear-weapons-in-a-taiwan-crisis/ Wed, 22 Nov 2023 15:25:21 +0000 https://www.atlanticcouncil.org/?p=666147 Nuclear deterrence would be key in a Taiwan crisis, in part because a PLA amphibious fleet would be vulnerable to a US nuclear strike.

The post The role of nuclear weapons in a Taiwan crisis appeared first on Atlantic Council.

]]>

Executive summary

The potential for a conflict over Taiwan is increasing due to China’s nuclear and conventional military buildup and the threat of two simultaneous conflicts with China and Russia, which would severely stress the ability of US and allied conventional forces to win in both theaters. Nuclear weapons will cast a long shadow over a Taiwan conflict and could play multiple roles in the deterrence and warfighting strategies and operations of both the United States and the People’s Republic of China (PRC). A conflict over Taiwan has a number of attributes that will shape those roles. Those attributes make the potential for limited nuclear escalation real and uncontrolled nuclear escalation possible.

In order to prevent war and escalation in war, US policymakers and military planners must take the role of nuclear weapons in a Taiwan conflict seriously. The United States should communicate four focused deterrent messages to China and reassure its allies and partners that it can deter Chinese nuclear use. The United States should reevaluate its theater nuclear capability requirements for a Taiwan conflict and carefully analyze options to defeat a Chinese amphibious invasion of Taiwan with limited nuclear strikes if necessary. Finally, the United States must credibly address the potential for collaborative or opportunistic aggression by China and Russia in an environment in which both are peer nuclear adversaries. This requires determining what the US strategy should be to address the two-peer threat, optimizing US and allied conventional forces to address it, and reshaping US nuclear capabilities if necessary. The United States needs to know now whether it is going to require a nuclear force that is larger, or different, or both, because changing the current modernization program requires immediate action to address the threats in time.

Background

The political-military competition between the United States and the PRC continues to intensify. The United States Department of Defense (DOD) characterizes China as its “pacing threat,” and is prioritizing conventional force modernization designed to counter the PRC’s rapid and sustained nonnuclear military buildup.1

While the PRC seeks to increase its influence globally and a US-China conflict could erupt over a number of issues, the most likely flashpoint for an armed conflict between the two nuclear-armed major powers is Taiwan. The PRC maintains that Taiwan is a part of China and reserves the right to use military force to seize control of Taiwan if necessary. The United States agrees there is “one China” but opposes Chinese use of force to resolve the status of Taiwan. US policy remains ambiguous about whether the United States would intervene to defend Taiwan should China attack. But a successful Chinese invasion of Taiwan would fundamentally undermine the strategic position of the United States in East Asia by damaging the rules-based international order, causing severe economic disruption (e.g., in the semiconductor industry), and raising questions about the ability and will of the United States to defend its interests, and the interests of its allies.

This political-military status quo has persisted for decades, in part because China has not possessed the military capability to seize Taiwan if the United States (and possibly some if its allies) were to intervene militarily. However, in a February 2023 television interview, CIA Director William Burns noted that PRC President Xi Jinping has directed the Chinese military to be prepared to invade Taiwan by 2027 (emphasis added).2 In addition to the ongoing conventional force modernization and expansion necessary to achieve this goal, China is engaged in the largest nuclear force buildup any country has pursued since the Cold War. The 2021 DOD report to Congress on Chinese military power estimated the PRC may field up to seven hundred nuclear warheads by 2027, and that PRC leadership intends to have at least one thousand warheads by 2030.3 The 2022 version of the report added assessments that China’s current warhead total has roughly doubled, surpassing four hundred, and that the PRC will likely field fifteen hundred warheads by 2035 if the pace of its nuclear modernization continues.“4 Current US nuclear modernization plans envision no significant increase in US nuclear forces over this period, but a debate has begun over whether facing two nuclear peer adversaries for the first time in the nuclear age necessitates an increase in US nuclear forces and/or a change in their composition.

The ongoing shift in the military balance of the conventional and nuclear forces relevant to an armed conflict over Taiwan arguably makes a Chinese decision to resolve the Taiwan problem by force more likely. And that is a problem for both the United States and China.

The problem

The problem the increasing Chinese threat to Taiwan poses to both the United States and China is the prospect of a high-intensity conventional war with a nuclear-armed power over what both sides perceive to be very high stakes. Such a conflict would be very costly even if it remained nonnuclear. But a US-China war over Taiwan also poses the threat of escalation to nuclear weapon use, which would dramatically increase costs if the war remained limited, and pose a potential existential threat to both countries if it does not.

A war over Taiwan poses multilevel deterrence and warfighting problems in both Washington and Beijing.

Deterrence of Chinese conventional aggression against Taiwan requires more than conventional deterrence alone. It also requires intrawar deterrence of PRC limited nuclear escalation, and it may, under some circumstances, require a credible threat to use nuclear weapons first to counter Chinese conventional superiority.

Chinese deterrence of US intervention in a Taiwan conflict also requires more than conventional deterrence. It involves convincing Washington that the conflict might escalate to levels of violence that exceed the importance of the US stake in Taiwan, therefore deterring Washington from intervening in the first place. And it requires intrawar deterrence of US nuclear escalation to defeat the invasion.

A DF-31 missile displayed in 2017. China’s rapid nuclear buildup has included all three legs of its nascent nuclear triad, including land-mobile missiles like the DF-31. Source: Wikimedia/Tyg728

Both sides must also address the warfighting implications of a failure of nuclear deterrence.

Given these multiple ways in which the nuclear forces of both sides could affect the outcome of a Taiwan conflict, US policymakers, strategists, and military planners must take into account the effects the interaction of those nuclear forces would have on US efforts to prevent war and escalation in war, and to secure an outcome favorable to the United States and its allies and partners.

Before analyzing the role of nuclear weapons in Chinese and US strategy and operations in a crisis or conflict over Taiwan, it is important to provide context by outlining the key features of the Taiwan invasion scenario.

Key features of the Taiwan invasion scenario

This analysis focuses on a relatively near-term Taiwan invasion scenario circa 2027.5 That scenario was selected as the baseline because, while China could choose less violent means of seeking to coerce Taiwan to capitulate (a blockade, an air/missile strike campaign, etc.), it is the invasion scenario that would result in the largest-scale conventional conflict and would create the highest stakes for both sides, thus triggering the greatest potential for nuclear escalation. The scenario also matches President Xi’s directive to his military to be ready to invade Taiwan by 2027.

There are eight key features of this scenario that affect the roles both sides’ nuclear forces might play during a crisis and conflict:

  1. A Taiwan invasion would be unprecedented: a high-intensity armed conflict between two nuclear-armed major powers. The leaders of both sides would face challenges to nuclear deterrence that no one has faced before.
  2. Each side’s stake in the outcome of such a conflict would be very high. A Chinese defeat could pose an existential internal political threat to the Chinese Communist Party (CCP) and result in Taiwanese independence. A US and allied defeat could undermine US-led alliances in Asia and Europe, and fundamentally undermine the US and allied strategic position in Asia. Chinese occupation of Taiwan would transform that island from a geographic constraint on China’s military operations to a platform from which to project power further. And the incorporation of Taiwan’s economic capacity would further strengthen the PRC.
  3. Both sides would try to deter the other prewar and intrawar. The United States would seek first to deter the invasion and then Chinese nuclear escalation if China were losing in the conflict. China would seek first to deter US and allied intervention in the conflict, and then US nuclear escalation if China was winning.
  4. The conflict would be fought on a scale and with an intensity that would severely test both Chinese and US, allied, and partner conventional forces, potentially to the breaking point. That scale and intensity would mean either side might consider the limited use of nuclear weapons to secure victory or prevent defeat.
  5. Both sides have escalation options short of nuclear weapons use that create potentially decisive strategic level dilemmas for the other. China has space and cyber options that could degrade US power projection. Chinese leadership also might be able to prompt Russian (or North Korean) opportunistic or collaborative aggression, stressing the US military’s ability to fight two major conflicts against nuclear-armed adversaries simultaneously. The Chinese invasion of Taiwan could be the first or second of those conflicts to initiate (i.e., the Taiwan invasion itself could take the form of opportunistic aggression). Those scenarios pose very different challenges to US strategy and forces. The United States and its allies have space and cyber options to degrade Chinese conventional operations, plus the option to blockade shipping to and from China outside the reach of China’s navy and air force. These nonnuclear escalation options raise the prospect of nuclear escalation in response.
  6. The conflict could become protracted if China fails in its initial effort to seize Taiwan but refuses to terminate the conflict. The prospect of a protracted conflict could prompt either side to consider nuclear escalation to bring the conflict to a favorable or acceptable conclusion should either party determine that a protracted war is not in its interest.
  7. By 2027, China’s nuclear force will likely have grown to approximately seven hundred deployed warheads, most of them capable of ranging the United States, giving it a more secure second strike against the US homeland and significant new theater nuclear strike options. While not yet a quantitative “peer” in 2027, a nuclear force of this size is a far greater threat than what the United States faced just a year or two ago.
  8. Finally, perhaps the most defining operational feature of the Taiwan invasion scenario is that it requires the Chinese military to conduct an opposed amphibious and airborne assault across 80-125 nautical miles of ocean onto an island with a population of 23.5 million people, approximately 170,000 active-duty military, and nearly 1.6 million reservists. This is a daunting prospect for China, especially in the face of US and allied military intervention. Current US joint doctrine for amphibious operations states: “The assault is the most difficult type of amphibious operation and one of the most difficult of all military operations due to its complexity” (emphasis added).6 Similarly, the 2022 DOD China military power report notes: “Large scale amphibious invasion is one of the most complicated and difficult military operations, requiring air and maritime superiority, the rapid buildup and sustainment of supplies onshore, and uninterrupted support.”7

These key features of the Taiwan invasion scenario circa 2027 impact both the roles nuclear forces play in Chinese and US strategy and operations and the nature of the nuclear forces needed to fulfill those roles with high confidence.

A Chinese destroyer crosses the path of a US and Canadian warship transiting the Taiwan Strait in summer 2023. Source: US Navy

The roles of nuclear weapons in China’s strategy and operations

China’s nuclear forces potentially play both deterrence and warfighting roles in a Taiwan invasion scenario. Only some of those roles are consistent with China’s declared policy of “No First Use” of nuclear weapons.

Deterrence roles of PRC nuclear forces

The potential deterrence roles of PRC nuclear forces in a Taiwan conflict include:

  1. Deterring the United States and/or its allies and partners from intervening in the conflict.
  2. Preventing US nuclear coercion by credibly deterring US nuclear use against the Chinese mainland.
  3. Deterring US limited nuclear use to defeat a Chinese invasion of Taiwan.

Deterring US and allied intervention

China’s nuclear force has long presented the United States with the possibility of uncontrolled nuclear escalation if the United States were to decide to intervene in a Taiwan conflict. In 1996, a Chinese general is reported to have issued a thinly veiled nuclear threat to a visiting US official when he contended that the United States would not intervene because the American people care more about Los Angeles than Taipei.8 However, China has not explicitly threatened nuclear escalation if the United States were to intervene militarily.

Now, however, having seen explicit Russian nuclear threats arguably succeed in deterring direct NATO military intervention in Ukraine and limit the level of military aid provided, the Chinese leadership might conclude that its nuclear arsenal could do the same for China vis-à-vis Taiwan. In a Taiwan crisis, China might issue new veiled nuclear escalation threats, announce a change to its “No First Use” policy, or issue more explicit threats, and overtly increase its nuclear force readiness to reinforce the message.

US leaders would of course consider the potential for nuclear escalation in deciding whether to intervene in a Taiwan conflict in any event. Any conflict between nuclear-armed major powers could escalate to a catastrophic, large-scale homeland exchange that could pose an existential threat to both, though uncontrolled escalation would by no means be automatic or even likely. But, because successful Chinese deterrence of US and allied intervention could be decisive in determining the outcome of a Taiwan invasion, China may act to make such uncontrolled escalation appear to be, or actually be, a more likely outcome. China might also choose to highlight nuclear escalation risks more to US allies than to the United States itself. US forces in East Asia are heavily dependent on access to basing and military support from Japan and South Korea, making decisions in Tokyo and Seoul not to intervene also potentially decisive. And neither Japan nor South Korea has nuclear weapons of its own. This latter course of action makes it essential that US extended deterrence commitments to its Asian allies are seen as credible, perhaps even more so in Tokyo, Seoul, and Canberra than they are in Beijing.

Changbai Shan (989) is a Type 071 amphibious transport dock of the People’s Liberation Army Navy. Amphibious ships like the Type 071 would be essential to a possible Chinese invasion of Taiwan. Source: Wikimedia/kees torn

Preventing US nuclear coercion

One of China’s original motivations for acquiring nuclear weapons was to prevent the United States from coercing China into capitulating in the face of nuclear threats in a crisis or conflict.9 That objective remains central to Chinese nuclear strategy today.

For the Chinese leadership to order an invasion of Taiwan, it would have to be confident it could withstand potential US coercive nuclear threats. That confidence stems from credible deterrence of two things. The first is US large-scale use of nuclear weapons against targets on the Chinese mainland. The second is deterrence of US nuclear escalation sufficient for China to avoid losing what Thomas Schelling called a “competition in risk-taking” that could include one or more limited nuclear exchanges.10

US analysts do not know what China’s force requirements are for these deterrence objectives. Nor do analysts know whether Xi’s directive to the PLA to be prepared to invade Taiwan by 2027 included acquiring sufficient nuclear forces to meet these deterrence objectives with confidence. Therefore, analysts cannot determine how much more confident China will be in 2027 when it fields an arsenal of approximately seven hundred warheads. But given China’s assessed intent to field at least fifteen hundred warheads by 2035, Chinese leadership may not yet be fully confident in 2027, but will likely be more confident than it is today.

US analysts also do not know whether China’s nuclear force buildup is due to a change in China’s perception of what its legacy nuclear strategy requires, or whether it is being driven by a change in Chinese nuclear strategy. The latter could have dire consequences in the context of a Taiwan conflict.

What is certain is that the far larger nuclear arsenal which China is building will include a growing array of theater-range systems, including systems with sufficient accuracy to make effective military use of low-yield nuclear weapons. Qualitatively and quantitatively improved theater nuclear capabilities will enable a change in strategy, a change that includes options for China to credibly engage in a competition in risk-taking against an adversary (the United States) that today lacks a wide range of theater nuclear options, and whose stake in the outcome Chinese leaders may assess to be lower than their own.

An F-15C Eagle takes off from Kadena Air Base, Japan. US Air Force photo by Airman 1st Class Matthew Seefeldt.

Deterring US limited nuclear use to defeat a Chinese invasion of Taiwan

For the Chinese leadership to order an invasion of Taiwan, it would have to be confident that it could deter the United States from using nuclear weapons to destroy the Chinese conventional forces invading Taiwan, particularly the PRC’s amphibious landing fleet. DOD’s 2022 report to Congress on Chinese military power noted: “By late 2018, PRC concerns began to emerge that the United States would use low-yield weapons against its Taiwan invasion fleet, with related commentary in official media calling for proportionate response capabilities.”11 The Chinese are right to be concerned about this potential threat. Amphibious landing operations are almost uniquely vulnerable to nuclear attack.

As in the case of preventing US nuclear coercion, the Chinese answer to this threat seems to be to field a new range of militarily effective theater nuclear response capabilities backed by a highly survivable strategic nuclear deterrent that together enable China to persevere through a limited theater nuclear war. However, the unique nature of a Taiwan conflict, as described later in this paper, means that Chinese deterrence of this threat is not easy to achieve with confidence.

Warfighting roles of PRC nuclear forces

The potential warfighting roles of the PRC’s nuclear forces in a Taiwan conflict include:

  1. Limited nuclear first use to coerce war termination on China’s terms.
  2. Limited nuclear use to restore deterrence following US nuclear first use.
  3. Limited nuclear use to destroy critical US and/or allied military capabilities to decisively shift the military balance (through either first or second use).

Limited nuclear first use to coerce war termination on China’s terms

This role for Chinese nuclear forces essentially mirrors an element of Russian strategy and doctrine: initiate limited nuclear use to avoid defeat by coercing the adversary to terminate the conflict on one’s own terms, or at least on terms that one can accept. China’s growing arsenal of militarily effective theater nuclear capabilities backed by a highly survivable strategic nuclear deterrent enables this role. There is one potential circumstance in which this would most likely be considered by China’s leadership: if it faces the impending defeat of the PRC’s conventional invasion, and Chinese leadership assess that a protracted conflict is decidedly not in its interest. This course of action would be made more credible, and thus more likely, if China’s leadership believes there is a marked asymmetry of stakes favoring China.

However, the Taiwan invasion scenario differs significantly from the Russia-NATO scenario that Russian strategy and doctrine were designed to address. The Russian approach was formulated as a means of compensating for conventional inferiority vis-à-vis NATO and as insurance against failed Russian conventional aggression. It was designed to prevent defeat by an overwhelming NATO counteroffensive that threatens “the very existence of the [Russia] state.”12

In the Russia-NATO case, the United States and its allies might be able to avoid further Russian nuclear escalation by limiting their war aims to the liberation of NATO territory. In the Taiwan case, if China must “win” (i.e., forcibly incorporate Taiwan into China) in order to avoid catastrophic domestic consequences for CCP rule, this coercion strategy has profoundly different implications. The United States and its allies and partners would have to accept Chinese occupation of Taiwan to meet China’s coercive demand. As opposed to simply accepting the status quo ante bellum in the Russia-NATO case, the United States and its allies and partners in a Taiwan case would have to capitulate despite being on the verge of winning, or having won, the conventional war. That is a much higher bar.

Limited nuclear response to restore deterrence following US nuclear first use

Given the potential for US limited use of nuclear weapons, either first or in response to Chinese limited first use, it would be logical for China to see a role for its nuclear forces in restoring deterrence to prevent uncontrolled escalation. This role would seem consistent with the Chinese concept of restraining war by “using war to stop war.”13

Attempting to restore deterrence in this way would require a nuclear response that convinces the adversary that it has seriously miscalculated and that further nuclear use risks a more catastrophic miscalculation. Thus, the costs imposed by the response must significantly exceed what the adversary anticipated it would incur. Of course, such a response, which might not be a tit-for-tat, proportionate one, would also risk further counter-escalation by the adversary.

Should the United States initiate nuclear use, demonstrating that China is willing to counter-escalate could be an important way for China to deter further US nuclear use. However, restoring deterrence of US nuclear use following a first strike that destroys China’s amphibious force off Taiwan would do nothing to address the failure of the PRC leadership’s attempt to reincorporate Taiwan into China. In that circumstance, PRC nuclear use to restore deterrence might not be its option of choice.

Limited nuclear use to shift the military balance

China could see a role for its nuclear forces in either achieving a decisive military advantage in a Taiwan conflict through first use or in restoring a decisive military advantage following US first use. US and allied conventional forces are likely to be postured in a way that makes them vulnerable to limited nuclear strikes, as they are dependent on relatively few key bases from which to operate effectively (e.g., Okinawa, Guam, Yokosuka, and US aircraft carriers). The United States is actively seeking to reduce this vulnerability through active and passive missile defense of existing basing and operational and logistical dispersal, but it is unclear how much those efforts will have achieved by 2027.

Chinese first use for this purpose seems unlikely, given the anticipated nuclear balance in 2027 and the vulnerability of the Chinese amphibious force to nuclear strikes in response. As noted above, the destruction of the PLA amphibious force would make pursuit of “military advantage” a somewhat moot point, as China’s remaining forces would be unable to seize Taiwan as long as they had not yet seized several major ports and airfields.

A Trident II D-5 ballistic missile is launched from the Ohio-class ballistic missile submarine USS Kentucky (SSBN 737) during a missile test. In February 2020, the US Department of Defense confirmed that a small number of low-yield warheads had been deployed to submarine-launched ballistic missiles. Source: US Navy.

Second use to achieve decisive military advantage is also problematic. Again, if the United States effectively uses nuclear weapons against the Chinese amphibious force during its landing operations, Chinese nuclear responses against key US and allied targets will not restore a Chinese advantage that allows China to successfully occupy Taiwan, because the PLA invasion force cannot be readily reconstituted for years.

However, were China’s leadership to choose a protracted conflict in response to US first use, Chinese nuclear strikes on key bases could significantly damage US and allied military capabilities, altering the military balance in that protracted war.

Summary of Chinese roles

To successfully invade Taiwan, China must accomplish one of the following with its nuclear forces:14

  1. Deter US and allied intervention in the conflict in the first place, or;
  2. Prevent US nuclear coercion and deter US nuclear strikes on China’s amphibious force during the conflict, or;
  3. Prevent US nuclear coercion and coerce US and allied capitulation through nuclear use.

Put this way, it should be no surprise that China decided its nuclear forces were too small and too limited in capability to ensure they could succeed at one of these requirements.

The roles of nuclear weapons in US strategy and operations

The 2022 DOD Nuclear Posture Review states that the US nuclear force “undergirds all our national defense priorities, including defending the U.S. homeland, deterring strategic attacks against the United States, our Allies and partners, and deterring regional aggression with emphasis on the PRC and Russia.”15 This statement highlights two important differences between the roles of Chinese and US nuclear forces in a Taiwan invasion scenario:

  1. US forces have the additional role of extending nuclear deterrence to US allies and partners.
  2. US forces must simultaneously deter regional aggression by China and Russia (so-called opportunistic or collaborative aggression).

Deterrence roles of US nuclear forces

The deterrence roles of US nuclear forces in a Taiwan crisis or conflict could include:

  1. Deterring a Chinese invasion of Taiwan, even if the United States is already engaged in a Russia-NATO conflict in Europe.
  2. Deterring Chinese nuclear use.
    a. Limited nuclear use
    b. Large-scale attack on the United States
  3. Deterring a Chinese nonnuclear strategic attack.
  4. Deterring Russian aggression versus NATO while the United States is engaged in a Taiwan conflict with China.

Deterring a Chinese invasion of Taiwan

US nuclear forces contribute to deterrence of a Chinese invasion of Taiwan in two key ways.

The first way is aptly described in the 2022 Nuclear Posture Review:


If we are not confident we can deter escalation, it will be more difficult for our leaders to make the decision to project conventional military power to protect vital national security interests—and far more dangerous to do so should that decision be made.16

Thus, by credibly deterring Chinese nuclear escalation, US nuclear forces also contribute to deterring Chinese conventional aggression against Taiwan by making it more likely that the United States and its allies and partners will enter the conflict. China’s prospects for a successful invasion drop dramatically if the United States and its allies intervene promptly. If the deterrent effect of US nuclear forces convinces the Chinese leadership that nuclear escalation to coerce US and allied capitulation is not a viable option (assuming the conventional war does not go in China’s favor), China’s leaders will be less likely to decide to initiate a Taiwan conflict.

The second way that US nuclear forces contribute to deterring a Chinese invasion of Taiwan is by providing the United States with a credible military option to defeat a Chinese invasion even if China achieves regional conventional superiority, or if the United States is already fully engaged in a major European conflict with Russia. While this option could take several forms, the one that combines the highest effectiveness with the least escalation potential would be a nuclear strike on China’s amphibious force as it prepares to offload near the Taiwanese shore. While there would be significant escalation risk for the United States in executing this option, Chinese counter-escalation against US and allied forces in the theater would not enable China to seize Taiwan (again, as long as they had not succeeded in seizing and maintaining control over major ports and airfields). Such a Chinese nuclear response would also risk US counter-escalation, possibly against targets on the Chinese mainland.

