11 June 2025

Strategic Stalemate: A Game Theoretic Analysis of India-China Relations amidst Border Tensions

Col Raja Wangdi Sherpa

Game Theory is described as a mathematical theory of decision making in a conflict situation. However, there are several restrictions on the type of conflict and their amenability to analysis. It is important to understand that Game Theory neither provides any magical formula to solve difficult planning situations, nor offers undue hope of simplifying the decision process. To consider an estimate from the Game Theory point of view requires a higher degree of analysis and logical thought than what we use in present planning doctrine.

Various conflict situations were studied for the first time in 1944 by Von Newman, a Hungarian born American mathematician and Oskar Morginstern, a German economist, and their speculations were published in their book 'Theory of Games and Economic Behaviour'. Since then, practical applications of the theory have been made in tactical situations, weapon system analysis, logistics and economics. However, more important to the military planner is the fact that the implications of the theory can be brought to bear on situations more complicated and less precise than those to which it was applied originally.

The Prisoner’s Dilemma is a key concept in game theory that describes a situation in which two parties may not cooperate, even if it is in their best interest, because they lack trust or fear of the other party’s defection. This theory can be applied to understand the complex dynamics of India-China relations, particularly in the context of China’s assertiveness and belligerence.

Applying the Prisoner’s Dilemma to India-China Relations

In the context of India-China relations, the Prisoner’s Dilemma theory suggests that while both countries may benefit from cooperation, the mutual distrust and fear of betrayal (exacerbated by China’s belligerence) push both towards strategies that maintain the possibility of conflict. To overcome this dilemma will require incremental trust building, recalibration of geopolitical strategies and clearer communication to manage competition and avert escalatory moves. However, without such steps, the cycle of defection and mutual suspicion is likely to continue.

Japan as a New Strategic Partner in the Three Seas Initiative: Opportunities and Challenges Ahead

Sayuri Romei

In April 2024, Japan joined the Three Seas Initiative (3SI) as a new strategic partner alongside the United States and the European Union. The 3SI was established in 2015 with the objective of strengthening connectivity and reducing the disparities in Central and Eastern Europe (CEE) and the Baltic states. The initiative promotes the development of infrastructure in the energy, transport, and digital sectors in the region surrounded by the Baltic Sea, 

the Black Sea, and the Adriatic Sea. The war in Ukraine has highlighted the relevance of this initiative and has underscored the frail infrastructure in the region and CEE’s economic dependence on Russia. As it becomes increasingly clear that the security and stability of the Euro-Atlantic and the Indo-Pacific regions are inseparable, Japan is compelled to serve as an active partner in the 3SI as its role is also closely connected to the quality of assistance and support to Ukraine.

As Japan embarks on this new partnership with CEE and Baltic countries, however, moving beyond the rhetoric about the importance of this initiative and taking concrete action is a challenge that all the countries involved will have to grapple with. Japan’s dialogue with CEE, and in particular with the Visegrad-4 (V4) group, i.e., Hungary, Poland, the Czech Republic, and Slovakia, officially started in the early 2000s. For the past twenty years, the relationship has mostly been smooth and without major problems. 

However, Japan’s engagement with those countries has lacked dynamism, as Japanese foreign policy has mainly been focused on the United States and China. Japan’s investments in CEE have been limited and cautious, and visits from high-ranking Japanese officials have been sporadic. 

In fact, the visits to Japan by the heads of the states of the V4 and CEE countries have always outnumbered those by their Japanese counterparts. Twenty years later, as CEE countries are realizing that the economic benefit from China is not as great as they had expected, Japan is in a good position to rekindle this relationship. In a January 2022 interview with Nikkei, Akio Miyajima, Ambassador of Japan to Poland, argued that it is crucial for Japan to strengthen relations with these countries. At the time of the interview, Russia had not yet invaded Ukraine, 

and the Ambassador lamented that Japan remained disinterested in the Ukraine issue. Since the invasion a month later, however, Japan has not only taken a clear stance in condemning Russia’s aggression, it has also taken a leadership role in investing in the reconstruction of Ukraine.