A pilot walks away from a B-52 Stratofortress at Andersen Air Force Base, Guam, one of a handful of US bases in the Indo-Pacific that would be critical to prosecuting a war to defend Taiwan. Source: US Air Force/Staff Sgt. Jacob N. Bailey

Clearly, the preferred US means of deterring or defeating a Chinese invasion of Taiwan is through decisive conventional military operations, and the United States should ensure it can do so if it intends to intervene if Taiwan is attacked. However, the ability of US conventional forces to effectively defeat a Chinese invasion if the United States is already fully engaged in a large-scale conventional conflict in Europe is an open question. If the United States and its allies and partners are unwilling or unable to field conventional forces capable of defeating Russia and China simultaneously, then a logical option would be to increase reliance on nuclear weapons in the theater in which the United States finds itself at a potentially decisive conventional disadvantage. The 2022 Nuclear Posture Review hinted at this option when it stated:


In a potential conflict with a competitor, the United States would need to be able to deter opportunistic aggression by another competitor. We will rely in part on nuclear weapons to help mitigate this risk, recognizing that a near-simultaneous conflict with two nuclear-armed states would constitute an extreme circumstance.17

However, increased reliance on nuclear weapons to compensate for conventional inferiority is credible only if US nuclear forces provide viable military options for doing so. Because of the unique vulnerability of an amphibious landing operation to nuclear strikes, and the lack of significant collateral damage to either Taiwan or China from such strikes, this is likely easier to achieve in Asia than in Europe.

Deterring Chinese nuclear use

Deterring a large-scale Chinese nuclear attack on the United States and its allies is clearly the highest priority mission of US nuclear forces in a Taiwan conflict. Fortunately, deterrence of such an attack should remain extremely robust circa 2027. Chinese strategic forces will be able to cause catastrophic damage to the United States in an all-out attack but will not be able to reduce significantly the ability of the United States to devastate China in response. A Chinese decision to “go big first” would be suicidal, rendering a decision to do so irrational in the extreme. And the Chinese leadership is not suicidally irrational.

Deterring Chinese limited nuclear use designed to shift the military balance is essential to US and allied conventional success, as those forces are vulnerable to such limited strikes. However, the threat of a US retaliatory response against the Chinese amphibious landing operation would be an asymmetrically powerful deterrent to such strikes, as destroying that force with nuclear weapons obviates the need for large-scale US and allied conventional forces to do so.

Note, however, that there is a temporal aspect to this deterrent effect. The vulnerability of the amphibious force is greatest when it is offloading forces and logistical support offshore. During its transit of the Taiwan Strait, the amphibious force would be a moving target and could be widely dispersed, making effective nuclear targeting more difficult. Once ashore and off the beaches, the landing force’s vulnerability diminishes, and the potential collateral damage to Taiwan increases.

Deterring Chinese limited nuclear use to coerce capitulation if the PRC’s conventional forces are failing requires clearly communicating to the Chinese leadership that the US stake in the outcome of the conflict is high, and that Chinese use of nuclear weapons would dramatically increase that stake. Were the United States to capitulate in response to Chinese limited nuclear use, the entire US global security architecture (based as it is on extended nuclear deterrence) could collapse overnight.

Deterring a Chinese nonnuclear strategic attack

Chinese strategic attacks on US and allied homeland critical infrastructure and space-enabling capabilities (including nuclear command, control, and communications and missile warning capabilities) have the potential to shift the military balance in an invasion scenario, perhaps decisively. Once again, a credible threat to use nuclear weapons to defeat the Chinese invasion if made necessary by such strategic attacks could deter China from undertaking such attacks in the first place.

Deterring Russian aggression versus NATO while the United States Is engaged in a Taiwan conflict with China

If the United States and its allies do not have sufficient conventional forces to fight and win simultaneous conflicts against two nuclear-armed major powers by 2027, the United States will have to address how it will deter Russian aggression in Europe if it is already fully engaged in a Taiwan conflict.

Increased reliance on US nuclear forces in the “second theater” is a logical solution to this dilemma, but only if the United States fields nuclear forces with the range of capabilities necessary to make such a strategy credible. This theoretically could work in either direction (i.e., versus Russia or China as the second aggressor). But a credible threat of US nuclear first use designed to counter Chinese conventional advantage in a Taiwan scenario is much easier to achieve than it is against Russia for two reasons:

  1. A Chinese amphibious landing operation against Taiwan is uniquely vulnerable to a nuclear strike that would cause little or no damage to either mainland China or Taiwan.
  2. Russia’s large theater nuclear advantage in Europe makes US first use there high risk without very significant expansion of US theater nuclear forces.

Warfighting roles of US nuclear forces

The roles of US nuclear forces in a Taiwan conflict could include:

  1. Restoring deterrence of Chinese nuclear use following Chinese first use.
  2. Destroying the Chinese amphibious invasion force offshore.
  3. Shifting the military balance in favor of the United States through limited nuclear use.

Restore deterrence of Chinese nuclear use

Were China to initiate nuclear use either to coerce US and allied capitulation or to shift the military balance, restoring deterrence of further nuclear use would be a high priority in Washington.

Conventional responses to such Chinese first use are unlikely to successfully restore deterrence, given that it is US and allied conventional superiority that would be triggering Chinese escalation in this situation. A US nuclear response that imposed costs greater than what China anticipated could convince the PRC leadership that it cannot be confident in its ability to manage escalation, and that uncontrolled escalation is a significant risk if China continues to use nuclear weapons. However, such responses would also risk still further Chinese escalation.

China is unlikely to initiate nuclear use while its invasion forces remain highly vulnerable to a US retaliatory strike. However, if a nuclear option against the landing force is unavailable, the United States would face a dilemma regarding what to target to restore deterrence. A strike or strikes on the Chinese homeland would likely be necessary, increasing the risk of further escalation.

The USS Florida launches a Tomahawk cruise missile in 2003. One option under consideration for additional theater nuclear capabilities is a nuclear-armed submarine-launched cruise missile. Source: US Navy

Destroy Chinese amphibious invasion force offshore

China has a unique vulnerability to US nuclear attack in a Taiwan invasion scenario: the landing operations themselves. The landing force has an inescapable problem: it must concentrate to land sufficient force to overcome the Taiwanese defenders. If it does not, it will be defeated on the beach. But against a nuclear-armed adversary, concentrating a large-scale amphibious landing force offshore for many hours presents perhaps the best possible conventional force target for nuclear attack.

A nuclear strike on such a force while concentrated and conducting large-scale landing operations would be highly effective and could be executed without appreciable collateral damage ashore. Were the United States to destroy the Chinese amphibious landing force with such a strike before China could seize major ports and airfields, the invasion would fail. It would take years for China to reconstitute sufficient amphibious landing capability to try again.

To reiterate, the overwhelmingly preferred option is for the United States, its allies, and Taiwan to field sufficient conventional forces to defeat a Chinese invasion with high confidence. Given the difficulty of large-scale amphibious operations (especially by a force with no relevant joint combat experience), this is likely possible by 2027 if the US military is not fully engaged in a high-intensity theater conflict in Europe. If, however, the United States is engaged in such a war, the temptation for China to act opportunistically would be strong, unless Chinese leaders believed either that the United States and its allies and partners could defeat Russia and China simultaneously with conventional forces, or that the United States might well rely on nuclear weapons to defeat a Chinese invasion of Taiwan if fully engaged in Europe first.

Some may argue that the likelihood of aggression by two major powers, either opportunistic or collaborative, is so unlikely that the United States and its allies and partners need not prepare to deter or defeat it. But the irony of such an argument is that following it makes such aggression more likely.

Limited nuclear use to shift military balance in favor of the United States

This role assumes that a strike on the landing forces is either not yet or no longer viable.

The problem with seeking to shift the military balance with nuclear strikes on targets other than the amphibious landing force off Taiwan is that the highest value targets are all in the Chinese homeland. The wide dispersion of Chinese conventional capabilities on the mainland in range of Taiwan is an asymmetric advantage for China in a limited nuclear exchange focused on critical theater military targets. China has options to strike US and allied forces without striking the US homeland. The United States does not.

Recommendations

Given the unique nature of the Taiwan invasion scenario, this analysis has identified five actionable recommendations for the United States and its allies and partners regarding the roles of nuclear weapons in a Taiwan conflict.

First, deterring an invasion of Taiwan requires the United States and its allies and partners to take steps to convince the Chinese of four things associated with nuclear weapons:

  1. The US and allied stake in the outcome of a Taiwan conflict is high enough for them to risk nuclear escalation and high enough to persevere through limited nuclear exchanges. The United States in particular needs to clearly communicate that it views Chinese seizure of Taiwan by force as fundamentally transforming the strategic situation in East Asia, and that Chinese use of nuclear weapons would further raise the US stake in the outcome. Taiwan is not Ukraine. The US national interest in its defense is far greater.
  2. The United States and its allies and partners will not be deterred from intervening in a Taiwan conflict by Chinese nuclear threats. The allies are confident in US extended deterrence commitments, and the United States has the nuclear capabilities necessary to enable its strategy.
  3. Chinese limited use of nuclear weapons in theater will not result in China achieving its objectives (e.g., the United States and its allies will not capitulate, and US nuclear responses will deny China any significant military advantages), and China will incur costs that far exceed any benefit it can achieve. This likely requires convincing the PRC leadership that the Chinese mainland will not be a sanctuary from nuclear response if China initiates nuclear use.
  4. If faced with defeat, the United States can and might use nuclear weapons first to destroy the PLA invasion force offshore, China has no available response that can counter this option’s impact on China’s core objective, and Chinese counter-escalation risks further US nuclear use.

Second, deterring an invasion of Taiwan requires that the United States convince Japan, South Korea, Australia, and the Philippines that it can deter Chinese nuclear escalation against them if they join the United States in defense of Taiwan. For example, stating that a Chinese nuclear strike on US allies will be treated as a strike on the United States could reassure the allies and enhance deterrence. Bolstering US theater nuclear capabilities in the Indo-Pacific theater could have those same effects. This is essential because allies’ involvement is critical to the United States’ ability to defend Taiwan without US nuclear use.

Third, the United States should reevaluate the need for a wider array of more militarily effective theater nuclear capabilities in order to:

  1. Send China the message that the United States takes China’s nuclear buildup seriously, is taking steps to bolster the credibility of US extended deterrence commitments, and is willing to engage in an intense competition of risk-taking if necessary to defend US vital interests.
  2. Provide the US president with a range of viable limited nuclear options to deter Chinese limited use and counter such use if deterrence fails. US theater nuclear capabilities should ensure that the United States can strike at the times and places of its choosing with a range of explosive yields and on operationally relevant timelines even after adversary preemptive strikes.

Fourth, given the potentially decisive military and political leverage that the threat of US nuclear strikes on China’s amphibious landing operations provides, the United States should analyze such options in more detail and determine what capabilities would be optimally effective. This option, if successful, would decisively terminate China’s ability to invade and occupy Taiwan for years. Once executed, the Chinese leadership would have to ask itself what its war aims could be, because seizing Taiwan in the near term would be off the table.

Fifth and finally, US strategy needs to seriously address the potential for collaborative or opportunistic Russia-China aggression in Europe and Asia.18 It may be possible to improve US, allied, and partner conventional capabilities in both theaters to successfully deter or defeat simultaneous aggression. The United States should closely examine whether it is possible to enhance NATO conventional defenses through improved optimization of force allocation across the alliance and increased European contributions to NATO defense to counter Russian opportunistic aggression. The United States should do the same with its Indo-Pacific allies. The differences in the US conventional forces required in Asia and Europe are significant, with logistical constraints and a shortfall in a number of key high-demand/low-density US capabilities being the primary limiting factors on the United States’ ability to fight and win in both theaters simultaneously.

But it is more likely that the United States will have to increase its reliance on nuclear weapons to compensate for conventional inferiority in one of the two theaters and ensure that US nuclear forces are fit for the purpose of doing so. As China’s nuclear buildup continues and the United States draws closer and closer to facing two nuclear peer adversaries in the 2030s, the United States must formulate its strategy for that two-peer threat environment and determine the nuclear forces necessary to enable that strategy. The 2022 Nuclear Posture Review did not do this. But doing so is now urgent. The United States needs to know now whether it is going to require a nuclear force that is larger, different, or both, because changing the modernization program being pursued requires immediate action to address the threats in time.

About the author

Gregory Weaver

Former Deputy Director, Strategic Stability, US Joint Staff

Acknowledgments

The Scowcroft Center for Strategy and Security’s work on nuclear and strategic forces has been made possible by support from our partners, including Los Alamos National Laboratory, Northrop Grumman Corporation, the Swedish Ministry for Foreign Affairs, the United States Department of Defense, the United States Department of Energy, as well as general support to the Scowcroft Center. The partners are not responsible for the content of this report, and the Scowcroft Center maintains a strict intellectual independence policy.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

1    Jim Garamone, “Official Talks DOD Policy Role in Chinese Pacing Threat, Integrated Deterrence,” US Department of Defense, June 2, 2021, https://www.defense.gov/News/News-Stories/Article/Article/2641068/official-talks-dod-policy-role-in-chinese-pacing-threat-integrated-deterrence/.
2    “We do know, as has been made public, that President Xi has instructed the PLA [People’s Liberation Army], the Chinese military leadership, to be ready by 2027 to invade Taiwan, but that does not mean that he has decided to invade in 2027 or any other year as well,” Face the Nation, aired February 26, 2023, on CBS.
3    “Military and Security Developments Regarding the People’s Republic of China 2021,” US Department of Defense Annual Report to Congress, November 2, 2021, 90. This issue brief went to press before the 2023 version of this report was published.
4    Military and Security Developments,” 94.
5    Should the conflict not take place until the 2030s, China would have larger and more capable nuclear forces, making the nuclear element of this problem worse, unless the United States takes steps to counter Chinese nuclear expansion.
6    Joint Publication 3-02, Amphibious Operations, Joint Chiefs of Staff, January 4, 2019, validated without change on January 21, 2021, II-9.
7    “Military and Security Developments,” 127.
8    Barton Gellman, “U.S. and China Nearly Came to Blows in ’96,” Washington Post, June 21, 1998, https://www.washingtonpost.com/archive/politics/1998/06/21/us-and-china-nearly-came-to-blows-in-96/926d105f-1fd8-404c-9995-90984f86a613/.
9    Mao Tse-tung said China must acquire nuclear weapons because “[in] today’s world, if we don’t want to be bullied, we have to have this thing.” Talk by Mao Zedong at an Enlarged Meeting of the Chinese Communist Party Central Committee Politburo, April 25, 1956, found at Wilson Center Digital Archive, https://digitalarchive.wilsoncenter.org/document/talk-mao-zedong-enlarged-meeting-chinese-communist-party-central-committee-politburo.
10    Thomas Schelling, Arms and Influence (New Haven: Yale University Press, 1966), 94.
11    “Military and Security Developments,” 93.
12    “Foundations of State Policy of the Russian Federation in the Area of Nuclear Deterrence,” CNA, June 2020, trans. CNA Russia Studies Program, https://www.cna.org/reports/2020/06/state-policy-of-russia-toward-nuclear-deterrence.
13    “Military and Security Developments,” 37.
14    Note that this is a list of what Chinese nuclear forces must achieve to successfully invade Taiwan. The list of what Chinese conventional forces must achieve is far longer.
15    2022 National Defense Strategy of the United States of America (including the “2022 Nuclear Posture Review”), US Department of Defense, 9.
16    2022 Nuclear Posture Review, 7.
17    2022 Nuclear Posture Review, 12.
18    The threat of collaborative or opportunistic China-North Korea aggression must also be addressed, though the military threat posed by North Korea does not rise to the level of that posed by Russia. A US nuclear force sufficient to address simultaneous conflicts with China and Russia should be more than sufficient to address a China-North Korea conflict.

The post The role of nuclear weapons in a Taiwan crisis appeared first on Atlantic Council.

]]>
US homeland missile defense: Room for expanded roles https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/us-homeland-missile-defense-room-for-expanded-roles/ Wed, 15 Nov 2023 20:30:00 +0000 https://www.atlanticcouncil.org/?p=685550 Matthew Costlow & Robert Soofer explore how expanded roles for US homeland missile defense could enhance deterrence with two nuclear peers

The post US homeland missile defense: Room for expanded roles appeared first on Atlantic Council.

]]>

Introduction

US adversaries’ missile-based threats, including ballistic, cruise, hypersonic, and novel combinations of these types, are growing in size and sophistication. The coercive military strategies of China, Russia, and North Korea rely heavily on missiles that can range the US homeland; as threats against the US homeland grow, so does the danger to US vital interests. How then should US defense strategy adapt to this new reality? Deterrence will of course play its leading policy role, as the continuing bipartisan consensus behind modernizing US nuclear weapons and conventional forces demonstrates.1 Given the severity and the immediacy of missile threats to the US homeland, however, US policymakers should reexamine the complementary roles that expanded and improved homeland missile defenses could play in supporting deterrence and the US defense strategy more broadly.

Indeed, there are three distinct developments in adversary threats that should drive further analysis on the role of US homeland-based missile defenses: the growing North Korean intercontinental ballistic missile (ICBM) arsenal, the expanding Chinese and Russian coercive missile strike options against the US homeland, and the potentially declining ability of the US nuclear arsenal to survive a first strike and accomplish objectives in the emerging two-nuclear-peer threat environment.2 Each of these developments will challenge US deterrence and assurance efforts in unique and complicated ways, requiring US responses across the range of the tools of state power.

This issue brief focuses on one set of capabilities in particular that is ripe for reassessment given its potentially significant contributions to national US defense strategy: US homeland missile defenses. The narrow topical focus allows a deeper examination of the issues at play but should not be construed as an endorsement of US homeland missile defenses as a “silver bullet” for all defense problems or as a substitute for other ongoing programs. Rather, US homeland missile defenses can and should expand in numbers, capability, and role in the broader US defense strategy, potentially to great deterrent effect, without forever chasing the prospect of an “impenetrable shield” over the entire homeland. The choice, in short, is between retaining the primarily retaliatory-based nature of current US deterrence strategy or adding a significant element of defenses to complement and strengthen the credibility of retaliatory threats.3

To examine these topics, this issue brief proceeds in six parts, first by providing a short overview of post-Cold War US homeland missile defense policy and the current debate. Second, this paper examines the role that US homeland missile defense can play in countering the North Korean ICBM threat, specifically within the US policy of “staying ahead” of the threat. Third, this paper assesses whether the role of US homeland missile defense should be expanded to include deterring and defeating coercive Chinese and Russian missile strikes. Fourth, this paper considers what supporting roles US homeland missile defense could play in strengthening the survivability of US nuclear forces in a two-peer nuclear threat environment. Fifth, this paper addresses some of the anticipated criticisms of expanding the roles and capabilities of US homeland missile defense. Sixth and finally, the paper concludes with a set of recommendations for US policymakers that, if implemented, could strengthen deterrence of missile-based attack against the US homeland and provide critical support for the US national defense strategy.

Post-Cold War US homeland missile defense: The policy debate

With the collapse of the Soviet Union, the priority of US missile defense focused on emerging threats to the homeland posed by unpredictable regional actors, i.e., “rogue” powers such as North Korea. The foundation of post-Cold War US missile defense policy is anchored in the 1999 National Missile Defense (NMD) Act, which established a national policy to “deploy as soon as is technologically possible an effective national missile defense system capable of defending the territory of the United States against limited ballistic missile attack, whether accidental, unauthorized, or deliberate.”4 Initially, the Clinton administration sought to build US homeland missile defenses within the confines of the 1972 Anti-Ballistic Missile (ABM) Treaty, but the Bush administration viewed the treaty as anachronistic, given improved relations with Russia, and potentially too restrictive for allowing the types of capabilities needed to defeat the emerging rogue-state threat.

Since the US withdrawal from the ABM Treaty in 2002, the United States has pursued a restrained homeland missile defense strategy scoped to countering rogue states and accidental launches from great powers, eschewing the kind of whole-of-nation defense contemplated in President Ronald Reagan’s 1983 Strategic Defense Initiative (SDI). In 2002, President George W. Bush directed the US Department of Defense (DOD) to field initial homeland missile defense capabilities, supported by various sensors, by 2004-05. For the homeland, this took the form of the ground-based midcourse defense (GMD) system, incorporating ground-based interceptors (GBIs) deployed in Alaska and California. The scope of these deployment decisions—an initial force of forty-four GBIs—made clear the focus was on limited ICBM attacks to address the new rogue-state threats.

A Ground-Based Interceptor, operated by the 49th Missile Defense Battalion in Alaska, is lowered into its missile silo. Source: US Army

The Obama administration ultimately decided to retain and upgrade the forty-four GBIs, while the Trump administration continued upgrades and life-extension programs to these interceptors, also endorsing an increase of the total number of interceptors to sixty-four. The twenty additional interceptors will be part of the Next Generation Interceptor (NGI) program: the first fully new homeland missile defense interceptor in over twenty years. With respect to Russia and China, the Obama, Trump, and Biden administrations have all stated that the United States continues to rely on its nuclear forces, not its homeland-based missile defenses, to deter nuclear threats against the homeland.

Today, however, the confluence of the three major threat scenarios described below has reawakened a long-dormant debate about the proper role of homeland missile defenses in the broader US defense strategy. While this debate has long included discussions about technical feasibility, cost effectiveness, and other operational considerations, the primary focus has been on policy. Thus, this issue brief concentrates on the main divide in homeland missile defense policy, which is between two main camps: those who view improved capabilities as likely to spur an offensive-defensive arms race, thus harming US deterrence efforts, and those who view improved capabilities as strengthening US deterrence efforts by complicating adversary attack plans, especially smaller-scale attacks. Although this divide is not inherently partisan, recent dueling statements among Armed Services Committee members in the US House of Representatives on the future of US missile defense policy illustrate that there is an element of political opposition or support depending on party lines.5

How can US homeland missile defense contribute to defense strategy?

To clarify the policy choices available to decision-makers, this issue brief examines what roles an expanded and improved US homeland missile defense system could play as a complement to other capabilities, such as modernized US conventional and nuclear forces. In brief, a US deterrent threat is likely to be more effective if it combines the threat of an overwhelming response (i.e., cost imposition) as well as the threat of preventing the adversary from achieving its objectives (i.e., denial). Currently, the US defense strategy relies almost exclusively on the former for deterring Russian and Chinese missile threats against the homeland, even limited or coercive attacks. A major concern in following this strategy is that allowing Russia and China a “free ride” to the US homeland may promote their belief they can successfully coerce US leaders and the population through missile strikes—shocking US leadership into submission, encouraging the fear of escalation, and deterring an overwhelming response by threatening further attacks.

Deterrence by denial through expanded and improved US homeland missile defenses, however, could be an important factor in presenting China’s, Russia’s, and North Korea’s attack planners with the prospect of the worst of both worlds: their attack failing in its objectives and provoking an unacceptable US response. US leaders are more likely, and may be seen by adversaries as more likely, to respond to an attack with overwhelming force when there is the meaningful prospect of limiting the risk of escalation and damage levels. In short, US officials are more likely to deter an attack in the first place if adversaries perceive too much risk or too little likelihood of success in escalating a conflict to the US homeland. US homeland missile defenses, therefore, can act as deterrent threats in and of themselves, but their true value lies in how they can also add more credibility to the full range of US deterrence threats, before and during a conflict.

Approaching this topic with reference to the credibility of US threats, US homeland missile defenses are unique from conventional or nuclear weapons in that the likelihood a president would employ them during an attack is about 100 percent.6 An adversary has no reason to doubt the United States would try to defend itself, whereas an adversary may successfully convince himself there is some chance the United States would not employ nuclear weapons or conduct a large conventional campaign for fear of escalation. But US missile defenses are not only valuable in deterring or defending against an initial attack, they also can enable a wider array of response options to the attack. Having improved and expanded US homeland missile defenses will likely help a president believe—and be seen by the adversary as believing—that the United States has response options beyond “surrender or suicide.” If an adversary believes that the United States has, or likely has, response options that would be advantageous for the United States to employ, then the adversary may be less likely to initiate an attack in the first place.

This issue brief now considers how to apply these concepts to both the rogue state and peer nuclear threats.

Staying ahead of North Korea

North Korea recently paraded what appeared to be nearly a dozen ICBMs, potentially capable of carrying multiple warheads on each. Concurrently, Gen. Glen D. VanHerck, commander of US Northern Command (NORTHCOM), stated that North Korean advances cause him to be “concerned about [the] future capacity and capability” of the GMD system for homeland defense.7 Given the limited number of current GBIs available, and with the more capable NGI not expected to arrive until 2028, there may be a shortfall in the mid-to-late 2020s in the US ability to intercept a full-scale North Korean attack on the homeland.

A Hwasong-17, North Korea’s newest ICBM, is paraded through Kim Il Sung Square in Pyongyang, North Korea as part of a military parade marking the 75th anniversary of the Workers’ Party in 2020. Source: Rodong Sinmun

Current US policy, as stated in the “2022 Missile Defense Review,” is to “stay ahead” of the North Korean threat through improved homeland missile defenses and “missile defeat,” that is, capabilities that can potentially disable or destroy North Korean ICBMs before they are launched.“8 Relying on “missile defeat” capabilities to make up for a potential shortfall in kinetic interceptors during the late 2020s, however, comes with its own set of costs and tradeoffs. Employing these capabilities might require advanced warning of an impending attack or even a presidential decision to employ these weapons preemptively based on intelligence of what appears to be an impending attack. Additionally, some “missile defeat” capabilities appear to still be in the research and development stage, meaning their availability for a late 2020s scenario is questionable at best.9

There also is a school of thought that judges that the United States can rely on nuclear deterrence against North Korea, and that trying to stay ahead of the North Korean threat via missile defense and defeat is unaffordable or cost prohibitive—and will upset strategic stability with Russia and China.10 This policy choice also comes with significant downsides, such as relying on offensive strikes to limit damage to the US homeland should North Korea decide to attack. Crises with North Korea might also become less stable from the US perspective, since the only chance of avoiding damage to the homeland would be a risky reliance on preemption at the first signs of imminent attack—signs that might be difficult to distinguish from North Korean posturing during a crisis.

Instead, the United States should retain the policy of “staying ahead” of the North Korean ICBM threat, but work to ensure that threat can be neutralized with the properly sized force of kinetic interceptors—at least for the near future, through the beginning of the 2030s. “Missile defeat” capabilities may prove to be useful complements to kinetic interceptors and, should capabilities like directed energy continue to improve, they may even largely replace kinetic interceptors in the future; however, for the near-to-midterm, the focus should be on improving the performance of programs like the Next Generation Interceptor. NGI is currently projected to begin emplacement at the end of 2028; since it will feature multiple kill vehicles atop each interceptor, it could greatly reduce the number of interceptors required to successfully destroy each threat.11

Source: “Budget Estimates Overview, Fiscal Year (FY) 2021,” US Missile Defense Agency.

Additionally, the United States may have the option of supplementing the GMD system by developing an “underlayer” of Standard Missile (SM)-3 Block IIA interceptors based at sea or on land.12 In November 2020, the United States successfully tested the SM-3 IIA against an ICBM-type target, even though the SM-3 was originally developed to intercept intermediate-range threats—demonstrating at least the latent capability to potentially help defend the US homeland from missile cruisers and destroyers that could be surged in a time of crisis with North Korea.13

Failing to follow through on NGI and a potential “underlayer” of missile defenses may not only damage deterrence, but also assurance of US allies. As the “2022 Missile Defense Review” explained: “Homeland missile defense systems, such as the GMD, offer a visible measure of protection for the US population while reassuring allies and partners that the United States will not be coerced by threats to the homeland from states like the DPRK and potentially Iran.”14 The authors concur with the view that a United States unwilling to protect itself against North Korea may be perceived by allies as unwilling to take risks on their behalf. Likewise, the deployment of strategic defenses for the US homeland should help reinforce the North Korean perception that the United States is tightly coupled to the defense of its South Korean and Japanese allies—thereby enhancing deterrence. In a very real sense, reducing the vulnerability of the United States to ballistic missile attack is an essential enabler of a US grand strategy that explicitly relies on allies. If the United States is unwilling to defend itself against ballistic missile threats, why should allies believe it would be willing to run risks on their behalf?

Countering coercive attacks from China and Russia

Even as the United States adapts to the dynamic North Korean ICBM threat, China and Russia are building the missile-based forces necessary to threaten the US homeland at or below the nuclear threshold to enable their strategies of coercion and theories of military victory. Since the United States has eschewed developing homeland missile defenses of any kind designed to defeat Chinese or Russian missile threats (except for a limited cruise missile defense of the national capital region), China and Russia appear to view this perceived vulnerability as an opportunity to successfully deter, coerce, or ultimately defeat US efforts to project power overseas.

According to some US experts, “Moscow and Beijing appear now to calculate that their respective threats to escalate to limited nuclear war will be sufficient to paralyze direct US opposition to their regional expansionism.”15 This may include dual-use capabilities to attack the foundation of the US national defense strategy: power projection from the homeland. The “2022 Nuclear Posture Review” recognizes this problem, stating that the United States must prepare to deter large-scale and limited nuclear use from its nuclear-armed adversaries, especially in light of the increasing reliance on the coercive threat of limited nuclear use in these states’ strategies.“16 More recently, Lt. Gen. Gregory Guillot, nominated to be the new commander of US Northern Command, told Congress in July that the Defense Department should consider expanding current national missile defense policy to also counter coercive attacks on the United States by China or Russia.17 There appears to be growing support for this approach, as the bipartisan US Strategic Posture Commission reached consensus recently and recommended that the “United States should develop and field homeland [integrated air and missile defense] capabilities that can deter and defeat coercive attacks by Russia and China.”18

Deterring coercive nuclear strikes or conventional strikes with strategic effects against the homeland requires a combination of appropriate conventional forces, nuclear forces, and missile defenses. The missile defense review (MDR) of 2022 notes that regional missile defenses can help the United States deter or defend against limited nuclear use by effectively making the risks and potential costs of smaller-scale nuclear coercion appear unacceptable; there is no reason this concept cannot also extend to the defense of the homeland.“19 While China or Russia could, in theory, simply overwhelm a US homeland missile defense system designed to defend against coercive attacks, the larger the attack size needed to overcome US defenses, the more China or Russia run the risk that the United States perceives the motivations behind the attack as unlimited and responds accordingly. Additionally, the larger the attack size needed to overcome US homeland missile defenses, the better the chance the United States could detect attack preparations and take the appropriate measures to improve its defense posture.

One of China’s newest ICBMs, the DF-31, on display at the Military Museum of the Chinese People’s Revolution.
Source: Wikimedia user Tyg728.

Given the sheer variety of Chinese and Russia missile delivery systems (cruise, ballistic, hypersonic glide vehicles, fractional orbital systems, and other potential combinations), the question naturally is: what kind of US homeland missile defenses are most needed to deter and defeat coercive threats? If one of the US objectives is to be able to intercept a handful of Chinese or Russian ballistic missiles, then the current homeland defense architecture could potentially be sufficient if it is upgraded to address their more sophisticated reentry vehicles armed with decoys and countermeasures. To address these countermeasures, the Department of Defense must improve the tracking and discriminating of warheads, likely from space. If the GBI/NGI can sense Russian and Chinese reentry vehicles and distinguish them from decoys, with the help of space-based sensors, then it may have a reasonably good chance to complete the intercept, even against these more sophisticated targets.

An additional defensive layer provided by the SM-3 IIA missile (deployed on land or at sea) would increase the probability of intercept against rogue-state ballistic missile threats, depending on where such defensive systems were deployed. The SM-3 IIA interceptor has a significantly smaller defensive “footprint” than the GBI (which can defend the entire United States from the sites located in Alaska and California), so multiple sites would be required to provide a nationwide underlayer. The 2019 MDR also suggested that the Terminal High Altitude Area Defense (THAAD) system could play a role as a terminal defense against certain ICBM threats, but this has not yet been tested.

A SM-3 is launched from the USS Lake Eerie. Source: US Navy

One potential advantage of an underlayer including SM-3 IIAs and perhaps modified THAADs would be imposing costs and uncertainty on Chinese and Russian attack planners, since the countermeasures required to defeat missile intercept attempts in space will be different from those required to counter missile intercept attempts on reentry into the atmosphere.20 The defense against smaller-scale Chinese and Russian threats could be an outgrowth of enhancements to the GMD system (in numbers and capability), taken to stay ahead of the North Korean threat. In other words, growing US capabilities against North Korea could provide some benefit against coercive Chinese or Russian threats.

In addition to ballistic missile strikes against the homeland, China or Russia might employ cruise missiles to coerce the United States at or below the nuclear threshold. The 2022 National Defense Strategy fact sheet states: “Recognizing growing kinetic and non-kinetic threats to the United States’ homeland from our strategic competitors, the Department will take necessary actions to increase resilience—our ability to withstand, fight through, and recover quickly from disruption.”21 Among these “growing kinetic threats” are China’s and Russia’s pursuit of advanced long-range cruise missiles for targeting critical infrastructure the United States uses to project power in support of its national interests and allies.22 The US government has long recognized that adversaries will seek to defeat the US theory of victory by threatening the means of projecting power overseas in an attempt to diminish political will and delay the use of overwhelming force against their regional aggression.23

For example, US officials have warned about China and Russia planning to conduct offensive strikes against the US homeland below the threshold of nuclear weapons use. These attacks may be limited in number and focus on the kind of targets that would avoid provoking too costly a US response—yet be significant enough in effect to potentially cause US officials to reconsider their support of allies.24 Gen. VanHerck, following the 2022 National Defense Strategy, stated recently that Russia’s long-range conventional cruise missiles are a growing concern and required an improved US ability to detect and track those threats. In support of this, the fiscal year (FY) 2024 budget requests $516 million to procure over-the-horizon radars.25 These new systems would provide situational awareness across domains to identify air and cruise missile threats inbound to the United States. In parallel, as Peppi DeBiaso notes, “DOD has designated the U.S. Air Force as the Executive Agent for homeland [cruise missile defense] to examine, in conjunction with other agencies (e.g., [the US Missile Defense Agency] and the Services), architectures, including sensors, interceptors and command and control (C2) arrangements for CMD of critical military targets within the United States. This analysis is in the early stages and specific architectural options have yet to be defined,” and this analysis is unlikely to be completed before early 2024.26 These developments, if pursued to completion, can help strengthen deterrence by discouraging adversary perceptions that a vulnerable US homeland offers an opportunity for coercion on the cheap, where even small-scale attacks offer a low risk of failure with the greatest potential reward: US capitulation.

The two-nuclear-peer problem

During the Cold War, the United States spent significant time and resources ensuring the survivability of its nuclear forces and command and control capabilities against a potential Soviet nuclear first strike; since the end of the Cold War, the nuclear threat environment has evolved from featuring one major US adversary to two: Russia and China. A combined or nearly sequential Russian and Chinese first strike on the US homeland seems unlikely, given the political and operational obstacles that would challenge such cooperation and trust, yet some sort of major nuclear war with one or both states cannot be fully discounted either.27 As recognized by nuclear strategists throughout the Cold War, a nuclear force that can survive a first strike and respond against targets that the adversary values most is the foundation for a strategy of deterring that attack in the first place. The task of deterring a nuclear first strike is therefore greatly complicated when, instead of requiring a force to respond against one attacker, the United States will likely require a force to respond against the attacker and deter additional attacks from the other nuclear peer. In such a scenario, the United States might not even correctly be labeled a nuclear “peer” with the remaining adversary—the United States may need to deter major nuclear attack from a position of significant inferiority in weapon numbers.

As China expands its nuclear forces, US officials must consider how to make their nuclear forces survivable in a conflict against two great powers, perhaps at the same time, under any conditions. Preferential missile defenses for US nuclear forces; national leadership; and nuclear command, control, and communications (NC3) could enhance US survivability and contribute to deterrence. Such defenses may or may not provide significant protection for the population (depending on the architecture), but they could enhance deterrence by complicating any potential Russian or Chinese first-strike plans, or opportunistic aggression by one state after the other’s initial attack.28 In short, the objective is to convince Russia and China that no combination of attacks could successfully prevent the United States from retaliating with sufficient nuclear forces to inflict unacceptable damage on them both—thereby contributing to deterrence of preemptive or opportunistic disarming first strikes.

Detailed analysis of the two-nuclear-peer problem facing the United States is just beginning, but early indications from such scholarship evinces a possible role for homeland missile defense. An influential March 2023 paper from the Center for Global Security Research recommends an assessment of “fielding limited cruise and ballistic missile defenses to protect select assets, such as critical NC3 nodes in comparison with other means of enhancing survivability and endurance.”29 Likewise, Gen. VanHerck has said that “[North American Aerospace Defense Command] and USNORTHCOM must be prepared to protect continuity of government, our nuclear infrastructure, power projection capabilities, and key defense nodes.”30

The theory behind preferential defense for US retaliatory forces is for commanders to intercept only those warheads that appear to be targeted against US nuclear forces (or other strategic capabilities)—a determination that can be made based on the trajectory of the incoming threats. While technically challenging, such “endoatmospheric” defenses enjoy an important advantage: many decoys or countermeasures associated with the incoming warhead will have burned up in reentry, making the task of discrimination and intercept less complicated.

The 2019 MDR and some independent analysis suggests the Army’s THAAD system, with some enhancements, could provide a limited defense of some military assets.31 One analyst described the benefits of preferential defense for US ICBMs, stating:


For example, assume 100 US missile interceptors are deployed to defend the 400 [ground-based strategic deterrent] ICBMs. If an attacker could not know in advance which 100 of the 400 GBSD missiles the interceptors were directed to defend, its problem is further complicated. To have a high confidence of success against the land-based triad leg supplemented by a missile defense shield, the attacker would have to add a third warhead to account for the possibility that an interceptor missile could take out one of the two warheads in the original attack plan. The tradeoff is now 3:1, with 1,200 warheads—roughly 80 percent of the New START limit—required to defeat the GBSD, making such an attack even more unattractive, thereby fortifying deterrence.32

Two Terminal High Altitude Area Defense launchers, which could be incorporated as part of an underlayer to US national missile defense. Source: Master Sgt. Jeremy Larlee

Preferential missile defenses could also play a role in buying time for possible future mobile US land- and sea-based nuclear systems to move out of the area, enhancing survivability and further complicating adversary attack plans.

One often-overlooked point regarding homeland missile defenses is that, depending on their capabilities, they can reduce the need for adding more nuclear warheads to the US arsenal. If a certain number of US nuclear forces must survive a first strike to meet US deterrence requirements, that number can be achieved through changes in the number of nuclear warheads, the prelaunch survivability of those nuclear warheads, or some combination of both. Thus, in the absence of homeland missile defenses for US nuclear forces and NC3, the United States may be forced to rely on an even larger nuclear force than would otherwise be the case to meet survivability requirements.

Addressing counterarguments

There are two main policy counterarguments to improving and expanding US homeland missile defenses, both with long pedigrees extending back to the Cold War and the debate over the ABM Treaty.

Starting an “arms race”

Perhaps the most common response to proposals to improve and expand US homeland missile defenses is that such action would inevitably prompt an adversary reaction in the form of producing greater numbers of offensive missiles to overwhelm the defensive system. According to this line of thought, at best the action-reaction cycle will be a waste of resources for no net gain in security, and, at worst, the action-reaction cycle will continue unchecked and deepen the sense of security loss, leading to an arms race, worsened political relations, and potentially conflict.

While simple to understand as a concept, the offense-defense, action-reaction construct lacks a substantial historical foundation for its claims.33 For instance, the United States continued to improve and expand its homeland missile defenses after withdrawing from the ABM Treaty in 2002, and yet—contrary to the action-reaction hypothesis—Russia did not engage in an arms race with the United States to overcome those defenses.34 Indeed, during that time period, Russia engaged with the United States in agreeing to multiple nuclear arms control treaties while knowing that these treaties would not substantially limit US homeland missile defenses.35 As Ambassador Robert Joseph has observed, “while the conclusion of the ABM Treaty in 1972 led to the largest Soviet strategic nuclear build-up in history…the U.S. withdrawal from the treaty 30 years later was followed by an actual decrease in Russia’s strategic nuclear arsenal.”36 US actions on missile defenses simply are not as tightly linked to Russian reactions as the arms race hypothesis would suggest.

While Russia today portrays its new strategic nuclear programs as a reaction to US missile defense deployments, this was not the view of senior Russian officials a decade ago. In 2014, Russian Foreign Minister Sergei Lavrov stated, “I don’t think we are on the verge of a new arms race. At least Russia definitely won’t be a part of it. In our case, it’s just that the time has come for us to modernize our nuclear and conventional arsenals.”37 Russian President Vladimir Putin also stated in 2001 that the US withdrawal from the ABM Treaty “does not pose a threat to the national security of the Russian Federation.”38 These and other statements indicate Russian officials play up purported threats to their nuclear forces from US homeland missile defenses when it suits their needs, but often dismiss such threats and the risk of an arms race.39

Critics may respond that Russia may not fit the action-reaction hypothesis, but China’s vast nuclear expansion beginning around 2021 appears to conform to the predicted reaction. Yet, even in this case, it is far from clear that the primary driver of China’s nuclear expansion is an (unrealized) expansion in US homeland missile defenses. Indeed, the Biden administration signaled its reticence to significantly expand US homeland missile defenses in its “2022 Missile Defense Review,” reiterating that it sought to deter Chinese strikes on the homeland with US nuclear forces alone. Moreover, gone is the concept of “layered” homeland missile defense from that review and official Biden administration talking points. Adding to the unlikelihood that US homeland missile defenses are the primary driver of China’s nuclear missile buildup is the fact that China’s nuclear forces began growing rapidly all at once—making a break from the slow and steady buildup of decades past. Indeed, the action-reaction hypothesis would predict that, as the United States made incremental improvements to its homeland missile defenses, China would react in a similar manner. Instead, China made a sharp break from past practice, indicating an internal change in policy rather than a reaction to unrealized US homeland missile defense advances.

Sparking international conflict

The second major counterargument to improving and expanding US homeland missile defenses is that doing so might spark fears in China and Russia that the United States was gaining a significant military advantage. For China’s and Russia’s leaderships, this military advantage might be so severe and enduring that it would become unacceptable and require a correction or minimization through military force—be it a first strike or limited strikes. According to this line of reasoning, China and/or Russia would feel compelled to either prevent or disrupt US improvements or expansion of its homeland missile defenses because, if they became fully operational, they could threaten their continued existence. Often implicit in this criticism is the belief that expanded and improved US homeland missile defenses could enable a successful US first strike against Beijing or Moscow, or, at least, it may appear that way in each respective capital—thus requiring preemptive action.

Here too, there is little historical evidence to support this criticism. The United States, for instance, had a clear first-strike capability against the Soviet Union for over a decade early on in the Cold War, and yet it chose not to employ that capability. Indeed, China itself has existed for decades with its “minimum deterrence” nuclear force in the shadow of a nominal US first strike capability, and yet it did not believe it had to take drastic action. Additionally, as the acquisition history of major US weapon systems demonstrates, any significant change in policy and capability is likely to be measured in decades, making the need for sudden and drastic decisions (such as preemptive war with the United States) in Beijing and Moscow seem unfounded.

Finally, the notion that a nation like Russia or China would opt for a nuclear first strike against the United States during a crisis simply because it feared that going second would leave it at a disadvantage in the nuclear balance strains credulity. It would be irrational, in this scenario, for a nuclear power to strike another nuclear power that had survivable nuclear forces, which is the case for Russia, China, and the United States. As one scholar has asked, why would China intentionally start a devastating nuclear war against the United States because it feared losing a devastating nuclear war against the United States if it waited?40 Indeed, beginning a nuclear war for fear of eventually losing a future (potential) nuclear war would be to commit suicide for fear of death.

Two long-range GBIs are launched from Vandenberg Air Force Base, California, 2019. Source: Missile Defense Agency

Conclusion and recommendations

Even though this issue brief’s recommended actions represent a significant break from the US homeland missile defense policy of the past, there is still significant continuation with the number-one policy priority of every post-Cold War presidency: deterring attacks on the US homeland. The United States currently relies almost exclusively on the threat of a retaliatory response to deter an attack on the homeland. The authors’ conclusion is simple: deterrence is likely to work best when the threat of imposing costs is combined with the threat of denying benefits. The United States cannot rely on its threats of retaliation to suffice against North Korea, Russia, and China—states that, to one degree or another, may perceive a US homeland that is vulnerable to missile attack as an opportunity for successful coercion. How then should the United States determine what it should defend among the many potential targets in the homeland?

One answer lies at the intersection of those capabilities required for the US military theory of victory and those capabilities the adversary most fears the United States can employ to disrupt its theory of military victory. As defense analyst Benson Adams stated late in the Cold War:


The value, vulnerability, and priority of targets in terms of their worth to the defender and his strategy must be carefully assessed, and only those targets essential to the success of the defender’s strategy or which can defeat the attacker’s strategy are defended. Damage is to be expected. But what rates of attrition can be expected to deter and if deterrence fails what active and passive measures will, under conditions of damage, allow a target to function or survive and the initiative to be resumed by the offensive? . . . If the attacker thinks he has a way to neutralize the deterrent, the deterrent no longer deters.41

Rather than silver bullets, improved and expanded US homeland missile defenses are far more likely in the near future to prove to be useful counterweights to the “excessive reliance on offensive forces” for deterrence currently featured in the US strategic posture.42 Indeed, the question is not whether US homeland missile defense can replace offensive deterrence threats, but to what extent it can usefully contribute to deterrence by adding an element of denial to existing threats of punishment.

Therefore, this issue brief presents the following recommendations as potential means of improving deterrence and supporting the broader US national defense strategy. Detailed homeland missile defense architecture recommendations are beyond the scope of this paper and, in any case, would likely need to include classified information. Instead, these recommendations are the result of policy implications from the preceding discussion.

Recommendations

  1. Congress and the administration should reaffirm the US policy of staying ahead of rogue state ICBM threats to the homeland primarily via missile defenses, supplemented with “missile defeat” programs and nuclear deterrence. The United States must convince potential rogue adversaries, such as North Korea and Iran, that the employment of nuclear weapons against the US homeland would be fatal and futile.