Checking in on Modernization and Reforms in the People’s Liberation Army


Nearly a decade ago, in a study guide of his collected writings for the military, Chinese leader XI Jinping asserted the crucial need for a quality military force from the “grassroots” up: “Without grassroots officers and soldiers, no matter how grand the strategy, i

t cannot be realized, and no matter how advanced the weapons and equipment, they are useless.” After nine years of corruption purges, modernization initiatives, and substantial reforms, 

Xi and China’s military leaders remain concerned. Significant portions of the People’s Liberation Army (PLA) and cross-military and local (civilian) efforts are not moving fast enough, or in the right direction. In less than three years, Xi expects his military to be capable of forcefully annexing Taiwan and to successfully deter, if not, defeat, 

the U.S. military and its allies. The progress of reforms and modernizations is, however, insufficient, according to PLA senior leadership.


The Race for Sixth-Generation Fighter Supremacy: Pilots Aren’t Going Away


In the race for the next generation of air superiority between the United States and the People’s Republic of China (PRC), 

one thing seems clear: pilots are staying in the cockpit. Despite expectations in the US and the PRC that piloted aircraft would be quickly eclipsed by unmanned aerial vehicles (UAVs), both sides recently hinted that high-end manned fighters will be the centerpiece of their next-generation battle systems for air dominance. 

These reveals—as well as CNA analysis of PRC writings on related topics—suggest that the US and PRC see manned-unmanned teaming, with UAVs supporting crewed fighters, as the way of high-end air warfare for the foreseeable future.
Competitive Convergence

Details about next-generation fighter jet programs the US and PRC remain a mystery to the public. After President Trump’s March 21 announcement that Boeing will build the US Air Force’s F-47 sixth-generation fighter jet, 

the DOD distributed several artist renderings of the fighter, the details of which were quickly picked apart in public defense analyst forums. On April 18, however, US Air Force and defense industry officials revealed that the images were deliberately distorted, intended to confuse competitors about the true capabilities of the F-47’s design.

This announcement was preceded by a similarly speculative reveal in the PRC in December 2024, where videos of two advanced, tailless tactical combat aircraft—unofficially dubbed by Western military analysts as the J-50 and JH-XX—circulated on social media. Despite speculation in the PRC and international media that these were sixth-generation prototypes, neither the PRC government nor its military have confirmed this.

While much remains uncertain about the two nations’ next-generation air weapon platforms, Washington’s and Beijing’s teasers do bolster confidence in one basic but critical shared aspect of the competitors’ next-generation air dominance programs: both advanced fighter systems appear to be centered on a manned fighter jet.


Why should America negotiate with China?


This article was developed in part through the author’s participation in a project organized by the Norwegian Institute for Defense Studies. The views in this piece are the author’s alone.

Members of the policy communities in Washington and Beijing are increasingly reaching a common conclusion on the diminishing value of U.S.-China negotiations. President Donald Trump is an important outlier from this emerging consensus. 

His views will carry the day in setting American policy. Thus, the central question facing American policymakers is not whether to engage in negotiations, but rather how to deliver better results from negotiations than previous administrations. To support such planning, 

this paper examines the purposes of direct negotiations. It then reviews the negotiating records of the three previous U.S. administrations to draw lessons from those periods for the way forward. From there, the paper focuses on three issues that could serve as the basis of future negotiations and a strategy for organizing the process. The three issues are trade and economics, military and risk reduction, 

and law enforcement cooperation. A path remains open for Trump and Xi Jinping to drive the relationship forward, but only if they take control of the moment rather than succumb to fatalism about the inevitability of estrangement or conflict.

While there are vanishingly few areas of agreement between the United States and China, there is one broadly shared sentiment between policymakers in both countries: cynicism. As the costs and consequences of the trade war become more visible, the national mood in both countries about the U.S.-China relationship is hardening. Leaders and leading thinkers seem to be becoming more fatalistic about the trajectory of relations. And there appears to be growing pessimism that problems in the relationship are fixable.

China may own the ‘narrative’ of future conflict if the US crushes the satellite imagery biz: experts

PATRICK TUCKER and AUDREY DECKER

Congress is weighing reductions to the National Reconnaissance Office's budget for acquiring commercial satellite imagery, a move that could ultimately give China an edge in the influence domain and on the battlefield.