    1. Continue plans to begin the fielding of twenty Next Generation Interceptors (with multiple kill vehicles) starting in 2028.
    2. Provide advance funding for an additional forty-four NGIs to replace existing ground-based interceptors.
    3. Determine, in cooperation with the intelligence community, the number of interceptors beyond the planned sixty-four, that may be required over the next ten years to pace the projected North Korean and potentially Iranian ICBM threats, while considering the role played by missile defeat forces.
    4. Provide an emergency/surge capability to defend the homeland against North Korean ICBMs with Aegis ballistic missile defense-equipped ships stationed in US ports and already assigned to all aerospace warning, control, and defense missions in North America, aka the Noble Eagle homeland defense mission of the North American Aerospace Defense Command (NORAD). This enhancement would require stationing existing ships capable of firing SM-3 IIA missiles at US naval ports during a crisis and increasing production of SM-3 IIA missiles from twelve to the current maximum of twenty-four per year.
    5. Expand the sea-launched emergency capability over the next few years by upgrading the SM-3 IIA missile and integrating it into the homeland missile defense command and control network.
    6. Examine the feasibility and cost of a land-based SM-3 IIA missile to provide an additional measure of protection against expanding North Korean and potential Iranian ICBM threats in the next decade.
  2. Revise US homeland missile defense policy to support a role for missile defense against coercive nuclear and nonnuclear strikes, regardless of the source.

    1. The definition of “coercive” should be based on an assessment of Chinese and Russian military theories of victory, both nuclear and conventional. Additionally, it should account for the capability of current and projected US homeland missile defense capabilities to intercept all types of Russian and Chinese missile-based threats.
    2. Determine what additional ground- and space-based capabilities and upgrades to existing and planned US homeland defenses interceptors are required to address the more sophisticated Chinese and Russian ICBM and hypersonic missile threats.
    3. Explore the technical capability of the SM-3 IIA and THAAD interceptors to provide preferential defenses for US nuclear forces and command and control in the late midcourse and terminal phases of flight.
    4. Explore new capabilities and technologies for missile defense, focused especially on directed energy and discrimination breakthroughs that might enable earlier and more confident identification of warheads versus countermeasures.
  3. Support the expansion of US homeland cruise missile defense capabilities, as advocated by the US Northern Command. Special emphasis should be placed on capabilities that enable domain awareness, lower the cost per intercept, and are difficult for adversaries to identify and locate.

About the authors

Matthew Costlow

Senior Analyst, National Institute for Public Policy

Robert Soofer

Senior Fellow, Forward Defense, Scowcroft Center for Strategy and Security, Atlantic Council

Acknowledgments

The Scowcroft Center for Strategy and Security’s work on nuclear and strategic forces has been made possible by support from our partners, including Los Alamos National Laboratory, Northrop Grumman Corporation, the Norwegian Ministry of Defense, the United States Department of Defense, the United States Department of Energy, as well as general support to the Scowcroft Center. The partners are not responsible for the content of this report, and the Scowcroft Center maintains a strict intellectual independence policy.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

1    See, for instance, Madelyn R. Creedon and Jon L. Kyl, chair and vice chair, America’s Strategic Posture: The Final Report of the Congressional Commission on the Strategic Posture of the United States, Institute for Defense Analyses, October 2023, https://armedservices.house.gov/sites/republicans.armedservices.house.gov/files/Strategic-Posture-Committee-Report-Final.pdf.
2    By “coercive,” this issue brief refers to strikes that are restricted in size and targets to achieve political and military advantages and affect US decision-making, but without prompting a response that they deem too costly. The Strategic Posture Commission offers a similar definition in its report, stating, “A ‘coercive’ attack consists of limited conventional or nuclear strikes intended to convince U.S. leadership that the costs of intervening or persevering in a conflict involving the attacker are too high. . . . Such coercive attacks are bounded in scale to avoid eliciting a severe U.S. response. The coercive effect of the attack is based on the threat that additional attacks will follow if the United States refuses to be coerced.” Creedon and Kyl, America’s Strategic Posture, 66.
3    This is a restatement of the choice posed by Reagan-era official Fred S. Hoffman in his “Imperfect Strategies, Near-Perfect Defenses, and the SDI,” in Swords and Shields: NATO, the USSR, and New Choices for Long-Range Offense and Defense, eds. Fred S. Hoffman, Albert Wohlstetter, and David S. Yost (Lexington, MA: Lexington Books, 1987), 205.
4    National Missile Defense Act of 1999, Pub. L. No: 106-38, 113 Stat. 205 (1999).
5    For instance, Rep. Seth Moulton, the top Democrat on the House Armed Services Subcommittee on Strategic Forces and a former Marine Corps captain, is wary of expanding US defenses against North Korea: “If we continue to expand our current arsenal of interceptors, we must ask not just how North Korea will respond, but how Russia and the [Chinese Communist Party] will respond as they see a pathway for our missile shield to impact their deterrent as well . . . at what point will this arms race provoke a response from Russia and the CCP?,” Moulton said in his opening statement, Hearing on Missile Defense Policy and Programs for Fiscal Year 2024 Before the House Subcomm. on Strategic Forces (April 19, 2023). House Armed Services Republicans, according to the committee’s official X account (Armed Services GOP@HASCRepublicans), by contrast, consider the current missile defense architecture inadequate to address the growing missile threat to the homeland, tweeting (before the platform became X), that “it needs to be the missile defense policy of the US to outpace the [Democratic People’s Republic of Korea] threat to the homeland. It’s clear that 44 Ground Based Interceptors are not enough. We need to accelerate Next Generation Interceptors and begin moving to space based defenses,” February 14, 2023, https://twitter.com/HASCRepublicans/status/1625555014411329536.
6    A point made by Keith B. Payne and Colin S. Gray, “Nuclear Policy and the Defensive Transition,” Foreign Affairs 62, no. 4 (1984): 829.
7    Hearing to Receive Testimony on the Posture of United States Northern Command and United States Southern Command in Review of the Defense Authorization Request for Fiscal Year 2024 and the Future Years Defense Program Before the Senate Armed Services Comm., 117th Cong. (2023) (statement of Glen D. VanHerck, commander, United States Northern Command and North American Aerospace Defense Command), 6, https://www.armed-services.senate.gov/imo/media/doc/NNC_FY23%20Posture%20Statement%2023%20March%20SASC%20FINAL.pdf.
8    2022 Missile Defense Review,” included in 2022 National Defense Strategy, US Department of Defense, October 27, 2022, 63-80, https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF.
9    Thersea Hitchens, “Beyond Bullet-on-Bullet: NORTHCOM’s New Defense Plan Looks to Kill Missiles Before They Launch,” Breaking Defense, August 9, 2023, https://breakingdefense.com/2023/08/beyond-bullet-on-bullet-northcoms-new-defense-plan-looks-to-kill-missiles-before-they-launch/.
10    Rep. Seth Moulton raised this concern at the April 19, 2023, House Armed Services Comm. Hearing on the president’s budget request for FY 2024 missile defense activities. See also, Jaganath Sankaran and Steve Fetter, “Defending the United States: Revisiting National Missile Defense against North Korea,” International Security 46, no. 3 (2022).
11    Hearing to Receive Testimony on the Department of Defense Missile Defense Activities in Review of the Defense Authorization Request for Fiscal Year 2024 and the Future Years Defense Program Before the Senate Armed Services Comm., 117th Cong. (2023) (statement of Jon A. Hill, director, Missile Defense Agency), 12, https://www.armed-services.senate.gov/imo/media/doc/23-46_05-09-2023.pdf.
12    For additional explanation of “layering” defenses, see “Layered Homeland Missile Defense,” US Department of Defense, June 2020, https://media.defense.gov/2020/Jun/22/2002319425/-1/-1/1/LAYERED-HOMELAND-MISSILE-DEFENSE-FINAL.pdf.
13    “U.S. Successfully Conducts SM-3 Block IIA Intercept Test Against an Intercontinental Ballistic Missile Target,” US Department of Defense news release, November 17, 2020, https://www.defense.gov/News/Releases/Release/Article/2417334/us-successfully-conducts-sm-3-block-iia-intercept-test-against-an-intercontinen/.
14    “2022 Missile Defense Review,” 6.
15    Keith B. Payne, Deterrence via Mutual Vulnerability? Why Not Now? (Fairfax, VA: National Institute for Public Policy, October 19, 2022), 4, https://nipp.org/wp-content/uploads/2022/10/Info-Series-536.pdf.
16    2022 Nuclear Posture Review,” US Department of Defense, 7.
17    Jason Sherman, “Northcom Nominee: U.S. Should Consider Means to Defeat Limited Russia, China ICBM Attack,” Inside Defense, July 26, 2023, https://insidedefense.com/daily-news/northcom-nominee-us-should-consider-means-defeat-limited-russia-china-icbm-attack.
18    Creedon and Kyl, America’s Strategic Posture, 72.
19    2022 Missile Defense Review,” 6.
20    For example, countermeasures and decoys take up throw weight and volume on a missile, possibly reducing the number of warheads or limiting range. The difference between appropriate countermeasures for endo- and exoatmospheric defense was noted early on in the Strategic Defense Initiative rollout. See Hoffman, “Imperfect Strategies, Near-Perfect Defenses, and the SDI,” 208.
21    2022 National Defense Strategy, 8.
22    Hearing to Receive Testimony on the Posture of United States Northern Command (statement of VanHerck).
23    For a prescient report that covers this topic, see Joint Chiefs of Staff, Joint Operating Environment 2035, July 14, 2016, 24-27, https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joe_2035_july16.pdf.
24    Hearing to Receive Testimony on the Posture of United States Northern Command (statement of VanHerck), 5-8.
25    Jason Sherman, “DOD Launches Domestic Cruise Missile Defense Program to protect U.S. Cities, ‘Critical’ Sites,” Inside Defense, September 5, 2023, https://insidedefense.com/share/218957.
26    Peppi DeBiaso, “Missile Defense and U.S. Strategic Competitors: An Evolving Approach?,” in Expert Commentary on the 2022 Missile Defense Review, ed. David J. Trachtenberg, National Institute for Public Policy Occasional Paper 3, no. 4 (2023): 33-44, https://www.nipp.org/wp-content/uploads/2023/04/OP-Vol.-3-No.-4.pdf.
27    Center for Global Security Research, China’s Emergence as a Second Nuclear Peer: Implications for US Nuclear Deterrence Strategy, CGSR Study Group Report, Lawrence Livermore National Laboratory, Spring 2023, https://cgsr.llnl.gov/content/assets/docs/CGSR_Two_Peer_230314.pdf.
28    Preferential limited missile defense for US strategic forces was considered during the Cold War. See MX Missile Basing, US Congress, Office of Technology Assessment, September 1981; and Report of the President’s Commission on Strategic Forces, April 1983, 9-10.
29    CGSR, China’s Emergence as a Second Nuclear Peer, 70.
30    Glen D. VanHerck, “Deter in Competition, Deescalate in Crisis, and Defeat in Conflict,” Joint Forces Quarterly 101, 2nd Quarter 2021, https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-101/jfq-101.pdf.
31    Figure 2 is a notional depiction of THAAD’s defensive footprint against ICBMs, as assessed by Lockheed Martin Company. Vice Admiral Jon Hill had testified that THAAD may have some limited capability against long-range ballistic missiles; see Hearing Before House Armed Services Subcomm. on Strategic Forces (March 2020) (statement of Jon Hill, then-director, Missile Defense Agency), 7, https://www.congress.gov/116/meeting/house/110671/witnesses/HHRG-116-AS29-Wstate-HillJ-20200312.pdf.
32    Andrew F. Krepinevich Jr., Modernizing the Nuclear Triad: Decline or Renewal? Hudson Institute, October 2021, 23, http://s3.amazonaws.com/media.hudson.org/Krepinevich_Modernizing%20the%20Nuclear%20Triad%20-%20Decline%20or%20Renewal.pdf.
33    For a scholarly treatment of arms racing, see Matthew Kroenig, The Logic of American Nuclear Strategy: Why Strategic Superiority Matters (New York: Oxford University Press, 2018) 143-158.
34    For additional commentary on these cases, see Matthew R. Costlow, “The Missile Defense ‘Arms Race’ Myth,” Strategic Studies Quarterly 15, no. 1 (Spring 2021), https://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-15_Issue-1/Costlow.pdf; and Matthew R. Costlow, Vulnerability Is No Virtue and Defense Is No Vice, National Institute for Public Policy, Occasional Paper 2, no. 9 (2022), https://nipp.org/wp-content/uploads/2022/09/OP-Vol.-2-No.-9.pdf.
35    Robert Soofer, “Missile Defense Is Compatible with Arms Control,” War on the Rocks, April 29, 2021, https://warontherocks.com/2021/04/missile-defense-is-compatible-with-arms-control/.
36    For an excellent critique of the action-reaction theory, see David Trachtenberg, Michaela Dodge, and Keith Payne, “The Action-Reaction Arms Race Narrative vs. Historical Realities,” National Institute Press, 2021. The quote by Ambassador Joseph is found on page 66.
37    Gabriela Baczynska, “Russia’s Lavrov Says Time Has Come to Upgrade Nuclear, Conventional Arms,” Reuters, September 28, 2014.
38    “Statement by Russian President Vladimir Putin Regarding the Decision of the Administration of the United States of America to Withdraw from the Antiballistic Missile Treaty of 1972,” December 13, 2001.
39    Matthew R. Costlow, The Folly of Limiting U.S. Missile Defenses for Nuclear Arms Control, National Institute for Public Policy, October 18, 2021, Information Series #505, https://nipp.org/wp-content/uploads/2021/10/IS-505.pdf.
40    For an elaboration of this argument, see Kroenig, Logic of American Nuclear Strategy, 136-141.
41    Benson D. Adams, “In Defense of the Homeland,” Proceedings 109 (1983): 50.
42    A phrase coined by Fred Hoffman in Hoffman, “Imperfect Strategies, Near-Perfect Defenses, and the SDI,” 219.

The post US homeland missile defense: Room for expanded roles appeared first on Atlantic Council.

]]>
Why Ukraine refuses to negotiate with “habitual liar” Vladimir Putin https://www.atlanticcouncil.org/blogs/ukrainealert/why-ukraine-refuses-to-negotiate-with-habitual-liar-vladimir-putin/ Tue, 14 Nov 2023 21:32:30 +0000 https://www.atlanticcouncil.org/?p=703788 Ukrainian Foreign Minister Dmytro Kuleba has dismissed mounting calls for a negotiated peace deal with Russia, arguing that Vladimir Putin is a "habitual liar" who cannot be trusted to keep his word, writes Peter Dickinson.

The post Why Ukraine refuses to negotiate with “habitual liar” Vladimir Putin appeared first on Atlantic Council.

]]>
Ukrainian Foreign Minister Dmytro Kuleba has dismissed mounting calls for a negotiated settlement with Russia, arguing that Vladimir Putin simply cannot be trusted to keep his word. In a withering social media post published on November 14, Ukraine’s top diplomat claimed Russia routinely disregards its international commitments and cited numerous examples of the Kremlin blatantly breaching agreements reached at the negotiating table. “Putin is a habitual liar who promised international leaders that he would not attack Ukraine days before his invasion in February 2022,” Kuleba noted.

The Ukrainian Foreign Minister’s outspoken rejection of negotiations with the Putin regime comes at a delicate moment for the coalition of countries opposing the Russian invasion of Ukraine. International concerns have been mounting since late summer over the slow progress of Ukraine’s much-hyped counteroffensive, with some commentators pointing to the lack of a decisive military breakthrough as evidence that earlier hopes of defeating Russia on the battlefield are now unrealistic. The mood darkened further in early November, when Ukrainian commander-in-chief Valery Zaluzhny acknowledged in an interview with Britain’s The Economist that the war with Russia had reached a stalemate.

Officials in Kyiv have denied recent reports that Ukraine’s allies are pushing the country to enter into peace talks with Russia. “No leader of the United States or European Union, our partners, nobody puts pressure on us to sit at the negotiation table with Russia and give something away,” Ukrainian President Volodymyr Zelenskyy stated in early November. Zelenskyy himself has repeatedly ruled out any direct talks with Putin, insisting instead that the time for diplomacy will only come once Russian troops have retreated from Ukraine.

Kuleba has now elaborated further, listing a series of broken Russian promises to illustrate why Kyiv has no faith whatsoever in negotiations with Moscow. The Ukrainian Foreign Minister referenced a number of international agreements that were subsequently broken by Russia, beginning with the 1994 Budapest Memorandum and ending with the 2022 Black Sea Grain Initiative. On multiple occasions, he pointed out, Russia had committed to respecting Ukraine’s territorial integrity, but this did not prevent Putin from launching the largest European war of aggression since World War II. “Russia’s tactics have remained consistent in its many wars over the last three decades: Kill, grab, lie, and deny,” he wrote. “Why would anyone genuinely believe that Russia in 2023 is any different from Russia in 1994, 1997, 1999, 2008, 2014, 2015, and 2022?”

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Ukraine’s leaders are not alone in questioning the sincerity of Russian diplomacy. Indeed, Moscow’s credibility on the international stage has been seriously undermined by almost a decade of aggression against Ukraine that has been accompanied by a relentless flood of often transparent disinformation. When Russian soldiers without insignia first seized control of Ukraine’s Crimean peninsula in February 2014, Putin initially denied any Russian involvement, only to later admit that he had in fact personally given the order to invade. This naked deceit set the tone for Russia’s escalating attack on Ukraine.

Weeks after the military takeover of Crimea, Putin made similarly implausible claims of innocence as the same so-called “little green men” sparked a war in eastern Ukraine’s Donbas region. For the next eight years, Moscow officials would continue to stubbornly insist Russia was not involved in eastern Ukraine, despite mountains of evidence clearly demonstrating the presence of the Russian military and the Kremlin’s direct control over the entire invasion. Russia’s policy of blanket denials made it virtually impossible to establish a viable ceasefire or move forward toward a sustainable settlement of the war in eastern Ukraine. Instead, Moscow made sure the conflict remained unresolved and continued to simmer, setting the stage for the full-scale invasion of February 2022.

The build-up to the current invasion was marked by a further increase in Russian disinformation. For months prior to the outbreak of hostilities, Putin and other leading Russian officials loudly proclaimed that they had no intention of invading Ukraine and accused the West of warmongering. Some senior Kremlin figures even mocked international alarm over the possibility of a major European war. “February 15, 2022 will go down in history as the day of the failure of Western war propaganda. Humiliated and destroyed without firing a shot,” commented Russian foreign ministry spokesperson Maria Zakharova just days before columns of Russian tanks crossed the border into Ukraine.

Given Russia’s long record of broken treaties and barefaced lies, it is little wonder the Ukrainian authorities insist negotiations can only begin after the Russian army has been beaten on the battlefield and forced to withdraw from Ukraine. Nor is there any indication that Putin himself is ready to negotiate. On the contrary, the Russian dictator is openly preparing his country for a long war and appears to be more convinced than ever that time is on his side.

Putin faces no real anti-war movement at home and has largely weathered the economic storms created by imperfectly implemented Western sanctions. While Russian military losses in Ukraine have been exceptionally high, the Kremlin has been careful to recruit cannon fodder from perceived low-risk groups such as convicted criminals, members of Russia’s ethnic minorities, and military-age males conscripted from occupied regions of Ukraine. This has made it possible to insulate the Russian middle classes from the horrors of the conflict unfolding in neighboring Ukraine.

With international resolve to oppose the invasion now beginning to visibly weaken and Western leaders distracted by events in Israel, Putin is also confident of outlasting the democratic world in Ukraine. He has always believed the West ultimately lacks the stomach for a prolonged confrontation with Russia, and is prepared to wait as long as necessary until international support for Ukraine wanes.

In the present circumstances, any attempts to pressure Ukraine into negotiating a compromise peace with Russia would have disastrous consequences for the future of international security. Unless Russia is decisively defeated, there is almost no chance of the Kremlin honoring any commitments made during negotiations. Instead, a messy peace deal would reward Putin for his decision to invade Ukraine and fuel Russia’s sense of impunity, paving the way for the next phase of Moscow’s campaign to extinguish Ukrainian statehood and revive the Russian Empire.

The Ukrainians understand this perfectly well. They have learned from bitter experience that Putin’s Russia cannot be trusted, which is why they are now so adamantly opposed to premature peace talks and recognize that making concessions to the Kremlin will only prolong their country’s agony. Anyone calling for a return to the negotiating table needs to be similarly realistic about the true nature of the Putin regime. A ceasefire may seem like the quickest way to end the bloodshed, but this is wishful thinking. In order to secure a lasting peace, Ukraine must win.

Peter Dickinson is editor of the Atlantic Council’s UkraineAlert service.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Why Ukraine refuses to negotiate with “habitual liar” Vladimir Putin appeared first on Atlantic Council.

]]>
Garlauskas’ analysis of East Asia simultaneous conflicts mentioned in Korea JoongAng Daily https://www.atlanticcouncil.org/insight-impact/in-the-news/garlauskas-analysis-of-east-asia-simultaneous-conflicts-mentioned-in-korea-joongang-daily/ Fri, 10 Nov 2023 22:19:17 +0000 https://www.atlanticcouncil.org/?p=708558 On November 9, Markus Garlauskas’ analysis of simultaneous conflict scenarios in East Asia was referenced in a Korea JoongAng Daily article by retired Admiral Choi Yoon-hee, former chairman of South Korea’s Joint Chiefs of Staff. The article argues that the United States’ allies must build up their own capacity for defense and avoid relying solely […]

The post Garlauskas’ analysis of East Asia simultaneous conflicts mentioned in Korea JoongAng Daily appeared first on Atlantic Council.

]]>

On November 9, Markus Garlauskas’ analysis of simultaneous conflict scenarios in East Asia was referenced in a Korea JoongAng Daily article by retired Admiral Choi Yoon-hee, former chairman of South Korea’s Joint Chiefs of Staff. The article argues that the United States’ allies must build up their own capacity for defense and avoid relying solely on the United States for help in a crisis. 

The post Garlauskas’ analysis of East Asia simultaneous conflicts mentioned in Korea JoongAng Daily appeared first on Atlantic Council.

]]>
LeBaron in Semafor: Middle East braces for long, violent war https://www.atlanticcouncil.org/insight-impact/in-the-news/lebaron-in-semafor-middle-east-braces-for-long-violent-war/ Fri, 10 Nov 2023 18:57:35 +0000 https://www.atlanticcouncil.org/?p=702724 The post LeBaron in Semafor: Middle East braces for long, violent war appeared first on Atlantic Council.

]]>

The post LeBaron in Semafor: Middle East braces for long, violent war appeared first on Atlantic Council.

]]>
LeBaron on CBS News: Americans are trying to help family escape Israel following Gaza “complete siege” order https://www.atlanticcouncil.org/insight-impact/in-the-news/lebaron-on-cbs-news-americans-are-trying-to-help-family-escape-israel-following-gaza-complete-siege-order/ Fri, 10 Nov 2023 18:55:16 +0000 https://www.atlanticcouncil.org/?p=702721 The post LeBaron on CBS News: Americans are trying to help family escape Israel following Gaza “complete siege” order appeared first on Atlantic Council.

]]>

The post LeBaron on CBS News: Americans are trying to help family escape Israel following Gaza “complete siege” order appeared first on Atlantic Council.