The cut could slow growth and innovation at U.S. remote-sensing companies, at a time when China's own burgeoning satellite-imagery industry is aggressively seeking clients. Though European countries are unlikely to become reliant on Chinese imagery, the same cannot be said for governments in Africa, Asia, and Latin America. If Chinese companies can offer comparable imagery at lower cost, the profits could fuel innovation at a pace that U.S. firms struggle to match.

That could leave U.S. adversaries in control of how the world perceives developing conflicts, warned Kari Bingen, director of the Aerospace Security Project at the Center for Strategic and International Studies and former deputy defense undersecretary for intelligence.

“If Chinese companies end up leading in this area, they would be positioned to become the partner of choice, to undercut our companies in the global marketplace, and ultimately could control the narrative of what happens on Earth,” Bingen said. “On February 23, 2022, instead of Western companies publicly releasing imagery of the buildup of Russian forces along the Ukrainian border—and marrying that with intelligence on what we anticipated—imagine if those images and that narrative had come from China?”

The Trump administration is weighing a proposal to reduce funding for NRO’s Electro-Optical Commercial Layer program from $300 million a year to $200 million, SpaceNews first reported. And NRO requested no funding for its commercial radar program in 2026, despite expectations that it would ask for about $30 million, according to industry and congressional sources.

NRO usually doesn’t prioritize requests for commercial because officials know Congress will add money there through the appropriations process, according to one congressional staffer.


Guns by Drone: The Rise of Drone-Assisted Firearm Smuggling on Israel’s Southern Border

Dr Yannick Veilleux-Lepage
Source Link

Israel has witnessed a sharp uptick in a previously rare tactic: the use of commercial drones to smuggle firearms across its southern border with Egypt. This emerging trend in drone-assisted weapons smuggling is notable not only for its operational novelty, but also for what it reveals about the evolving nature of cross-border threats in modern conflict environments. 

While drones have been widely used by non-state actors for surveillance and attacks, their adaptation for logistical purposes, particularly the covert delivery of rifles, pistols, and ammunition, marks a significant tactical shift.

This Insight examines the recent emergence of drone-enabled smuggling along the Israel-Egypt border, marked by over ten confirmed interceptions involving modified commercial UAVs since October 2024. While attribution remains incomplete in several cases, 

Israeli media and IDF spokespersons have linked these incidents to Palestinian militant groups, though no independent verification has confirmed responsibility. These incidents nonetheless highlight the technical adaptations, payload profiles, 

and strategic implications of drone-assisted smuggling. The Insight argues that this development is not merely an isolated innovation but a potentially replicable tactic that could reshape logistical operations for non-state actors in other conflict zones. By analysing how this tactic has emerged in Israel, the Insight aims to draw broader lessons for counterterrorism, border enforcement, and global drone regulation efforts.

Drone-Assisted Smuggling

Drone-assisted smuggling refers to the covert use of unmanned aerial vehicles to transport illicit goods, such as firearms, explosives, narcotics, mobile phones, and cash, across borders or into restricted areas like prisons. Unlike traditional smuggling routes, drones offer low-risk, GPS-guided alternatives that bypass ground-based security infrastructure. They are typically small, inexpensive, and difficult to detect, making them especially attractive to organised criminal networks

The “Huawei Saga” in Europe Revisited: German Lessons for the Rollout of 6G


While the European Union attempted to coordinate a collective response through its 5G Toolbox in Europe’s 5G infrastructure, member states diverged significantly in balancing political, economic, and technological considerations. Germany, despite its economic ties to China and status as Europe’s largest telecom market, only reached a tentative agreement in July 2024—one that appears largely symbolic.

Dusseldorf, Germany - September 22 2024: Huawei, Chinese multinational technology company's logo and lettering on the flags next to the brand's corporate office in Dusseldorf
Alexander Fedosov/Shutterstock.com

Germany’s compromise reflects persistent institutional divisions and a reluctance to decisively reduce reliance on Chinese technology, even in the face of geopolitical and security concerns. With 6G on the horizon, Europe must learn from its fragmented 5G response. A future 6G strategy should prioritize network diversity, enhanced encryption, and reduced dependency on high-risk suppliers to preserve European sovereignty and digital resilience. It is urgent to build a more unified and binding EU framework for managing the rollout of next-generation wireless infrastructure.

Tim Rรผhlig is Senior Analyst at the European Union Institute for Security Studies (EUISS), focusing on Europe-China relations, Chinese foreign and tech policy, and Hong Kong politics. His work explores China’s role in global standardization, the US-China tech rivalry, and implications for Europe. He holds a PhD from Frankfurt University and degrees in International Relations, Political Science, and Cultural Anthropology.

Reimagining Irregular Warfare: The Case for a Modernized OSS 2.0


A recent piece in the Foreign Policy Research Institute (FPRI) penned by a retired Central Intelligence Agency (CIA) officer argues against proposals to revive the Office of Strategic Services (OSS) model for today’s strategic competition environment. In the piece, 

the author argues: “Reviving the OSS would add additional bureaucracy without any additional capability and could easily risk intelligence fratricide at a time when the United States needs more focus rather than more capability.” As the co-author of one of the critiqued proposals, 

I am compelled to note that this argument ignores two fundamental advantages of reviving an OSS 2.0 construct.

First, the assumption is invalid that any updated OSS proposal requires creating more redundant capabilities or excessive additional bureaucracy, 

rather than simply streamlining existing resources, eliminating redundant capabilities and functions, and breaking down organizational barriers between agencies with identical authorities but different cultures. Secondly, there is no acknowledgement of the very real operational fratricide that is already occurring today because of competing interests between organizations vying for missions and resources in an era of increasing government efficiency. 

The paralysis this interagency competition causes costs us opportunities that we could better realize through a unitary irregular warfare department under the Department of Defense (DoD).

The Real Opportunity: Streamlining Existing Resources

A modern OSS 2.0 would not require creating entirely new structures from scratch. Instead, it would consolidate and optimize existing resources that are currently fragmented across multiple agencies under the purview of the “Department for Special Operations and Irregular Warfare” (DSOIW), created by redesignating and hyper empowering the DoD’s existing Office of the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict. This is especially critical as recent reports indicate the CIA is planning to cut 1,200 positions over the next several years, even as the Trump administration requests a historic $1 trillion budget for the DoD.


Directed Energy Weapons and the Future of European Defence


Europe stands at the edge of a new defence frontier defined by beams of light and pulses of energy. As warfighting evolves into the age of mass precision, the weapons that will shape tomorrow’s battlefield may not make noise or leave shell casings behind. 

Directed Energy Weapons (DEWs) are no longer science fiction, since they are rapidly becoming a vital element of European air defences. 

As Europe faces intensifying threats ranging from drone swarms to missile attacks, DEWs offer rapid-response, low-cost-per-shot solutions that can intercept threats at the speed of light.

DEWs, which include high-energy lasers, high-power microwaves (HPM) and particle beam systems are emerging as transformative capabilities in 21st-century defence. They employ electromagnetic or photonic energy to disable or destroy multiple targets with remarkable precision, unlike kinetic munitions that rely on ballistic interception. Lessons from the invasion of Ukraine and the Red Sea Crisis tell us that Europe requires these capabilities now.

Chris Kremidas-Courtney is a Senior Visiting Fellow at the European Policy Centre.

The support the European Policy Centre receives for its ongoing operations, or specifically for its publications, does not constitute an endorsement of their contents, which reflect the views of the authors only. Supporters and partners cannot be held responsible for any use that may be made of the information contained therein

Quantity Has a Quality All of Its Own


Since the full-scale invasion of Ukraine, Russian intelligence operations have shifted toward a mass-scale approach, focusing on sabotage, 

intelligence collection, and influence efforts. This transformation is driven by Russia’s expanding operational demands, even as it is constrained by mass expulsions of intelligence officers and the urgency to ramp up operations. 

In response, Russian intelligence has prioritized quantity over quality, relying on multiple cheap, inefficient, and nonprofessional resources. Sheer numbers compensate for inefficiency, and anonymity provides an added layer of plausible deniability.

A key driver of this shift has been the Kremlin’s efforts to undermine Western support for Ukraine, which disrupted Russia’s plans for a quick victory. Russian intelligence—Russia’s primary strategic tool since the Soviet era—was tasked with imposing costs on the North Atlantic Treaty Organization (NATO), shaping public opinion, disrupting arms shipments,

and gathering intelligence. However, with diminished capabilities and a decline in professionalism, Russian intelligence has moved away from precision-driven, professionalized operations to a mass-scale, decentralized model that mirrors broader trends in Russian military strategy. 