]]>
LeBaron in Reuters: In striking Israel, Hamas also took aim at Middle East security realignment https://www.atlanticcouncil.org/insight-impact/in-the-news/lebaron-in-reuters-in-striking-israel-hamas-also-took-aim-at-middle-east-security-realignment/ Fri, 10 Nov 2023 18:53:21 +0000 https://www.atlanticcouncil.org/?p=702719 The post LeBaron in Reuters: In striking Israel, Hamas also took aim at Middle East security realignment appeared first on Atlantic Council.

]]>

The post LeBaron in Reuters: In striking Israel, Hamas also took aim at Middle East security realignment appeared first on Atlantic Council.

]]>
LeBaron in DW: Has Hamas reset the Israeli-Arab agenda? https://www.atlanticcouncil.org/insight-impact/in-the-news/lebaron-in-dw-has-hamas-reset-the-israeli-arab-agenda/ Fri, 10 Nov 2023 18:52:17 +0000 https://www.atlanticcouncil.org/?p=702717 The post LeBaron in DW: Has Hamas reset the Israeli-Arab agenda? appeared first on Atlantic Council.

]]>

The post LeBaron in DW: Has Hamas reset the Israeli-Arab agenda? appeared first on Atlantic Council.

]]>
Grundman in The Economist https://www.atlanticcouncil.org/insight-impact/in-the-news/grundman-in-the-economist/ Fri, 10 Nov 2023 16:03:51 +0000 https://www.atlanticcouncil.org/?p=701992 Economist cites Steve Grundman on defense innovation and the Atlantic Council's Commission on Defense Innovation Adoption.

The post Grundman in The Economist appeared first on Atlantic Council.

]]>

On November 1, Forward Defense senior fellow Steve Grundman was quoted in The Economist discussing the challenges for US defense contractors posed by technological innovation and acquisition reforms.

The article also referenced Atlantic Council’s Commission on Defense Innovation Adoption, highlighting its positive impact in identifying obstacles for smaller innovators to leverage existing opportunities in defense contracting.

Forward Defense, housed within the Scowcroft Center for Strategy and Security, generates ideas and connects stakeholders in the defense ecosystem to promote an enduring military advantage for the United States, its allies, and partners. Our work identifies the defense strategies, capabilities, and resources the United States needs to deter and, if necessary, prevail in future conflict.

The post Grundman in The Economist appeared first on Atlantic Council.

]]>
Nusairat quoted in Washington Examiner on the Israel-Hamas war reaching its one-month mark https://www.atlanticcouncil.org/insight-impact/in-the-news/nusairat-quoted-in-washington-examiner-the-israel-hamas-war-reaching-its-one-month-mark/ Tue, 07 Nov 2023 14:41:20 +0000 https://www.atlanticcouncil.org/?p=703492 The post Nusairat quoted in Washington Examiner on the Israel-Hamas war reaching its one-month mark appeared first on Atlantic Council.

]]>

The post Nusairat quoted in Washington Examiner on the Israel-Hamas war reaching its one-month mark appeared first on Atlantic Council.

]]>
Donovan quoted by Al-Monitor on identifying donors to Hamas https://www.atlanticcouncil.org/insight-impact/in-the-news/donovan-quoted-by-al-monitor-on-identifying-donors-to-hamas/ Thu, 02 Nov 2023 18:38:43 +0000 https://www.atlanticcouncil.org/?p=700477 Read the full article here.

The post Donovan quoted by Al-Monitor on identifying donors to Hamas appeared first on Atlantic Council.

]]>
Read the full article here.

The post Donovan quoted by Al-Monitor on identifying donors to Hamas appeared first on Atlantic Council.

]]>
The 5×5—The cybersecurity implications of artificial intelligence https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-the-cybersecurity-implications-of-artificial-intelligence/ Fri, 27 Oct 2023 04:01:00 +0000 https://www.atlanticcouncil.org/?p=696721 A group of experts with diverse perspectives discusses the intersection of cybersecurity and artificial intelligence.

The post The 5×5—The cybersecurity implications of artificial intelligence appeared first on Atlantic Council.

]]>
This article is part of The 5×5, a monthly series by the Cyber Statecraft Initiative, in which five featured experts answer five questions on a common theme, trend, or current event in the world of cyber. Interested in the 5×5 and want to see a particular topic, event, or question covered? Contact Simon Handler with the Cyber Statecraft Initiative at SHandler@atlanticcouncil.org.

The arrival of ChatGPT, a chat interface built atop OpenAI’s GPT-3 model, in November 2022 provoked a frenzy of interest and activity in artificial intelligence (AI) from consumers, investors, corporate leaders and policymakers alike. Its demonstration of uncanny conversational abilities, as well as, later, the ability to write code, stoked the collective imagination as well as predictions about its likely impacts and integration into myriad technology systems and tasks.  

The history of the field of AI stretches back to the 1950s, and more narrow machine learning models have been solving problems in prediction and analysis for nearly two decades. In fact, these models are already embedded in the cybersecurity lifecycle, most prominently in threat monitoring and detection. Yet, the emergence of the current generation of generative AI, powered by large language models, is producing markedly different capabilities than previous deep learning systems. Researchers are only beginning to explore the potential uses of generative AI systems in cybersecurity, as well as the potential threats arising from malign use or cyberattacks against generative AI systems themselves. 

With cybersecurity playing a significant role in recently announced voluntary commitments by leading AI companies, a sweeping Executive Order on AI expected next week, and leading AI companies allowing their products to be used to construct increasingly autonomous systems, a discussion about the intersection of generative AI and cybersecurity could not be timelier. To that end, we assembled a group with diverse perspectives to discuss the intersection of cybersecurity and artificial intelligence. 

#1 AI hype has risen and fallen in cycles with breakthrough achievements and paradigm shifts. How do large language models (LLM), and the associated hype wave, compare to previous AI paradigms? 

Harriet Farlow, chief executive officer and founder, Mileva Security Labs; PhD candidate, UNSW Canberra:  

“In my opinion, the excitement around large language models (LLMs) is similar [to excitement around past paradigm shifts] in that it showcases remarkable advancements in AI capabilities. It differs in that LLMs are significantly more powerful than the AI technologies of previous hype cycles. The concern I have with this hype—and I believe AI in general is already over-hyped—is that it gives the impression to non-practitioners that LLMs are the primary embodiment of AI. In reality, the natural language processing of LLMs is just one aspect of the myriad capabilities of AI, with other significant capabilities including computer vision and signal processing. My worry is that rapid adoption of AI and increasing trust in these systems, combined with the lack of awareness that AI systems can be hacked, means there are many productionized AI systems that are vulnerable to adversarial attack.”  

Tim Fist, fellow, technology & national security, Center for a New American Security:  

“While people’s excitement may have a similar character to previous AI ‘booms,’ such as in the 1960s, LLMs and other similar model architectures have some technical properties that together suggest the consequences of the current boom will be, to put it lightly, further reaching. These properties include task agnostic learning, in-context learning, and scaling. Unlike the AI models of yore, LLMs have impressive task performance in many domains at once—writing code, solving math problems, verbal reasoning—rather than one specific domain. Today’s ‘multimodal’ models are the next evolution of these capabilities, bringing the ability to understand and generate both natural language and images, with other modalities in the works. On top of their generality, once trained, LLMs can learn on the fly, allowing them to adapt to and perform reasonably well in novel contexts. LLMs and their multimodal cousins are AI architectures that can successfully leverage exponentially increasing amounts of computing power and data into greater and greater capabilities. This capacity means the basic recipe for more performance and generality is straightforward: just scale the inputs. This trend does not show any clear signs of slowing down.”  

Dan Guido, chief executive officer, Trail of Bits:  

“It is both the same and different. Like the hype surrounding LLMs, prior hype cycles arose due to the promise of fundamentally new capabilities in artificial intelligence, although not all the promised effects materialized. What is different this time is that the results of AI are immediately available to consumers. Now, AI is doing things that people thought computers could never do, like write stories, tell jokes, draw, or write your high school essays. This has occurred due to both fundamental advances like the Transformer model, and Sutter’s bitter lesson that AI becomes better with more computing power. We now have the computation to provide immense scale that was previously unachievable.” 

Joshua Saxe, senior staff research scientist, Meta:  

“The hype around LLMs rhymes with past hype cycles, but because AI is a real and substantive technology, each wave of hype does change security, even if less than AI boosters have anticipated. The hype wave of the 2010s fueled ideas that AI would fundamentally transform almost every aspect of cybersecurity practice, but, in fact, only disrupted security detection pipelines—for example, machine learning is now ubiquitous in malware and phishing detection pipelines. Similarly broad claims are being made about this current hype wave. Many of the imagined applications of LLMs will fall away, but as the bubble deflates we will see some genuinely new and load-bearing applications of LLMs within security.” 

Helen Toner, director of strategy and foundational research grants, Center for Security and Emerging Technology, Georgetown University:  

“I believe expectations are too high for what generative AI will be able to do this year or next. But on a slightly longer timeframe, I think the potential of the current deep learning-focused paradigm—LLMs being one its many faces—is still building. The level of investment and talent going into LLMs and other types of deep learning far outstrips AI waves of previous decades, which is evidence for—and a driver of—this wave being different.” 

#2 What potential applications of generative AI in cybersecurity most excite you? Which are over-hyped?  

Farlow: “In my experience, most people still use the term ‘AI’ the way they would ‘magic.’ I find too many conversations about how AI should be used in cybersecurity are based on trying to replicate and multiply the human workforce using AI. This is a very hard problem to solve, as most AI technologies are not good at operating autonomously across a range of tasks, especially when there is ambiguity and context-dependence. However, AI technologies are very good at assisting in narrow tasks like phishing and fraud detection, malware detection, and user and entity behavior analytics, for example. My focus is less on AI for cybersecurity, and instead on transferring cybersecurity principles into the field of AI to understand and manage the AI attack surface; this is where I think there needs to be more investment.”  

Fist: “I predict that most people, including myself, will be surprised about which specific generative AI-powered applications in cybersecurity end up being most important. The capabilities of today’s models suggest a few viable use cases. Proof-of-concepts exist for offensive tools that use the capabilities of state-of-the-art generative models (e.g., coding expertise, flexibility) to adapt to new environments and write novel attacks on the fly. Attackers could plausibly combine these capabilities with an ‘agentized’ architecture to allow for autonomous vulnerability discovery and attack campaigns. Spearphishing and social engineering attacks are other obvious use cases in the near term. A Center for a New American Security report lays out a few other examples in Section 3.1.2. One important question is whether these capabilities will disproportionately favor attackers or defenders. As of now, the relative ease of generation compared to detection suggests that detectors might not win the arms race.”  

Guido: “To judge whether something is overhyped or underhyped, consider whether it is a sustaining innovation or a disruptive innovation. That is, are any fundamental barriers being broken that were not before? Currently overhyped areas of cybersecurity research include crafting exploits, identifying zero-day vulnerabilities, and creating novel strains of malware. Attackers can already do these things very well. While AI will accelerate these activities, it does not offer a fundamentally new capability. AI shines in providing scalability to tasks that previously required an infeasible amount of effort by trained humans, including continuous cybersecurity education (AI is infinitely patient), testing and specification development, and many varieties of security monitoring and analysis. In July, Trail of Bits described how these capabilities may affect national security for the White House Office of Science and Technology Policy.” 

Saxe: “Much of what people claim around applications of generative AI in cybersecurity is not substantiated by the underlying capabilities of the technology. LLMs, which are the most important generative AI technology for security, have a few proven application areas: they are good at summarizing technical text (including code), they are good at classifying text (including code and cybersecurity relevant text), and they are good at auto-completion. They are good at all this, even without the presence of training data. Applications that exploit these core competencies in LLMs, such as detecting spearphishing emails, identifying risky programming practices in code, or detecting exfiltration of sensitive data, are likely to succeed. Applications that imagine LLMs functioning as autonomous agents, solving hard program analysis problems, or configuring security systems, are less likely to succeed.”  

Toner: “I am skeptical that deepfake videos are going to upend elections or destroy democracy. More generally, I think many applications are overhyped in terms of their likely effects in the very near term. Over the longer term, though—two-plus years from now—I think plenty of things are under-hyped. One is the possibility of mass spearphishing, highly individualized attacks at large scale. Another is the chance that generative AI could significantly expand the number of groups that are able to successfully hack critical infrastructure. I hope that I am wrong on both counts!”  

#3 In what areas of generative AI and cybersecurity do you want to see significant research and development in the next five years?  

Farlow: “While there is no denying that generative AI has garnered its fair share of hype, I cannot help but remain somewhat cynical about the singular focus on this technology. There is a vast landscape of AI advancements, including reinforcement learning, robotics, interpretable AI, and adversarial machine learning, that deserve equal attention. I find generative AI fascinating and exciting, but I also like to play devil’s advocate and note that the future of AI is not solely dependent on generative models. We should broaden our discussions to encompass the broader spectrum of AI research and its implications for various fields, as well as its security.”  

Fist: “I am excited to see more research and development on AI-driven defenses, especially in the automated discovery and patching of vulnerabilities in AI models themselves. The recent paper ‘Universal and Transferable Adversarial Attacks on Aligned Language Models’ is a great example of this kind of work. This research suggests that jailbreak discovery of open-source models like Llama is highly automatable and that these attacks transfer to closed-source models like GPT-4. This is an important problem to highlight. This problem also suggests that AI labs and cybersecurity researchers should work closely together to find vulnerabilities in models, including planned open-source models, and patch them before the models are widely deployed.”  

Guido: “In July, Trail of Bits told the Commodity Futures Trading Commission that our top wishlist items are benchmarks and datasets to evaluate AI’s capability in cybersecurity, like a Netflix prize but for Cybersecurity+AI. Like the original ImageNet dataset, these benchmarks help focus research efforts and drive innovation. The UK recently announced it was funding Trail of Bits to create one such benchmark. Second would be guides, tools, and libraries to help safely use the current generation of generative AI tools. Generative AI’s failure modes are different from those of traditional software and, to avoid a security catastrophe down the road, we should make it easy for developers to do the right thing. The field is progressing so rapidly that the most exciting research and development will likely happen to tools that have not been created yet. Right now, most AI deployments implement AI as a feature of existing software. What is coming are new kinds of things where AI is the toolsomething like an exact decompiler for any programming language, or an AI assistant that crafts specifications or tests for your code as you write.” 

Saxe: “I think there are multiple threads here, each with its own risk/reward profile. The low-risk research and development work will be in taking existing LLM capabilities and weaving them into security tools and workflows that extract maximal value from capabilities they already offer. For example, it seems likely that XDR/EDR/SIEM tooling and workflows can be improved by LLM next-token prediction and LLM embeddings at every node in current security workflows, and that what lies ahead is incremental work in iteratively figuring out how. On the higher-risk end of the spectrum, as successor models to LLMs and multimodal LLMs emerge that are capable of behaving as agents in the world in the next few years, we will need to figure out what these models can do autonomously.” 

Toner: “This is perhaps not directly an area of cybersecurity, but I would love to see more progress in digital identity—in building and deploying systems that allow humans to prove their humanity online. There are some approaches to this under development that use cryptography and clever design to enable you to prove things about your identity online while also preserving your privacy. I expect these kinds of systems to be increasingly important as AI systems become more capable of impersonating human behavior online.”

More from the Cyber Statecraft Initiative:

#4 How can AI policy account for both the technology itself as well as the contexts in which generative AI is developed and deployed?  

Farlow: “As I am sure readers are aware, the question of regulating AI has become quite a philosophical debate, with some jurisdictions creating policy for the AI technology, and others focusing on policy that regulates how different industries may choose to use that technology. And then within that, some jurisdictions are choosing to regulate only certain kinds of AI, such as generative AI. Given that AI encompasses an incredibly large landscape of technologies across an even broader range of use cases, I would like to see more analysis that explores both angles from a risk lens that can be used to inform internationally recognized and relevant regulation. While some AI applications can be risky and unethical and should be regulated or blocked, such as facial recognition for targeted assassinations, policy should not stifle innovation by constraining research and frontier labs. I would like to see regulation informed by a scientific method with the intention to be universally applicable and adopted.” 

Fist: “End-use-focused policies make sense for technology used in any high-risk domain, and generative AI models should be no different. An additional dedicated regulatory approach is likely required for highly capable general-purpose models at the frontier of research and development, known as ‘frontier models.’ Such systems develop new capabilities in an unpredictable way, are hard to make reliably safe, and are likely to proliferate rapidly due to their multitude of possible uses. These are problems that are difficult to address with sector-specific regulation. Luckily, a dedicated regulatory approach for these models would only affect a handful of models and model developers. The recent voluntary commitments secured by the White House from seven leading companies is a great start. I recently contributed to a paper that goes into some of these considerations in more detail.”  

Guido: “In June, Trail of Bits told the National Telecommunications and Information Administration that there can be no AI accountability or regulation without a defined context. An audit of an AI system must be measured against actual verifiable claims regarding what the system is supposed to do, rather than against narrow AI-related benchmarks. For instance, it would be silly to have the same regulation apply to medical devices, home security systems, automobiles, and smart speakers solely because they all use some form of AI. Conversely, we should not allow the use of AI to become a ‘get out of regulation free’ card because, you see, ‘the AI did it!.’”  

Toner: “We need some of both. The default starting point should be that existing laws and regulations cover specific use cases within their sectors. But in some areas, we may need broader rules—for instance, requiring AI-generated content to be marked as such, or monitoring the development of potentially dangerous models.” 

#5 How far can existing legal structures go in providing guardrails for AI in context? Where will new policy structures be needed?  

Farlow: “Making policy for generative AI in context means tailoring regulations to specific industries and applications. There are a number of challenges associated with AI that are not necessarily new—data protection laws, for example, may be quite applicable to the use of AI (or attacks on AI) that expose information. However, AI technology is fundamentally different to cyber and information systems on which much of existing technology law and policy is based. For example, AI systems are inherently probabilistic, whereas cyber and information systems are rule-based. I believe there need to be new policy structures that can address novel challenges like adversarial attacks, deep fakes, model interpretability, and mandates on secure AI design.”  

Fist: “Liability is a clear example of an existing legal approach that will be useful. Model developers should probably be made strictly liable for severe harm caused by their products. For potential future models that pose severe risks, those risks may not be able to be adequately addressed using after-the-fact remedies like liability. For these kinds of models, ex-ante approaches like licensing could be appropriate. The Food and Drug Administration and Federal Aviation Administration offer interesting case studies, but neither seems like exactly the right approach for frontier AI. In the interim, an information-gathering approach like mandatory registration of frontier models looks promising. One thing is clear: governments will need to build much more expertise than they currently possess to define and update standards for measuring model capabilities and issuing guidance on their oversight.”  

Guido: “Existing industries have robust and effective regulatory and rule-setting bodies that work well for specific domains and provide relevant industry context. These same rule-setting bodies are best positioned to assess the impact of AI with the proper context. Some genuinely new emergent technologies may not fit into a current regulatory structure; these should be treated like any other new development and regulated based on the legislative process and societal needs.”  

Toner: “Congress’ first step to manage new concerns from AI, generative and otherwise, should be to ensure that existing sectoral regulators have the resources, personnel, and authorities that they need. Wherever we already have an agency with deep expertise in an area—the Federal Aviation Administration for airplanes, the Food and Drug Administration for medical devices, the financial regulators for banking—we should empower them to handle AI within their wheelhouse. That being said, some of the challenges posed by AI would fall through the cracks of a purely sector-by-sector approach. Areas that may need more cross-cutting policy include protecting civil rights from government use of AI, clarifying liability rules to ensure that AI developers are held accountable when their systems cause harm, and managing novel risks from the most advanced systems at the cutting edge of the field.”

Simon Handler is a fellow at the Atlantic Council’s Cyber Statecraft Initiative within the Digital Forensic Research Lab (DFRLab). He is also the editor-in-chief of The 5×5, a series on trends and themes in cyber policy. Follow him on Twitter @SimonPHandler.

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

The post The 5×5—The cybersecurity implications of artificial intelligence appeared first on Atlantic Council.

]]>
Continued US and allied integration is essential to deter Russian CBRN use https://www.atlanticcouncil.org/in-depth-research-reports/report/continued-us-and-allied-integration-is-essential-to-deter-russian-cbrn-use/ Thu, 26 Oct 2023 17:50:09 +0000 https://www.atlanticcouncil.org/?p=694077 This report presents the findings and recommendations of the Atlantic Council project Conceptualizing Integrated Deterrence to Address Russian Chemical, Biological, Radiological, and Nuclear (CBRN) Escalation. The objective of this project was to develop an approach for incorporating European allies and partners into the US model of integrated deterrence against Russian CBRN use.

The post Continued US and allied integration is essential to deter Russian CBRN use appeared first on Atlantic Council.

]]>

This report presents the findings and recommendations of the Atlantic Council project, Conceptualizing Integrated Deterrence to Address Russian Chemical, Biological, Radiological, and Nuclear (CBRN) Escalation. The objective of this project was to develop an approach for incorporating European allies and partners into the US model of integrated deterrence against Russian CBRN use.

Key findings summary:

  1. Allies and partners already significantly contribute to US approaches to counter Russian CBRN threats in Europe. Future cooperation—bilaterally, multilaterally, and through NATO— should focus on areas of greatest need as mutually identified by the United States and its European allies and partners.
  2. As a concept, integrated deterrence is a useful frame for examining cooperation with European nations to counter Russia’s CBRN threats, but the US Government should use this framing to identify new opportunities, rather than detract from or encapsulate ongoing cooperation.
  3. Civil-military cooperation across a variety of sectors is essential to respond to CBRN threats, especially among public health agencies and law enforcement. To fully realize integrated deterrence in the next five to ten years, greater coordination among civilian and military communities—within the United States and among its European allies and partners—is essential to enhancing resilience.
  4. Challenges for US cooperation with allies and partners to counter CBRN threats, especially as these threats become more complex. The United States and its European allies should remain vigilant about emerging threats, while leveraging new technological developments in detection and attribution systems and emergency response mechanisms to build comprehensive defenses against CBRN threats.
  5. As Russia deploys hybrid warfare tactics to support and conceal potential CBRN escalation, the United States and its European allies must prepare to combat malign influence efforts, such as information influence activities, targeted assassinations, energy sabotage, and economic coercion, related to CBRN use as part of the US strategy of integrated deterrence.

Table of contents

Introduction
Background
Research question
Key findings summary
Methodology
Scenario-building workshop
Interviews with officials and experts
Insights from the scenario-building workshop
Part I: Understanding the effect of Russia’s conventional warfare capabilities and regime stability on CBRN escalation
Key takeaways from Part I
Part II: Conceptualizing integrated deterrence among the United States and its European Allies to address CBRN weapons use
Key takeaways from Part II
Insights from interviews
Allied alignment over the severity of Russian CBRN threat
Existing cooperation among Allies supports US goals
Areas for improved cooperation with Allies and Partners
Mixed understanding of integrated deterrence as a concept
Key findings and recommendations
Conclusion

Introduction

This report presents the findings and recommendations of the Atlantic Council project Conceptualizing Integrated Deterrence to Address Russian Chemical, Biological, Radiological, and Nuclear (CBRN) Escalation. The objective of this project was to develop an approach for incorporating European allies and partners into the US model of integrated deterrence against Russian CBRN use.