This change aligns with Russian military and strategic thinking, in which material shortages are compensated by sheer numbers and a disregard for casualties. This transformation has significant implications for intelligence efficacy, resource management, and global security.
The shift from quality to quantity

Historically, Soviet intelligence operations during the era of the KGB (the Russian Committee for State Security) were marked by precision and the use of highly trained operatives. These operations focused on high-value targeted objectives such as the infiltration of foreign governments, high-profile assassinations, and covert activities.


The Devil is in the Details: Minerals, Batteries, and US Dependence on Chinese Imports

Ben Taulli and Joshua Busby

US dependence on China for critical minerals and battery supply chains represents a national security risk, leaving the country potentially vulnerable to military supply chain disruptions, coercion, cyber threats, and risks to key economic sectors. While it is well understood that China dominates key segments of the global market, the degree of US reliance on Chinese suppliers remains unclear due to data limitations. 

Current trade data fails to capture firm-level dependencies and market concentration fully, impeding policymakers’ ability to make informed decisions. This brief examines the global battery supply chain, identifies gaps in trade data, and outlines four key recommendations for improving US tracking of import reliance.
Global Battery Supply Chain and Chinese Market Dominance

China holds a commanding position in the global battery supply chain, controlling a substantial share of the entire value chain from upstream mineral extraction and refinement to downstream anode, cathode, 

and finished battery production. Much of the publicly available data on Chinese production, however, does not provide an accurate picture of US dependence on Chinese suppliers. More data is required to drive the nuanced policymaking required to grow the US battery supply chains and learn from China where applicable. 

Much of China’s production is directed towards its domestic market, and existing trade data does not account for firm-level details or the role of Chinese firms operating through foreign subsidiaries.

The US imports nearly three-quarters of its lithium-ion batteries from China. Less well known is that only about 30% of electric vehicle lithium-ion batteries are imported, the rest are already produced domestically. The US has specific dependencies on China for graphite but Chinese presence in US supply chains for other midstream commodities such as nickel and manganese is less significant.

Airborne Axis Inside the Deal That Brought Iranian Drone Production to Russia

Omar Al-Ghusbi

Iran and Russia are deepening their political and military relationship through intermediary companies that facilitate their defense collaborations and flout global sanctions regimes. This report examines the case of Iran’s role in developing Russian unmanned aerial vehicle (UAV or drone) production capability, which Russia is using to wage its war in Ukraine. Leaked records indicate that the Iranian company Sahara Thunder led an extensive collaboration with the Russian company Alabuga JSC to provide the latter with the technology and know-how to produce a variant of the S-136 UAV, which Russia has since used widely in military operations against Ukraine.

This collaboration has spanned multiple years and persisted in the face of global censure and sanctions against both countries. Key aspects of the partnership include the following:

Close Ties to the State: Both Sahara Thunder and Alabuga JSC are economic actors with long-term ties to the state. Sahara Thunder is deeply embedded in state defense networks. It is a prime example of Iran’s use of middlemen to carry out its activities while the Russian state is leveraging Alabuga JSC for defense industrial use.

UAE Intermediaries: Sahara Thunder and Alabuga JSC used a UAE-based company to carry out aspects of their partnership, which allowed the two companies to minimize evidence of direct contact in the UAE’s low-barrier business environment.

Mixed Payment Systems: Alabuga JSC paid for equipment and services through wire transfers via the UAE and gold shipments. The two payment methods offer different advantages, and the combination of the two offers agility in circumventing sanctions.

Relationship Development: The outcome of this collaboration has outlived the UAV project. Reciprocal visits by both parties served not only to expand UAV localization but also focused on other defense industrial domains, indicating a growing Russian-Iranian military partnership.