Background

Russia’s foreign policy has grown increasingly destabilizing to US interests as its economic decline, adverse demographic trends, and conventional capability inferiority vis-à-vis NATO have led to an aggressive pursuit of military modernization. Of particular concern is Russia’s routine flouting of arms control, disarmament, and nonproliferation norms. For instance, Russia violated its arms control commitments by developing and using a novel fourth-generation nerve agent, Novichok, in the United Kingdom in 2018.1 Russia’s exit from the New START Treaty in 2023 constituted a further move away from accepted arms control and verification standards.2 These actions, combined with Russia’s persistent false claims of US and Ukrainian development of biological weapons in Ukraine, contribute to an environment of volatility and instability, especially about the prospect of the Kremlin choosing to use CBRN weapons for punishment or compellence to seize military advantage, or to deter allied support for Ukraine.3

The hollowness of Russia’s conventional capability, combined with its military doctrine and dangerous rhetoric, reinforces the important role that CBRN capabilities will likely play in Russian defense strategy in the coming years. However, there is currently a gap in US and European understanding of the manifestation of this risk in the nearto mid-term. Moreover, it remains uncertain how allies and partners fit into the United States’ approach to mitigating CBRN risks through integrated deterrence, a cornerstone of the 2022 National Defense Strategy (NDS). As defined in the NDS, integrated deterrence entails “working seamlessly across warfighting domains, theaters, the spectrum of conflict, all instruments of US national power, and our network of Alliances and partnerships.4 This report explores how the United States can include allies and partners in integrated deterrence strategies to counter potential CBRN escalation by Russia.

Research question

The research question guiding this project was, “What is the risk of Russian CBRN weapons use in Europe in the next five to ten years, and how can the United States counteract or mitigate such risk?” The project team considered several aspects of this research question to establish how best to involve allies and partners in ongoing and new US efforts to mitigate Russian CBRN threats, including the following:

  • How the activities of NATO allies could fit into a US campaign plan to deter Russian escalation in Ukraine and beyond
  • How the United States could maintain resolve among its allies while coordinating allied activities to support integrated deterrence objectives
  • What specific steps the United States could take now to ensure European allies are part of a broader integrated deterrence strategy five to ten years from now
A security guard looks through a door of a hospital in Omsk, Russia. REUTERS/Alexey Malgavko

Key findings summary

The Atlantic Council sought to identify and develop approaches for incorporating European allies and partners into the US model of integrated deterrence against Russian CBRN threats. We derived five key findings, summarized below, which incorporate the opportunities and critical challenges we discovered from the scenario- building workshop, insights from expert interviews and roundtable discussions, and background research. The Key Findings and Recommendations section explains each of these findings in detail, outlining actionable recommendations to address these challenges.

  • Allies and partners already significantly contribute to US approaches to counter Russian CBRN threats in Europe. Future cooperation—bilaterally, multilaterally, and through NATO—should focus on areas of greatest need as mutually identified by the United States and its European allies and partners.
  • As a concept, integrated deterrence is a useful frame for examining cooperation with European nations to counter Russia’s CBRN threats, but the US Government should use this framing to identify new opportunities, rather than detract from or encapsulate ongoing cooperation.
  • Civil-military cooperation across a variety of sectors is essential to respond to CBRN threats, especially among public health agencies and law enforcement. To fully realize integrated deterrence in the next five to ten years, greater coordination among civilian and military communities—within the United States and among its European allies and partners—is essential to enhancing resilience.
  • Technological advances present significant opportunities and challenges for US cooperation with allies and partners to counter CBRN threats, especially as these threats become more complex. The United States and its European allies should remain vigilant about emerging threats, while leveraging new technological developments in detection and attribution systems and emergency response mechanisms to build comprehensive defenses against CBRN threats.
  • As Russia deploys hybrid warfare tactics to support and conceal potential CBRN escalation, the United States and its European allies must prepare to combat malign influence efforts, such as information influence activities, targeted assassinations, energy sabotage, and economic coercion, related to CBRN use as part of the US strategy of integrated deterrence.

Methodology

Two primary analytic approaches guided the research for this project: a scenario-building workshop and a series of interviews with subject matter experts and officials. The team also conducted secondary source research, including official publications from the US Department of Defense (DoD) and NATO, as part of our background research to corroborate information and insights from workshop and interview participants. Background research on scenario planning was also critical to developing the workshop methodology. Finally, the project team used Atlantic Council roundtable discussions with senior US and European officials to gauge perspectives on CBRN escalation risks and methods through the lens of integrated deterrence.

Scenario-building workshop

The Atlantic Council convened a group of experts and officials from the United States and Europe in December 2022 to participate in a scenario planning exercise to conceptualize integrated deterrence with respect to Russia’s potential CBRN weapons use in Europe. Using strategic foresight scenario planning methodology, which involves a structured exploration of multiple plausible futures to inform present decision-making,5 the workshop identified four possible futures for Russian CBRN use in Europe over ten years for which the transatlantic community will have to prepare. A more detailed explanation of strategic foresight planning is included in Appendix C.

The workshop encouraged participants to think creatively about possible future scenarios with respect to Russia’s development and use of CBRN weapons. Using analytic tools prescribed by strategic foresight methodology,6 participants explored options for future Russian decision-making around CBRN use and the consequent impact on the security landscape in Europe. Participants were divided into groups and asked to define the likelihood of Russia’s use of CBRN weapons in the year 2032 using the parameters outlined in each of the four scenarios based on the interaction of two pre-selected factors: Russia’s regime stability and Russia’s conventional warfare capabilities. After briefing the plenary session on the results from the four scenario groups, participants were invited to identify opportunities for US-European cooperation through integrated deterrence strategies.

Interviews with officials and experts

To build on insights obtained from the workshop, the project team conducted 13 interviews with US, NATO, and European government officials, military officers, and civilian security experts from eight NATO member states. The list of organizations represented by the interviewees is included in Appendix A. These interviews provided firsthand perspectives to better understand possible scenarios for Russia’s use of CBRN weapons and options for enhancing cooperation with allies and partners against CBRN threats.

U.S. Marine Corps explosive ordnance disposal technicians walk to a chemical weapons site during a joint EOD exercise at Marine Corps Training Area Bellows, Hawaii. (U.S. Marine Corps photo by Cpl. Patrick King)

Insights from the scenario-building workshop

To conceptualize integrated deterrence with respect to Russia’s potential CBRN weapons use in Europe, the Atlantic Council’s virtual scenario-building workshop presented four scenarios in a ten year timeframe with respect to CBRN escalation. Comprehensive accounts of each of the four scenarios that participants designed, based on the parameters provided, are outlined for both Part I and Part II in Appendix B. The workshop illuminated several key themes, concepts, and takeaways, which we describe in detail below.

PART I: Understanding the effect of Russia’s conventional warfare capabilities and regime stability on CBRN escalation

For the first part of the workshop, participants considered the strengths and/or weaknesses of the Russian regime and Russia’s conventional capabilities assigned to their scenario. Participants also considered how those characteristics could affect Russian decision-making around using CBRN weapons and the consequent impact on the security landscape in Europe. In advance of the workshop, the project team predefined these characteristics as the key drivers of change based on extensive background research.7 The conditions of each scenario, as well as the key perspectives from participants and lessons learned, are included in Table 1.

Key takeaways from Part I

CBRN weapons are an attractive option for Russia to showcase its strength

Part I revealed participants’ views that Moscow perceives opportunities to use CBRN weapons as a tactic to supplement conventional methods to achieve its geopolitical objectives. While Russia maintains a vast nuclear arsenal,8 questions remain regarding the scope and scale of Russia’s biological and chemical weapons capabilities.9

As Russia becomes deadlocked or begins to lose the conventional war against Ukraine, Moscow may use CBRN weapons to achieve its objectives.

Regardless of whether Russia’s conventional capabilities are strong or weak, two key trends emerged:

  • When Russia is losing in a conventional war, the Kremlin will seek any potential opportunities to showcase its strength. While Moscow may not turn to large-scale deployment of CBRN weapons on the battlefield, it may turn to more frequent targeted strikes with CBRN weapons in the near term.
  • Even if Russia is winning a conventional war, the Kremlin will maintain its CBRN weapons capabilities to project legitimacy and its status as a great power. Russia will also rely on CBRN weapons as a demonstration of strength and as a method of deterrence.

Hybrid warfare remains a temptation for Russia to achieve its geopolitical agenda

Throughout Part I, each scenario featured a significant emphasis on Russia’s use of hybrid warfare to achieve its broader security goals.10 Russia reinforces its conventional capabilities in war with hybrid warfare tactics, such as political executions and manipulation, foreign malign influence in the information space, economic coercion, cyberattacks, and energy sabotage.11 This phenomenon extends to CBRN agents, with an emphasis on assassination attempts and information influence campaigns.

In all four scenarios, Russia leaned into hybrid warfare tactics to enhance its broader military strategy. The project team observed two key trends in this area:

  • Russia may use CBRN weapons in a limited fashion to protect its domestic authority from political opposition, potential “color revolutions,” and exiled activists. If the Russian regime is under threat from viable political opposition or active dissidents, the Kremlin may turn to targeted attacks using biological and chemical weapons in assassination attempts intended to neutralize any political threats to the Russian regime. This behavior is consistent with Russia’s previous attacks—both inside Russia and within NATO member states, which targeted Viktor Yushchenko (2004), Alexander Litvinenko (2006), Sergei and Yulia Skripal (2018), and Alexey Navalny (2020), among others.12
  • Over the last decade, Russia has turned to foreign malign influence efforts, especially within the information space, to support and amplify its geopolitical agenda. In particular, the Kremlin has injected escalatory rhetoric and inflammatory campaigns related to potential CBRN use and continues to circulate foreign malign influence efforts and propaganda to support its agenda.13 These tactics target and weaken international regimes and treaty organizations that govern arms control, disarmament, and nonproliferation efforts, undermining public trust in multilateral organizations and leaving little room for recourse and accountability. Russia’s malign influence tactics within the information space are intended to sow doubt and confusion among the public, deny responsibility for Russia’s use of CBRN weapons, and undermine the effectiveness of an international response.14

Emerging technologies present new opportunities—and new challenges

Regardless of the strength of Russia’s conventional warfare capabilities, participants agreed that the country will continue to explore technological advancements to aid its military modernization. In each scenario detailed above, Russia placed greater emphasis on dual-use material and technology, which have both civilian and military purposes, and pursued greater development of CBRN weapons.15

When Russia possesses few avenues for deploying conventional warfare capabilities, dual-use technologies and equipment present new opportunities for the Kremlin to achieve its geopolitical goals. For example, Russia may turn to increased imports and further refinement of nuclear technology and material; chemical and biological agents; missiles and unmanned aircraft systems; and associated materials and equipment. Such activities would permit, or at a minimum conceal, Russia’s continued development of CBRN weapons.

In addition, the COVID-19 pandemic demonstrated how biological agents could cause destruction and disruption around the world. Russia inherited a portion of the Soviet-era biological weapons research program,16 and while Moscow denies any continuation of the bioweapons program, allegations of its continuance remain.

Additionally, current developments in biology and chemistry, especially with respect to engineered organisms, viruses, pathogens, and other diseases, offer an avenue to create biological weapons with heightened virulence and infectivity that can threaten society.17Moscow could employ such technologies against its adversaries.

New technologies, such as artificial intelligence and machine learning, also introduce new challenges. Because CBRN capabilities and technologies have rapidly evolved, many developments are not explicitly covered in existing frameworks that govern responsible use. In each scenario, Russia may exploit these ambiguities to avoid export controls, treaty obligations, and other regulatory measures to improve these capabilities.

PART II: Conceptualizing integrated deterrence among the United States and its European Allies to address CBRN weapons use

For the second part of the workshop, participants considered how the United States could use integrated deterrence to incorporate European allies and partners into US strategy to respond to a scenario in which Russia would consider the use of CBRN weapons in Europe. The conditions of each scenario, as well as the key perspectives and lessons learned, are described in Table 2.

Key takeaways from Part II

Civil-military coordination in critical sectors presents a key opportunity for allies and partners

One important aspect of using integrated deterrence to address potential CBRN attacks from Russia is the need for greater dialogue and cooperation between civilian and military sectors. In Part II of the exercise, civilian institutions played a critical role in designing mitigative, preventative, and responsive measures to potential deployment of CBRN weapons. Organizations that coordinate disaster relief and humanitarian assistance might rely on military technologies and capabilities to respond to security threats, such as evacuation protocols from air and sea, medical support capabilities, and crisis response mechanisms. One perspective from the workshop highlighted that the United States has an ability to support and strengthen specialized training procedures for law enforcement personnel in Europe—especially in states that border Russia—to respond to hazardous environments, including those that are contaminated with CBRN agents. Greater integration between civilian and military organizations could better prepare civilian elements that might respond to a possible attack from Russia using CBRN weapons.

Public health agencies play an important role in developing, acquiring, and deploying medical countermeasures against Russia’s potential use of CBRN agents. Naturally occurring and human-made biohazards can inflict a significant amount of damage and disruption on broader society. Throughout Part II, participants placed a greater emphasis on developing an effective response to bioweapons, which demonstrated the need for the United States and its European allies and partners to prioritize coordination among public health and medical agencies as well as with the armed forces in times of crisis.18

Critical infrastructure—including energy, transportation, information technology, and communications systems—plays an important role in combatting CBRN threats, implementing critical responses, and protecting broader societal resilience.19 In particular, the energy sector plays a crucial role in managing nuclear power and materiel capabilities and in the event of a potential CBRN attack, these facilities will require additional safeguards. Military forces depend on both the civilian and commercial sectors when responding to CBRN attacks to provide key services, such as transportation, communications, and energy reliability all while ensuring that sectors can withstand external attacks and internal disruptions. Workshop participants pointed to greater coordination among public and private sector partners as an opportunity to address vulnerabilities and increase overall preparedness. Increasing cybersecurity and mitigating risk within the cyber domain could reduce potential vulnerabilities and the risk of cyberattacks while protecting from potential CBRN attacks.

Greater recognition of recurring challenges will overcome barriers to more effective coordination

Throughout Part II, Russia had the opportunity to inflict further damage by exploiting weaknesses in the absence of coordination among the United States and its European allies. By sharing expertise and maximizing resources, the United States and Europe can address these vulnerabilities and build broader resilience efforts.

In Part II, participants recommended implementing methods to promote regular and coordinated intelligence sharing, especially related to CBRN attacks. One participant emphasized that formal and regular channels for exchanging information and sharing best practices would support a comprehensive response to CBRN threats from the United States and Europe. Another key point raised during the discussion was that as CBRN threats become more complex and more difficult to detect, the United States and its European allies should consider designating common standards and equipment across jurisdictions.

Resilience in the information space is an important tool to combat Russian hybrid warfare

In each scenario, Russia turned to hybrid warfare as a political tool to complement its conventional warfare tactics, sow doubt and confusion among the broader public, distort reality and objectivity, and ultimately offer cover for possible military intervention. To combat Russian malign influence and employ integrated deterrence against Russian threats, one participant suggested that a multipronged approach in the information space might encourage greater digital resilience on social media platforms, facilitate strategic communications efforts, and enhance media literacy programs. Proactive messaging among allies to counter escalatory rhetoric—especially with respect to CBRN capabilities and potential escalation—is especially critical. If the Russian regime becomes less stable and pursues any possible avenue to achieve its geopolitical agenda, the United States and its European allies and partners should consider methods to invest in and implement proactive messaging. Several opportunities exist for the United States and its European allies and partners to counter hybrid warfare such as through investing in early detection capabilities, augmenting information-sharing systems, and countering foreign malign influence and propaganda emanating from Russia.

Technological developments offer important opportunities for CBRN attack counter-responses

In each scenario in Part II, Russia turned to technological advancements to bolster its military capabilities, and new developments with CBRN capabilities were an important component of Russia’s overall force posture.20 Participants recommended that in response, the United States and its European allies and partners utilize new technologies to enhance broader capabilities to deter, counter, and combat Russian CBRN attacks. One participant argued for greater collaboration through potential partnerships with the private sector, which is often at the forefront of research and development of emerging technologies.

Emergency personnel carry a woman out on a stretcher during a re-enactment of a hazardous situation in a subway train in the lower level of the Bay Subway station that is no longer in use in Toronto in 2011. The Canadian Standards Association (CSA) and the Canadian government set up the event to reveal its new standards for emergency services personnel and equipment to respond to chemical, biological, radiological, or nuclear (CBRN) incidents. REUTERS/Mark Blinch

Insights from interviews

Our interviews with subject matter experts and government officials illuminated four major themes related to integrated deterrence of CBRN threats from Russia. The following section describes these themes in greater detail.

Allied alignment over the severity of Russian CBRN threats

The officials interviewed for this report took seriously the threat of Russia using CBRN weapons in the near-to-mid future. Specifically, respondents referred to the possibility of chemical weapons use, including through assassinations, further use of riot control agents in urban combat, or the deployment of tactical nuclear weapons.

Multiple interviewees also highlighted Russia’s use of foreign malign influence as another aspect of its overall CBRN threat. Russia has a long history of making false claims that the United States and Ukraine are developing biological weapons, and this has continued during its war in Ukraine.21 Some respondents feared Russia could conduct a false flag attack with chemical weapons. In such a scenario, Russia would promote false claims that Ukraine intends to use chemical weapons as a pretense for its own use of these weapons on Ukrainian soil. Russia made these claims in the lead-up to its February 2022 invasion of Ukraine, which renewed the credibility of Russian CBRN threats.22

Interviewees also commented on the conditions under which Russia could consider using a CBRN weapon. For example, escalation to CBRN use could occur if Russia were to view US- or NATO-led exercises or training events as a provocation. Such misunderstandings could have grave consequences for Ukraine or neighboring NATO countries. The depletion of Russia’s conventional forces could also make it more likely for Russia to consider using nonconventional weapons, especially since reconstituting conventional forces would take significant time. According to one US official, the risk of CBRN weapons use increases the longer the war in Ukraine continues.

However, some respondents questioned Russia’s motivations for using a CBRN weapon in Ukraine or Europe now and in the future. Russia has demonstrated its disregard for global norms against the development and use of CBRN weapons through its use of fourth-generation chemical weapons to silence opposition figures; its long-standing support of the Syrian regime, which has used chemical weapons against its citizens since 2012; and its disruptive actions in non-proliferation treaty organizations. However, the international community would swiftly condemn Russia if Russia employed CBRN weapons on a larger scale in Ukraine.23 At a technical level, it is difficult to control the spread of chemicals once they are released, which could result in Russian troops being sickened or killed as well. This contamination risk could also spread to NATO territory through air, soil, or water, possibly exacerbating the conflict beyond Ukraine.

In the event of Russian CBRN weapons use in Ukraine or in NATO territory, response options are less clear. Interviewees could not offer specific suggestions given the need to protect sensitive information, but several US and European officials identified the need for timely, accurate attribution of any CBRN weapons use to ensure perpetrators are brought to justice. Timely attribution requires forensic detection capabilities to be available in proximity to an attack, but current detection capabilities were considered insufficient. Some respondents also pointed to the role of civilian authorities in the event of a CBRN attack, as NATO or other military forces might not be called upon immediately. First responders and medical professionals might be a more expedient and appropriate choice depending on the location of an attack. Furthermore, there is also a question of when NATO or individual European allies would respond to Russian CBRN use: what is the threshold for response, and what would that response entail? One US official pointed out that Russia had already been accused of using riot control agents in combat, but that has not been enough to warrant a response from Western governments.24 The threshold question is a topic of ongoing discussion among NATO and US officials.

Existing cooperation among Allies supports US goals

In Europe, proficiency in CBRN defense has typically resided in a small but active cadre of countries that cooperate in bilateral and multilateral formats and through NATO. The United States is active in NATO CBRN planning, but it also maintains its own relationships with European allies separate from Alliance constructs. Russia’s threats of incorporating chemical or nuclear weapons into its tactics in Ukraine have garnered attention from countries such as Germany, Czechia, Poland, the United Kingdom, and others that have been historically more active in CBRN defense.

Additionally, NATO’s CBRN Defense Policy was released in 2022— the first update in thirteen years.25 The new policy provided allied countries with a framework to use to update or create their own national policies and bring them in line with NATO priorities. Several allied military representatives we interviewed referenced this policy, which promotes a coordinated approach based on Alliance- agreed priorities when describing how their national governments think about preparedness against CBRN threats. Given the leading role the United States played in shaping NATO’s CBRN Defense Policy, US NATO CBRN personnel are active in operationalizing key tenets of allied and partner involvement in integrated deterrence in Europe.

An important step in enhancing US contributions to European CBRN defense was US involvement in the NATO Framework Nations Concept (FNC) CBRN Defense Cluster. The FNC construct began at NATO in 2014 as a way for European NATO member states to organize capabilities around specialized interest areas to promote interoperability and burden sharing.26 Germany led the development of the CBRN defense cluster, which included contributions from several member states that participated in exercises and training events. According to a US European Command (USEUCOM) official familiar with the deliberations, incorporation of the United States into the CBRN defense cluster took two years of negotiations, as the FNC was originally intended as a way for European NATO allies to bolster their capabilities without the direct involvement of the United States. However, US integration into the CBRN defense cluster opens greater possibilities for US Government-led training and exercising designed to improve the readiness of NATO CBRN defense elements.

Additionally, the United States is expanding the network of countries it has traditionally worked with to promote CBRN defense-related initiatives in Europe. Part of the expansion strategy includes identifying allies with generally robust capabilities but specific weaknesses, such as the United Kingdom and Norway, which, if improved, could enable these countries to better train other European allies and partners. Two US officials we interviewed spoke to the power of broadening the network of countries with which the United States works closely on CBRN issues to empower regional leaders so that the United States does not have to play a direct role in all facets of cooperation. This type of cooperation deepens strategic integration with highly capable allies, which is an important facet of achieving integrated deterrence. As a regional leader in CBRN defense, Germany provides training to allies such as the Netherlands and France, and non-NATO countries like Austria, and hosts exercises that include US elements. In this capacity, Germany’s efforts further US goals for integrated deterrence against Russia’s CBRN threats.

Areas for improved cooperation with Allies and Partners

Interviewees identified five key areas for greater cooperation between the United States and Europe that would enhance overall preparedness against Russia’s CBRN threats. These areas are described below.

Information and intelligence sharing

Every US official we interviewed mentioned the need to improve information sharing among the United States and its NATO allies, including sensitive intelligence about Russian CBRN threats. Sharing is possible to some extent given common classification standards at NATO but is much more difficult to achieve with non-NATO partners. The challenge is understood: the United States has information about Russian CBRN threats it cannot share. How to overcome this challenge to all allies’ satisfaction is less clear, as it is not always possible to downgrade highly protected information. Information sharing has improved since the Ukraine invasion, with both the United States and United Kingdom sharing more within NATO, and the United States and individual allies have made progress on select topics. However, without an institutionalized process to improve intelligence sharing, it is difficult to prove why allies should make greater investments in their CBRN preparedness should the need arise to integrate a transatlantic response.27

Awareness of in-theater CBRN assets

CBRN threats require advanced planning to ensure preparedness and proper coordination within the US military and with allies. For example, in the event of an attack, a specialized US Army chemical company will have inadequate time to travel into theater to perform consequence management duties. US forces need to know which countries in Europe can provide such assistance and do so rapidly. One US official we interviewed believed it was imperative for allies to have the capability to collect samples, analyze them, and, if possible, attribute them without having to wait for a US or other European unit to arrive in country to strengthen their resilience.

However, if US forces are in theater during a CBRN attack, allied military commanders we spoke to were unaware what US forces would require of European allies, such as support for mobility or protection for people and equipment. Crisis planning efforts that began after Russia’s invasion of Ukraine include CBRN preparedness measures to ensure staging and mobility of assets that might arrive in Europe for a CBRN contingency, which is an important step in ensuring that both US and allied forces understand what to expect from each other in the event of a CBRN attack.

Opacity of US government can hinder closer cooperation

Several NATO allies we interviewed described challenges in understanding the depth and breadth of actors within the US Government that have some role in CBRN cooperation. For smaller countries with fewer resources for CBRN defense, it is easier to work with regional leaders, such as Germany, that are more familiar in both organization and approach than the US military. A better strategy for communicating US CBRN defense and response activities and coordinating outreach to European allies would improve understanding and potentially facilitate easier cooperation.

Expanding education about CBRN threats to a broader community

Knowledge of nuclear deterrence and CBRN weapons capabilities atrophied at the end of the Cold War, leaving a notable gap in the overall US and allied understanding of nuclear threats across the total force. US, European, and NATO officials agreed that awareness of these topics cannot reside within specialized communities in the United States, NATO, or European nations. Ukraine has helped raise the profile of CBRN within NATO, but because the United States and Europe have viewed these issues as a niche capability for so long, it is difficult to compel all allies to pay attention to CBRN threats and take necessary steps to improve their overall posture and capabilities. NATO is trying raise the profile of these issues through its CBRN Defense Policy, but greater action is needed to expand CBRN-focused discussions to broader defense policy and planning committees that emphasize wider threats to the NATO alliance. Additionally, increased training and education in US and allied militaries is required to ensure equal understanding of CBRN threats. With enough time and emphasis from senior leaders, the United States and allied militaries can incorporate these topics into joint exercises and training events.

Improving civil-military cooperation

In many European countries, first responders and civilian authorities might lead the response to a CBRN incident, not the military. Medical professionals and law enforcement personnel might have a better understanding of the effects of chemical exposure, for example. Allied military representatives we interviewed recognized the need to establish more regular cooperation with civilian authorities, including exercises and cooperative planning, to better understand the role of each side in the event of a CBRN incident. NATO officials described some cooperation between NATO and the European Union’s European External Action Service, but these discussions are mainly used to deconflict the aid that the European Union and NATO provide to Ukraine; these discussions could happen more frequently and cover a broader range of topics. Additionally, the Euro-Atlantic Disaster Response Coordination Centre coordinates support among NATO member and partner states, but only for civilian entities.28 To improve resilience, civil-military coordination is essential because a large-scale CBRN attack could result in military reliance on civilian hospital systems. While efforts are underway to improve connectivity between these two sectors, allied government officials expect progress to be slow.

Mixed understanding of integrated deterrence as a concept

US, European, and NATO officials broadly agree that knowledge of integrated deterrence is uneven across European allies. Even when non-US officials and experts recognized the term, they were unsure how it differed from existing CBRN cooperation activities either bilaterally with the United States, multilaterally with US and/or other European allies, or within NATO. The term is problematic for some nations, such as France, which has a nuclear-focused view of the term “deterrence”; even though French officials expressed understanding of what the United States is trying to achieve with the concept, their national views of deterrence prevent their support of the semantics.

A USEUCOM official we interviewed expressed difficulties communicating integrated deterrence to key allies because the concept is defined ambiguously and does not comport with how NATO views either conventional or nuclear deterrence, or related terms such as “coherence,” “conventional-nuclear integration,” or “deterrence by denial.” Furthermore, incorporating integrated deterrence into CBRN cooperation was perceived by another US official as “difficult and unnecessary” when doing so interfered with ongoing cooperation activities.

Incorporating integrated deterrence into dialogue with allies could emphasize non-military means of countering Russian CBRN threats by emphasizing the use of all elements of national power. Some allies, such as Romania, already view activities associated with integrated deterrence in terms of a “whole-of-government” approach to cooperation. Such framing could broaden the aperture beyond military-to-military dialogues to include representatives from allied ministries of health, foreign affairs, and interior, and their US counterparts, for example. Security experts we interviewed believed that to communicate integrated deterrence effectively to allies, especially for a technical area like CBRN, US officials need to tailor the messaging to NATO and specific allies depending on the request. The United States should sustain these discussions to promote meaningful action to support US integrated deterrence priorities.

A member of the CBRN unit decontaminates a boat, during the Baltic Tiger 2022 binational military exercise, which is a contribution at NATO’s eastern flank, at the harbor in Tallinn, Estonia, in 2022. REUTERS/Lisi Niesner

Key findings and recommendations

These findings and recommendations are based on our research and the insights we uncovered through the scenario-building workshop and expert interviews. Where possible, we include the organization(s) that are the most appropriate to carry out our recommendations.

Finding: Allies and partners already significantly contribute to US approaches to counter Russian CBRN threats in Europe. Future cooperation—bilaterally, multilaterally, and through NATO—should focus on areas of greatest need as mutually identified by the United States and its European allies and partners.

Recommendation: Given the strength of US cooperation with many European countries on CBRN defense, continued US support should focus on areas such as improved information sharing, civil-military coordination, and awareness of Russian CBRN threats beyond the specialist community. Senior leader buy-in is critical to driving these changes, so the Defense Threat Reduction Agency (DTRA) should organize director-level engagements with senior leaders in the Office of the Secretary of Defense (OSD) and within each branch of the services that emphasize the importance of incorporating CBRN considerations in broader planning. US officials should also hold these discussions in parallel with key NATO allies, NATO officials at headquarters, and NATO military commanders at Supreme Headquarters Allied Powers Europe (SHAPE). The US should also discuss with NATO’s Allied Command Transformation, which identifies opportunities to innovate and maintain a warfighting edge, how to incorporate CBRN considerations into defense planning and capability development with European allies and partners. Senior US and NATO headquarters- level discussions should also consider how, when, or if to respond to possible Russian CBRN weapons use.

Recommendation: The DoD should sustain its support for joint exercises, training events, and personnel exchanges with European allies and partners and at NATO, as US support contributes to enhanced interoperability and shared understanding of operational concepts. Areas that require increased engagement include intelligence sharing, risk assessments, and cooperative research projects. The DoD should promote specialized knowledge transfer programs to facilitate learning among allies and partners, while investing in joint collaborative research and development initiatives to produce advancements in CBRN protection and consequence management.

Recommendation: To improve information and intelligence sharing, the United States and its European allies should pursue greater collaboration on joint threat assessments related to CBRN weapons and capabilities stemming from Russia. The DoD should closely coordinate with relevant elements of the US intelligence community to increase collaboration with bilateral partners, especially as the Office of the Director of National Intelligence (ODNI) develops the Annual Threat Assessment of the United States.

Recommendation: Joint defense planning and preparedness efforts with respect to CBRN threats offer another opportunity for the United States to build on preexisting cooperation with its European allies. DTRA and the Defense Security Cooperation Agency should regularly coordinate to ensure mutual awareness of CBRN defense capabilities provided to allies and partners to identify possible redundancies and areas for additional support.

Finding: As a concept, integrated deterrence is a useful frame for examining cooperation with European nations to counter Russia’s CBRN threats, but the United States should use this framing to identify new opportunities, rather than detract from or encapsulate ongoing cooperation.

Recommendation: Given the mixed understanding among NATO allies of integrated deterrence as it applies to CBRN-related cooperation, OSD Policy should provide clear guidance to USEUCOM, DTRA, and other DoD elements on how to build cooperation strategies in line with integrated deterrence objectives. This guidance should include other parts of the US Government where applicable, including the Department of State and the Centers for Disease Control and Prevention (CDC). Outside the United States, the guidance should include specific requests for European allies and partners that reflect mutual priorities in the region. Enhanced cooperation with allies that have strong CBRN capabilities should also remain a priority for USEUCOM and NATO activities to help establish strong regional leaders.

Recommendation: The United States and its European allies and partners can better integrate the military and private sector to maximize cooperation with industry and expand integrated deterrence. The DoD should enhance partnerships with the private sector, especially in key areas of critical infrastructure that would allow the United States and Europe to counter possible CBRN threats by recognizing and potentially mitigating vulnerabilities while promoting resilience.

Finding: Civil-military cooperation across a variety of sectors is essential to respond to CBRN threats, especially among public health agencies and law enforcement. To fully realize integrated deterrence in the next five to ten years, greater coordination among civilian and military communities—within the United States and among its European allies and partners—is essential to enhancing resilience.

Recommendation: A stronger partnership between the CDC and the European Centre for Disease Prevention and Control could strengthen US and European public health surveillance efforts. The US Government should invest in specialized training programs, capacity building, and information sharing alongside leading research institutions, such as the National Institutes of Health in the United States and the European Union’s Framework Programme for Research and Innovation, which could help build integrated resilience strategies against biohazards and other threats.

Recommendation: Given the important role of law enforcement agencies related to CBRN threats, information sharing among the armed forces and law enforcement personnel is crucial. US and European military personnel can more closely collaborate with the appropriate law enforcement agencies to improve mutual awareness of protocols and enhance joint investigative efforts. DTRA can work through appropriate DoD channels to understand US government interagency activities to facilitate this integration. In addition, DTRA can identify opportunities for joint training exercises and tabletop simulations focused on CBRN threat scenarios, emphasizing interoperability and integration of capabilities from both civilian and military sectors.

Finding: Technological advances present significant opportunities and challenges for US cooperation with allies and partners to counter CBRN threats, especially as these threats become more complex. The United States and its European allies should remain vigilant about emerging threats while leveraging new technological developments in detection and attribution systems and emergency response mechanisms to build comprehensive defenses against CBRN threats.

Recommendation: The United States and its European allies and partners should leverage public-private partnerships to invest in new technologies that enhance capabilities to identify and counter Russian CBRN attacks. Supporting research and prioritizing ongoing support for these efforts, including joint research projects and cooperative initiatives to leverage resources, is key.

Recommendation: Through greater understanding of new technologies, the United States and Europe can employ new capabilities to mitigate, detect, and prevent CBRN attacks. The US and its European allies and partners can augment CBRN activation systems, which play a vital role in early detection and CBRN incident responses, with new technologies, such as more efficient sensors and early warning alert systems. In addition, reconnaissance, surveillance, and decontamination efforts can rely on new advancements with autonomous systems. In the long term, advances in biotechnology and medical capabilities could result in more effective countermeasures against biological agents. Additionally, artificial intelligence can analyze huge troves of data to identify patterns, trends, and potential threats related to CBRN attacks and can employ predictive capabilities for response planning and early warning. DTRA should work with the US Joint Program Executive Office for Chemical, Biological, Radiological and Nuclear Defense to understand the latest developments in these technologies to determine where additional investment is required.

Finding: As Russia deploys hybrid warfare tactics to support and conceal potential CBRN escalation, the United States and its European allies must prepare to combat malign influence efforts, such as information influence activities, targeted assassinations, energy sabotage, and economic coercion, related to CBRN use as part of the US strategy of integrated deterrence.

Recommendation: The United States and its European allies should build on pre-existing collaboration, foster knowledge sharing, and invest in fact-checking and debunking strategies to combat Russia’s information influence activities related to CBRN weapons. DTRA’s Information Resiliency Office, the Department of State’s Global Engagement Center, ODNI’s Foreign Malign Influence Center, and the US Cybersecurity and Infrastructure Security Agency, among other institutions, can enhance synchronicity and interagency coordination to promote accurate and reliable information related to CBRN issues. US officials must also sustain dialogue with European allies and partners on foreign malign influence efforts related to CBRN threats. Further emphasis on robust and sustained efforts that stress collaboration, education, transparency, resilience, and strategic communication between the United States and Europe is needed to counter Russian malign influence around CBRN weapons and potential false flag scenarios. Specific debunking and counter-response strategies should consider methods to communicate scientific and technical data to non-expert audiences.

Recommendation: To ensure success in this arena, the United States and Europe must strengthen broader societal resilience and safeguard political institutions from malign influence to mitigate the effectiveness of Russian hybrid tactics. Using collaborative and cross-border efforts in strategic communications can counter malign influence efforts that are part of Russia’s hybrid warfare.

Conclusion

Russia will continue to pose a variety of CBRN risks that will necessitate a robust, coordinated response from the United States and its European allies and partners. The United States can use integrated deterrence as a framework to counter evolving threats by incorporating allies and partners in an effort to stop continued Russian CBRN provocations or, should use of CBRN weapons occur, to prevail against them.

Integrating capabilities across domains between the United States and Europe—including in the military, political, technological, economic, information, and cyber sectors—is critical to dissuade and dispel Russia from considering the use and escalation of CBRN weapons. Integrated deterrence emphasizes and relies on the collective efforts of the United States and its European allies in deterring, detecting, mitigating, and responding to CBRN threats while maintaining resolve and ensuring interoperability among capacities.

Key elements of a successful integrated deterrence approach include intelligence sharing, civil-military integration, joint exercises and rapid response capabilities, strategic communications and counter malign influence efforts, and technological investments. While questions remain about the operationalization of integrated deterrence, the United States and its European allies can enhance collective preparedness and protect shared security interests. Only through a unified, coordinated, and integrated approach can the United States and Europe effectively address potential challenges from Russia posed by CBRN weapons.

Please note that the appendixes are not included in this publication, but they can be accessed in the attached PDF file. The appendixes contain the following information: Appendix A – Interview Participants; Appendix B – Scenario Workshop Methodology and Detailed Results; Appendix C. Biographies and Acknowledgements. These appendixes provide additional details and insights on the research methods and findings.


The research team thanks the US Defense Threat Reduction Agency’s Strategic Trends Research Initiative (STRI) for sponsoring this work and for the guidance and support provided throughout the course of the project. Special thanks go to the wide range of experts and stakeholders, inside and outside of the US and European governments, who took part in the scenario-building exercise, contributed their perspectives during the interview process, spoke during roundtable discussions, and participated in other contexts to enrich the analysis.

We would also like to acknowledge Hans Binnendijk and Dr. Matthew Kroenig who offered strategic direction and key perspectives throughout the project. Within the Atlantic Council’s Transatlantic Security Initiative team, we recognize our colleagues Leah Scheunemann, Anca Ioana Agachi, Zelma Sergejeva, Viltautė Zarembaitė, and Alvina Ahmed for their project management, peer review, and research support. We would also like to thank the Atlantic Council’s Gretchen Ehle, Nicholas O’Connell, Ursula Murdoch, and Caroline Simpson, whose support for this project was invaluable.

This report is intended to live up to General Brent Scowcroft’s standard for rigorous, relevant, and nonpartisan analysis on national security issues. The Atlantic Council’s Scowcroft Center for Strategy and Security works to continue his nonpartisan commitment to the cause of security, support for US leadership in cooperation with allies and partners, and dedication to the mentorship of the next generation of leaders.

The views expressed herein are those of the author(s) and do not necessarily reflect the official policy or position of the Defense Threat Reduction Agency, the US Department of Defense, or the United States Government.

About the authors

Natasha Lander Finch is a nonresident senior fellow with the Transatlantic Security Initiative in the Atlantic Council’s Scowcroft Center for Strategy and Security. She previously worked as a senior policy analyst at the RAND Corporation, where she led and conducted research on a range of issues, including chemical, biological, and nuclear policy; counterterrorism; European security; and military and civilian workforce policy.

Ryan Arick is an assistant director with the Transatlantic Security Initiative (TSI) at the Atlantic Council’s Scowcroft Center for Strategy and Security. In this capacity, he supports TSI’s work to strengthen the transatlantic alliance against emerging security threats from around the world. Previously, he served as an assistant program officer with the International Forum for Democratic Studies at the National Endowment for Democracy, where he supported the center’s transnational kleptocracy portfolio.

Christopher Skaluba leads the Transatlantic Security Initiative in the Atlantic Council’s Scowcroft Center for Strategy and Security, where he and his team direct a broad portfolio of programming related to NATO and transatlantic security as well as manage a vast network of expert fellows. Before joining the Atlantic Council, Chris served as a career civil servant in the Office of the Secretary of Defense, rising from presidential management fellow to the senior executive service.

The Transatlantic Security Initiative, in the Scowcroft Center for Strategy and Security, shapes and influences the debate on the greatest security challenges facing the North Atlantic Alliance and its key partners.

1    “Russia, the Skripal Poisoning, and US Sanctions,” Congressional Research Service, August 14, 2019, https://crsreports.congress.gov/ product/pdf/IF/IF10962.
2    “Russian Noncompliance with and Invalid Suspension of the New START Treaty,” US Department of State, Office of the Spokesperson, March 15, 2023, https://www.state.gov/russian-noncompliance-with-and-invalid-suspension-of-the-new-start-treaty/.
3    “The Kremlin’s Never-Ending Attempt to Spread Disinformation about Biological Weapons,” US Department of State, Global Engagement Center, March 14, 2023, https://www.state.gov/the-kremlins-never-ending-attempt-to-spread-disinformation-about-biological- weapons/; “Many Speakers Voice Concern over Increase in Dangerous Nuclear Weapons Rhetoric amidst Ongoing War against Ukraine, as Disarmament Commission Opens Session,” United Nations, Meetings Coverage and Press Releases, April 3, 2023, https://press.un.org/en/2023/dc3847.doc.htm.
4    ”The 2022 National Defense Strategy of the United States of America, US Department of Defense, 2022, https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF.
5    For more, see Alberto Behar and Sandile Hlatshwayo, “How to Implement Strategic Foresight (and Why),” International Monetary Fund, February 2021, https://www.imf.org/en/Publications/analytical-notes/Issues/2021/12/22/Strategic-Foresight-at-the-International-Monetary- Fund-463660.
6    See “Tools for Futures Thinking and Foresight across UK Government,” UK Government Office for Science, November 2017, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/674209/futures-toolkit-edition-1.pdf; or Alun Rhydderch, “Scenario-Building: The 2×2 Matrix Technique,” Prospective and Strategic Foresight Toolbox, June 2017, https://www.researchgate.net/publication/331564544_Scenario_Building_The_2x2_Matrix_Technique.
7    The project team conducted extensive background research related to the outlined drivers of change that formed the basis of the scenario exercise. On regime stability, see Robert Person, “Putin’s Big Gamble,” Journal of Democracy, September 2022, https://www.journalofdemocracy.org/putins-big-gamble/; Tatiana Stanovaya, “Russia’s Elites Are Starting to Admit the Possibility of Defeat,” Carnegie Politika, October 3, 2022, https://carnegieendowment.org/politika/88072; Richard D. Hooker, Jr., “Climbing the Ladder: How the West Can Manage Escalation in Ukraine and Beyond,” Atlantic Council, April 21, 2022, https://www.atlanticcouncil.org/in-depthresearch- reports/report/managing-escalation-in-ukraine/; F. Joseph Dresen, “Putin’s Russia Today: Sources of Stability and Emerging Challenges,” Wilson Center, https://www.wilsoncenter.org/publication/putins-russia-today-sources-stability-and-emerging-challenges. On Russia’s conventional capabilities, see Scott Boston and Dara Massicot, “The Russian War of Warfare: A Primer,” RAND Corporation, 2017, https://www.rand.org/pubs/perspectives/PE231.html; “Russia’s Armed Forces: More Capable by Far, but for How Long?” International Institute for Strategic Studies, October 9, 2020, https://www.iiss.org/online-analysis//military-balance/2020/10/ russia-armed-forces; Michael Kofman and Rob Lee, “Not Built for Purpose: The Russian Military’s Ill-Fated Force Design,” War on the Rocks, June 2, 2022, https://warontherocks.com/2022/06/not-built-for-purpose-the-russian-militarys-ill-fated-force-design/; John E. Herbst, Anders Åslund, David J. Kramer, Alexander Vershbow, and Brian Whitmore, Global Strategy 2022: Thwarting Kremlin Aggression Today for Constructive Relations Tomorrow, Atlantic Council, February 8, 2022, https://www.atlanticcouncil.org/content-series/ atlantic-council-strategy-paper-series/thwarting-kremlin-aggression-today-for-constructive-relations-tomorrow/.
8    The Visual Journalism Team, “Putin Threats: How Many Nuclear Weapons Does Russia Have?” BBC News, October 7, 2022, https://www.bbc.com/news/world-europe-60564123.
9    See Robert Peterson, “Fear and Loathing in Moscow: The Russian Biological Weapons Program in 2022,” Bulletin of Atomic Scientists, October 5, 2022, https://thebulletin.org/2022/10/the-russian-biological-weapons-program-in-2022/.
10    For background on hybrid warfare, see Christopher Chivvis, “Understanding Russian ‘Hybrid Warfare,’” RAND Corporation, May 11, 2017, https://www.rand.org/pubs/testimonies/CT468.html; Alice R. Chen, Andrew Thvedt, Gregory F. Treverton, Kathy Lee, and Madeline McCue, “Addressing Hybrid Threats,” Hybrid Center of Excellence, May 9, 2018, https://www.hybridcoe.fi/publications/addressing- hybrid-threats/.
11    For one explanation of Russia’s hybrid warfare tactics, see Simon Tisdall, “Unseen and Underhand: Putin’s Hidden Hybrid War Is Trying to Break Europe’s Heart,” The Guardian, October 23, 2022, https://www.theguardian.com/commentisfree/2022/oct/23/unseen-andunderhand- putins-hidden-hybrid-war-is-trying-to-break-europes-heart.
12    Patrick Reevell, “Before Navalny, a Long History of Russian Poisonings,” ABC News, August 26, 2020, https://abcnews.go.com/International/navalny-long-history-russian-poisonings/story?id=72579648.
13    On biological weapons-related disinformation, see “The Kremlin’s Never-Ending Attempt to Spread Disinformation about Biological Weapons,” US Department of State. On chemical weapons related disinformation, see “The Kremlin’s Chemical Weapons Disinformation Campaigns,” US Department of State, Global Engagement Center, May 1, 2022, https://www.state.gov/wp-content/uploads/2022/05/ The-Kremlins-Chemical-Weapons-Disinformation-Campaigns_edit.pdf.
14    For more, see Sarah Jacobs Gamberini, “Social Media Weaponization: The Biohazard of Russian Disinformation Campaigns,” Joint Force Quarterly 99, November 19, 2020, https://wmdcenter.ndu.edu/Publications/Publication-View/Article/2422660/social-media- weaponization-the-biohazard-of-russian-disinformation-campaigns/; Abigail Stowe Thurston, “Russia’s Non-proliferation Disinformation Campaign,” Bulletin of the Atomic Scientists, March 22, 2022, https://thebulletin.org/2022/03/russias-non-proliferation-disinformation- campaign/.
15    For example, see Austin Wright, “Dual-Use Goods Are Fueling Russia’s War on Ukraine,” Foreign Policy, November 8, 2022, https://foreignpolicy.com/2022/11/08/dual-use-goods-are-fueling-russias-war-on-ukraine/.
16     Raymond A. Zilinskas, “The Soviet Biological Weapons Program and Its Legacy in Today’s Russia,” Weapons of Mass Destruction (WMD) Case Study, the Center for the Study of Weapons of Mass Destruction (CSWMD) at the National Defense University, July 18, 2016, https://inss.ndu.edu/Media/News/Article/848285/the-soviet-biological-weapons-program-and-its-legacy-in-todays-russia/.
17    J. Kenneth Wickiser, Kevin J. O’Donovan, Michael Washington, et. al., “Engineered Pathogens and Unnatural Biological Weapons: The Future Threat of Synthetic Biology,” Combating Terrorism Center Sentinel at West Point, August 2020, https://ctc.westpoint.edu/engineered-pathogens-and-unnatural-biological-weapons-the-future-threat-of-synthetic-biology/.
18    Lois M. Davis and Jeanne S. Ringel, “Public Health Preparedness for Chemical, Biological, Radiological, and Nuclear Weapons,” originally published in WMD Terrorism: Science and Policy Choices, RAND Corporation, 2009, https://www.rand.org/pubs/reprints/RP1415.html.
19    For more, see “Critical Infrastructure Sectors,” US Cybersecurity and Infrastructure Security Agency, n.d., https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors, accessed May 2023.
20    For more on the impact of emerging technologies related to WMD, see Future Implications of Emerging Disruptive Technologies on Weapons of Mass Destruction, Arizona State University Threatcasting Lab, September 2022, https://cyber.army.mil/Portals/3/Documents/Threatcasting/wmds/Threatcasting_WMDs.pdf.
21    “Disinformation Roulette: The Kremlin’s Year of Lies to Justify an Unjustifiable War,” US Department of State, Global Engagement Center, February 23, 2023, https://www.state.gov/disarming-disinformation/disinformation-roulette-the-kremlins-year-of-lies-to-justify- an-unjustifiable-war/.
22    Davey Alba, “Russia Has Been Laying Groundwork Online for a ‘False Flag’ Operation, Misinformation Researchers Say,” New York Times, February 19, 2022, https://www.nytimes.com/2022/02/19/business/russia-has-been-laying-groundwork-online-for-a-false-flag-operation- misinformation-researchers-say.html.
23    For more, see Washington Post Editorial Board, “How Russia Turned America’s Helping Hand to Ukraine into a Vast Lie,” Washington Post, March 29, 2023, https://www.washingtonpost.com/opinions/2023/03/29/russia-disinformation-ukraine-bio-labs/; Kenneth D. Ward, “Syria, Russia, and the Global Chemical Weapons Crisis,” Arms Control Association, September 2021, https://www.armscontrol.org/act/2021-09/features/syria-russia-global-chemical-weapons-crisis; Filippa Lentzos and Jez Littlewood, “How Russia Worked to Undermine UN Bioweapons Investigations,” Bulletin of the Atomic Scientists, December 11, 2020, https://thebulletin.org/2020/12/how-russia-worked-to-undermine-un-bioweapons-investigations/.
24    “Statement by Ms. Dr. Kateryna Bila—Representative of Ukraine to the 27th Session of the Conference of States Parties to the Chemical Weapons Convention,” Organization for the Prohibition of Chemical Weapons, 2022, https://www.opcw.org/sites/default/files/documents/2022/11/National%20Statement_Ukraine_Agenda%20item%209%28d%29-rev%20pdf.pdf.
25    NATO’s Chemical, Biological, Radiological, and Nuclear (CBRN) Defense Policy, NATO, last updated July 2022, https://www.nato.int/cps/en/natohq/official_texts_197768.htm.
26    Diego Ruiz Palmer, “The Framework Nations Concept and NATO: Game-Changer for a New Strategic Era or Missing Opportunity,” NATO Defense College, July 2016, https://www.ndc.nato.int/news/news.php?icode=965.
27    AVM Sean Corbett, CB MBE and James Danoy, “Beyond NOFORN: Solutions for Increased Intelligence Sharing among Allies,” Atlantic Council, October 31, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/beyond-noforn-solutions-for-increased- intelligence-sharing-among-allies/.
28    “Euro-Atlantic Disaster Response Coordination Centre,” NATO, September 2021, https://www.nato.int/cps/en/natohq/topics_52057.htm.

The post Continued US and allied integration is essential to deter Russian CBRN use appeared first on Atlantic Council.

]]>
Bidenomics invites a global economy full of fences, to the United States’ detriment https://www.atlanticcouncil.org/blogs/new-atlanticist/bidenomics-invites-a-global-economy-full-of-fences-to-the-united-states-detriment/ Tue, 24 Oct 2023 16:47:30 +0000 https://www.atlanticcouncil.org/?p=693401 Instead of hiding behind its own fences, the United States is better served rallying the world in fencing off Chinese economic coercion.

The post Bidenomics invites a global economy full of fences, to the United States’ detriment appeared first on Atlantic Council.

]]>
Since walking away from the Trans-Pacific Partnership in 2017, the US global economic playbook has been out of kilter. In the ensuing years, US leaders have worked to revive national manufacturing, but all too often they have only managed to manufacture new slogans. These slogans range from the Trump administration’s “Make America Great Again,” which weaponized tariffs and border controls, to the Biden administration’s “Build Back Better” and “Bidenomics,” which is perhaps the least defined, offering no clear organizing idea for US economic leadership. “Under Bidenomics, we’re going to make sure America’s future is made in America,” US President Joe Biden declared at the White House on Monday, dropping another slogan in for good measure. And who could forget “de-coupling,” “de-linking,” “de-risking,” “on-shoring,” “near-shoring,” and “friend-shoring”? If only the economic race with China were to be won by words, the United States would have it made.

A relatively recent addition to this list is “small yard, high fence,” rolled out out by National Security Advisor Jake Sullivan at a speech in April at the Brookings Institution. Sullivan began by defining the phrase in the context of targeted restrictions on critical technologies with national security concerns. That alone seems unremarkable, but in the rest of the speech he plowed into the widely discussed ills of the free market global economy, calling for greater government intervention. His analysis would have been more balanced and forceful if he had devoted equal time to the failings of well-intentioned government meddling in economies. However glibly articulated, state interventions are rarely a precision instrument—or a “small yard.” Much more often they are a blunt bulldozer, predisposed to overreach and waste. Green and progressive subsidies labeled as the Inflation Reduction Act are a case in point.

Sullivan’s “yard and fence” mantra invites a world full of fences of varying heights, protecting yards of uneven size. Ostensibly nestled within “middle class diplomacy,” Sullivan’s slogan hearkens back to protectionist mercantilist policies underlying the scramble for resources and militarization preceding the world wars of the twentieth century. After persuading Europe and Japan over decades to be like the United States in embracing free markets with reduced state involvement and protection, the United States now merrily outdoes them in both. And for the cherry, it invites them to follow suit.

The United States, instead of hiding behind its own fences, is better served rallying the world in fencing off Chinese economic coercion, distortion, and predation. Recent Group of Seven (G7) and Group of Twenty (G20) pronouncements represent a promising start, including the India-Middle East-Europe Economic Corridor. The approach requires the United States to lead in both action and words to shape the world rather than retreat behind its oceans if the world is not to its liking.

China is the leading trade partner for more than 120 nations. Focusing solely on a better bunker strategy is short-sighted and self-defeating. The United States’ interests are best served when restructuring the world in its image and to its benefit. Allowing Beijing to bind three-quarters of the world’s nations to its economy would enable Chinese circumvention and subversion of international rules and imperil the hegemony of the US dollar as the world’s reserve currency. It would afford China a stronger hand at shaping future economic rules and standards. The prosperity of American farmlands and energy fields, of Silicon Valley and Wall Street, depends on the United States leading the global economy, not retreating behind fences.

US military superiority and political heft is directly linked to its economic preeminence. US leadership is vital in building regional security alliances across the Atlantic and the Indo-Pacific, areas that are seeing a welcome increase in convergence and coordination. Paradoxically, the instrumental US leadership in building and binding security alliances around the globe is conspicuously absent in the economic sphere. This overreliance on security alliances without concomitant economic alliances overtly militarizes the United States’ China policy, when the foundational conflict between Washington and Beijing is that of asymmetrical economic competition. To prevail against China, the United States needs to forward deploy both its economic and military alliances and assets. A lesson taken to heart in military matters is merrily discarded in economic statecraft. A retreating global economic posture vis-à-vis China cedes the global trading architecture to Chinese machinations.

Three ways to think outside the fence

As the United States rallies Europe to secure Ukraine’s sovereignty, backs Israel’s right to defend itself while pursuing regional normalization, and invests in military capacities to go clear across the Pacific to safeguard Taiwan, so it should forward deploy its economic advantages to rally, bind, and force multiply its interests with those of its allies in forestalling Chinese economic malfeasance. Three lines of effort should be prioritized in such an endeavor.

First, expeditiously establish rules for the global digital economy—including artificial intelligence—that favor free-world interests and values. A lack of an agreed domestic regulatory framework hampers the United States’ assertive global leadership. It relegates rulemaking instead to others, including Europe. Sustaining US preeminence in cloud connectivity, global internet, artificial intelligence, and financial markets requires it to lead from the front. It is imperative that the United States gets domestic digital governance done and rallies the world around it rather than settle for a suboptimal outsourced product.

Second, aggressively develop capital markets in emerging nations to better deploy private capital. Capital markets with macroeconomic stability and apt financial regulatory frameworks are integral to prosperous societies. They allow for efficient allocation of national savings to optimal private sector growth opportunities. The United States’ capital markets and the strength of the dollar are emblematic of the power of free enterprise. The world’s nations, including China, aspire to invest in them. The best antidote to Chinese state planning such as its Belt and Road Initiative (BRI) is to aggressively deploy the full force of US financial markets to address the infrastructure and economic growth demands of emerging nations. Even a half-successful deployment of such a strategy would outperform and overwhelm the Chinese BRI.

Third, reposition regional trade frameworks to advance commerce and trade with the United States and its allies rather than with China. The United States has an opportune window to counter the disruption to global supply lines caused by China’s draconian security laws used to target foreign companies and executives. Going forward, global trade—in all its neologisms of friend- and near-shoring, resilient and trusted supply chains, etc.—will be buoyed by strong regional arrangements among trusted partners.

The United States should engage, lead, and bind these trusted free and open trade arrangements as force multipliers of its own economic interests and outreach. To start, the United States should speedily seek convergence between its Indo-Pacific Economic Framework for Prosperity and the Japan-led Comprehensive and Progressive Agreement for Trans-Pacific Partnership before China makes further inroads in the Indo-Pacific through its Regional Comprehensive Economic Partnership.

Additionally, the United States should lead the effort to update and expand the G7 to a G10 by including the leading Indo-Pacific free economies of India, South Korea, and Australia. Concurrently, the United States should pursue creative ways of extending the proven benefits of the United States-Mexico-Canada Agreement to its economy in similar arrangements with strategic nations across Latin America and the Caribbean. Additionally, it should further energize the US-EU Trade and Technology Council to not only enhance bilateral trade and technology cooperation but extend this bilateral cooperation in third countries, particularly in Africa. Learning from the past, it is important to enact domestic policy instruments to ensure that the benefits from these regional trade arrangements are shared widely across America.

The Global South represents over half of the world’s gross domestic product. Its reaction to Western sanctions on Russia for invading Ukraine and Israel’s US-backed actions in Gaza has ranged from ambivalence to thinly veiled sympathy for Vladimir Putin and Hamas. Without necessary and urgent economic engagement along the lines mentioned above, the Global South, left with China as its biggest economic and trading partner, may harbor greater resentment and skepticism to the American cause in a future US-China conflict. US security and prosperity—particularly of its middle classes—call for economic bridges, not fences, to the fast-growing world overseas. US interests are best served by forward deployment of both security and economic alliances.


Kaush Arha is president of the Free & Open Indo-Pacific Forum and a senior fellow at the Atlantic Council’s Global China Hub and the Krach Institute for Tech Diplomacy at Purdue.

The post Bidenomics invites a global economy full of fences, to the United States’ detriment appeared first on Atlantic Council.

]]>
Battle of Avdiivka: Putin’s new offensive continues despite heavy Russian losses https://www.atlanticcouncil.org/blogs/ukrainealert/battle-of-avdiivka-putins-new-offensive-continues-despite-heavy-russian-losses/ Tue, 24 Oct 2023 15:20:12 +0000 https://www.atlanticcouncil.org/?p=695577 Russia has returned to the offensive in Ukraine in recent weeks with a major assault on the town of Avdiivka. The Russian offensive continues despite reports of catastrophic losses, underlining Putin's determination to secure victory at any price in Ukraine, writes Olivia Yanchik.

The post Battle of Avdiivka: Putin’s new offensive continues despite heavy Russian losses appeared first on Atlantic Council.

]]>
Following months of mostly defensive warfare, Russian forces recently resumed large-scale offensive operations in eastern Ukraine. However, after more than two weeks of intense fighting around the heavily fortified Ukrainian-held town of Avdiivka, Putin’s army has achieved only limited advances while suffering very significant losses in both men and equipment. This stuttering campaign is sparking renewed questions over the offensive capabilities of the Russian military in Ukraine, but it is also underlining the Kremlin’s continued determination to secure victory at all costs.

Russia’s Avdiivka offensive is a major operation that reflects Moscow’s desire to regain the initiative as the war with Ukraine passes the 20-month mark. UK officials stated on October 17 that the attack was likely “the most significant offensive operation undertaken by Russia since at least January 2023.” Russia’s goal appears to be the encirclement of the town. This could set the stage for the wider objective of establishing control over the whole of Donetsk Oblast, one of five Ukrainian provinces Moscow claims to have “annexed.”

While the Battle of Avdiivka is still far from over, things have clearly not gone according to plan for the Kremlin during the initial stages of the campaign. Citing their Ukrainian colleagues, Britain’s Ministry of Defense reported on October 22 that Russian assaults around Avdiivka had resulted in a “90 percent increase in Russian casualties.” Meanwhile, the Kyiv Post’s Senior Defense Correspondent Stefan Korshak rated the Russian offensive as a major setback for the Kremlin. “The last 2-3 weeks of fighting at Avdiivka are a serious battlefield defeat and probably among the worst suffered by the Russians in the entire war since they tried to force crossings on the Siviersky Donets River in May 2022,” he wrote on October 22.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Amid a flurry of videos showing Russian troops and columns of tanks engaged in reckless frontal assaults, much of the international analysis around Putin’s new offensive has focused on Russia’s apparent reliance on so-called “human wave” tactics. “As was the case during Russia’s failed winter offensive last year, the Russian military appears to be using human wave tactics, where they throw masses of poorly trained soldiers right into the battlefield without proper equipment, and apparently without proper training and preparation,” commented John Kirby, the spokesperson for the US National Security Council.

Despite widespread reports and visual evidence of heavy losses, Russia has continued its assaults. The Institute of the Study of War reports that Russian commanders are transferring considerable manpower and resources from other areas to the Avdiivka front, indicating that they do not intend to abandon their offensive efforts in this direction any time soon.

Ukrainian army officials have suggested this apparent disregard for high casualty rates may reflect political priorities in Moscow, with Putin believed to be personally eager for proof that his invasion force is still capable of advancing. The strategically significant but relatively small town of Avdiivka is seen by many as a realistic objective for the depleted Russian military ahead of the coming winter season. “The capture or encirclement of Avdiivka is perhaps the most that Moscow can achieve at this stage,” Ukrainian military spokesperson Colonel Oleksandr Shtupun recently told Ukrainian television.

The human wave tactics employed by the Russian military involve soldiers conducting wave after wave of direct attacks in large numbers while seeking to overrun any defensive positions. The Russian army has a long history of such attacks, with human waves often used by the Red Army in the fight against Nazi Germany during World War II. Today’s Russian commanders have adopted similar tactics in numerous engagements, notably in the battles for Bakhmut and Vuhledar in early 2023 during Russia’s winter offensive.

While this approach has appalled many observers and led to accusations of disregard for the lives of mobilized Russian soldiers, it cannot be completely dismissed as militarily futile. Indeed, Russia reportedly suffered similarly catastrophic losses at various stages of the long and grueling Battle of Bakhmut, but eventually succeeded in taking the eastern Ukrainian city in spring 2023. Of course, given the Russian casualties and current Ukrainian efforts to encircle the city, that victory may prove pyrrhic. Nevertheless, recent engagements around Avdiivka would appear to confirm that Russia still believes it can overwhelm Ukraine’s defenses. With his entire political legacy hinging on the outcome of the war, Putin is almost certainly prepared to accept very high casualty figures if it will bring him closer to his military objectives.

At the same time, Russia’s continued reliance on human wave tactics and frontal armored assaults risks further undermining morale within the ranks of an army that has already suffered crippling losses and lacks a clear vision of what they are fighting for. Video addresses recorded by Russian troops complaining about poor leadership, substandard equipment, suicidal tactics, and high casualty rates continue to appear online with a regularity that indicates widespread demoralization.

Heavy losses in Russian troops, tanks, and equipment around Avdiivka could benefit Ukraine in the long run, tipping the balance toward Kyiv in this war of attrition and potentially creating weak points along the 600-mile front line for Ukrainian commanders to exploit. With Ukraine’s own much-hyped counteroffensive so far failing to breach Russia’s sophisticated defenses on the southern front, the destruction of Russia’s offensive potential on the Avdiivka front will at least reduce the possibility of any major Russian breakthroughs during the coming winter months. At the same time, the readiness of the Kremlin to sacrifice so many soldiers for limited objectives is a reminder that Putin remains undeterred and is fully committed to victory in Ukraine.

Olivia Yanchik is a program assistant at the Atlantic Council’s Eurasia Center.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Battle of Avdiivka: Putin’s new offensive continues despite heavy Russian losses appeared first on Atlantic Council.

]]>
Zelenskyy should say a Churchillian “no” to wartime elections in Ukraine https://www.atlanticcouncil.org/blogs/ukrainealert/zelenskyy-should-say-a-churchillian-no-to-wartime-elections-in-ukraine/ Thu, 19 Oct 2023 18:44:39 +0000 https://www.atlanticcouncil.org/?p=694388 If Winston Churchill were still with us, he would surely be advising Ukrainian President Volodymyr Zelenskyy to ignore mounting international pressure to call elections in wartime Ukraine, writes Alan Riley.

The post Zelenskyy should say a Churchillian “no” to wartime elections in Ukraine appeared first on Atlantic Council.

]]>
If Winston Churchill were still with us, he would surely be advising Ukrainian President Volodymyr Zelenskyy to ignore international pressure to call elections. Much like Ukrainians in 2023, the British in 1940 were fighting a war of national survival. Every October for five consecutive years, the wartime British government led by Winston Churchill obtained legislative consent to postpone scheduled elections and extend the life of the sitting British parliament.

Churchill’s reasons for doing so were obvious and in many ways apply equally to today’s Ukraine. In 1940, Britain sought to avoid the distraction and potentially divisive impact of elections in order to maintain national resilience and focus all its energy on the war. The Churchill government also recognized the impracticality of holding an election with millions of displaced people across and beyond the nation, and saw that it would be virtually impossible to ensure a fair test of public opinion with Britain under daily attack and engaged in a global war.

In line with Ukraine’s peacetime election cycles, the country was due to hold a parliamentary election in late 2023 and a presidential vote in spring 2024. However, the introduction of martial law following Russia’s February 2022 invasion means elections cannot currently take place. Nevertheless, in recent months some international officials and commentators have begun calling for Ukraine to stage elections in 2024, arguing that this would underline Ukraine’s democratic credentials.

According to the same logic, critics say failure to hold elections would discredit efforts to portray Ukraine as an emerging democracy defending itself against autocratic Russia, thereby weakening one of the central narratives underpinning Western support for Ukraine. Needless to say, Moscow can be expected to exploit any Ukrainian hesitancy in order to fuel skepticism toward Ukraine throughout the democratic world.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

So far, President Zelenskyy has responded cautiously to calls for wartime elections. He is clearly reluctant to dismiss the idea outright for fear of being labelled undemocratic, but has stressed that Ukraine would need considerable international support in order to organize elections in what are extremely challenging circumstances.

The logistical obstacles to holding elections in wartime Ukraine are formidable. Approximately 20% of Ukrainian territory is currently under Russian occupation. Many millions of Ukrainians are living outside the country as refugees, with millions more displaced internally. It would take considerable time and resources, to say the least, to create a credible electoral register.

The safety issues raised by a nationwide election campaign amid Russia’s ongoing invasion are similarly immense. How could soldiers fighting on the front line effectively participate in the campaign? Can politicians hold public meetings or campaign rallies without fear of being targeted by Russian air strikes? Aside from Kyiv, most Ukrainian cities have only limited air defenses. The prospect of holding any sort of public meeting in such conditions is fraught with danger.

The many safety concerns related to campaign meetings would apply equally to polling stations on election day. A single Russian attack on a polling station during voting hours could easily result in dozens of deaths. Russia’s track record for bombing civilian targets and public gatherings during the current war means there can be little doubt the Kremlin would seek to attack election-related events.

It is also reasonable to question the wisdom of exposing the country to a period of intense internal political competition amid a war of national survival. How could national unity be sustained through a three-month election campaign?

Clearly, technical innovations could be found to address some of these concerns. Perhaps Ukraine could deploy digital solutions for both campaigning and voting. Ultimately, however, the arguments against holding elections are compelling if not overwhelming. Any attempt to organize Ukrainian elections in today’s wartime conditions would be profoundly impractical and unsafe. Millions of refugees, displaced people, service personnel, and those living in Russian-occupied regions of Ukraine would all potentially be unable to vote. It would amount to a dangerous as well as dubious exercise in democracy.

While some in the West seem to think holding elections in wartime Ukraine is a good idea, the British government of 1940 would certainly not have agreed. One of the most striking aspects of the debate within the British parliament during World War II over the postponement of scheduled elections was the fact that there was almost no debate at all.

This lack of debate is underlined by the fact that Hansard (the British record of parliamentary debates) appears to record only one instance of Prime Minister Winston Churchill being asked about postponed elections in the course of the entire war. The pressing and obvious need to extend the life of the existing parliament until the defeat of Nazi Germany was clear to everyone.

Ukrainians can draw a number of lessons from past British practice during their own war of national survival. Notably, British politicians during World War II recognized that organizing elections amid a major war is likely to imperil the objective of victory. This was so self-evident to the British of the early 1940s that parliament hardly saw the need to discuss each of the five annual prolongation bills tabled by the Churchill government. It is also worth underlining that nobody attempted to criticize Britain’s position on wartime elections as “anti-democratic,” either at the time or in subsequent decades.

When a country is engaged in a war of national survival, the top priorities must be the prosecution of the war with maximum vigor and the maintenance of national unity. Any attempt to stage elections in today’s Ukraine would almost certainly distract from these two objectives. Crucially, millions of Ukrainians would be excluded from any wartime voting, while the authorities cannot possibly guarantee the safety of those who would theoretically be able to participate.

The utter impracticality of holding elections in wartime Ukraine would have been immediately apparent to Churchill and others from his era. Unfortunately, some Westerners from today’s far more comfortable generation do not appear to understand the terrible reality that Ukraine now lives with.

Dr. Alan Riley is a senior fellow at the Atlantic Council.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia and Central Asia in the East.

Follow us on social media
and support our work

The post Zelenskyy should say a Churchillian “no” to wartime elections in Ukraine appeared first on Atlantic Council.

]]>
Katz in VOA (Kurdish): Iraq between the United States and Russia https://www.atlanticcouncil.org/insight-impact/in-the-news/arbit-on-bloomberg-daybreak-australia-atlantic-councils-arbit-on-israel-hamas-conflict/ Fri, 13 Oct 2023 18:54:00 +0000 https://www.atlanticcouncil.org/?p=702748 The post Katz in VOA (Kurdish): Iraq between the United States and Russia appeared first on Atlantic Council.

]]>

The post Katz in VOA (Kurdish): Iraq between the United States and Russia appeared first on Atlantic Council.

]]>