Atomic Advantage Accelerating U.S. Quantum Sensing for Next-Generation Positioning, Navigation, and Timing

Constanza M. Vidal Bustamante

One of the most consequential national security contests now unfolds on battlefields invisible to the naked eye—across the faint radiofrequency signals of the Global Positioning System (GPS) and within the quantum states of individual atoms. At stake are America’s positioning, navigation, and timing (PNT) capabilities, the foundation for precise geolocation, 

trajectory planning, and time synchronization across military, civilian, and commercial domains. For decades, the U.S.-invented GPS has served as the backbone of the world’s PNT, but the system’s inherent vulnerabilities have come into stark relief as adversaries increasingly jam and spoof its weak signals and build weapons to take down its satellites. GPS interference already undermines military operations and disrupts up to thousands of commercial flights daily; broader attacks could trigger catastrophic mission failures and widespread disruption of critical infrastructure, inflicting economic losses exceeding $1 billion a day.1

In the face of rising threats to traditional PNT, quantum sensors offer a compelling alternative. Leveraging the immutable properties of atoms, these devices offer unmatched measurement precision, long-term accuracy, 

and reliable operation in contested environments—capabilities that can back up and even outperform current GPS-based services. Quantum sensors could enable resilient U.S. PNT within a few years—from the navigation of submarines, drones, and munitions to the synchronization of telecommunications networks, power grids, and financial systems—but only if America continues to develop and deploy the technology.

While atomic clocks—the most mature quantum technology today—already power GPS, emerging quantum sensing capabilities are beginning to show their promise as local sources of high-precision, resilient PNT. Next-generation atomic clocks can sustain timing accuracy over longer durations. Quantum accelerometers and gyroscopes can measure a moving platform’s velocity and rotation with greater precision. 

Quantum gravimeters and magnetometers can reference the Earth’s unique gravitational and magnetic fields for stealthy positioning. All of these technologies offer enhanced performance without relying on vulnerable radiofrequency signals.



What Happens If the United States Leaves the WTO?

James Bacchus

Aresolution before Congress calls for US withdrawal from the World Trade Organization (WTO). Both international law and US law permit withdrawal. The case for withdrawal, however, is misguided and misinformed. 

Much of what is said and widely believed about the effects of WTO membership on the United States is simply untrue. In fact, American membership in the WTO has been for decades and remains today enormously beneficial economically to US businesses, 

workers, and consumers. Withdrawal by the United States from the WTO would result in the loss of many of these economic benefits, including those derived from decades of accumulated trade commitments made by the 165 other member countries on thousands of different US goods and services traded within the WTO legal framework; those resulting from the commercial shield of WTO rules forbidding trade discrimination against US exports; and those emanating from the availability to the United States of an impartial, 

binding, and enforceable system of WTO trade dispute settlement. Moreover, withdrawal by the United States would cede US leadership in the WTO to other leading trading countries, including the second-largest trading country in the world, China. Trade is a win-win economically for all WTO members. WTO membership maximizes the overall economic gains from engaging in trade. The United States should remain in the WTO and help lead it toward needed reforms that will make it more beneficial to all in the modern global economy of the 21st century.

A resolution under consideration by the Congress of the United States proposes that the United States withdraw as one of the 166 member countries of the World Trade Organization (WTO), the international institution based in Geneva, Switzerland, that oversees 98 percent of world commerce. Can this be done? Can the United States withdraw from the WTO? To answer, we must look at international law (specifically, at the WTO Agreement) and, domestically, at US law and the US Constitution.

Defense or Diffusion? Open Source AI in U.S.-China Competition


Artificial intelligence is advancing rapidly, and global competition over its development and use is intensifying. The United States and China are at the center of this rivalry — each seeking an edge in AI research, deployment, and standard setting with far-reaching economic and security implications.

As governments and companies race to build ever more capable models, a debate is unfolding over an important question: What role should open-source AI play in this strategic landscape?

At its core, the question is about trade-offs. Opening AI systems can accelerate innovation, support transparency, and broaden adoption across borders. But especially in the context of U.S.–China competition, it can also raise serious concerns about how adversaries might exploit American breakthroughs for military or coercive purposes.

Beijing has made clear its ambition to achieve “global AI leadership” by 2030. China’s rapid progress in adoption and its state-backed ecosystem present a strategic test of whether—and how—the United States can sustain technological leadership without undermining its own openness, alliances, and values.

In this new report, ASPI Vice President Daniel Russel and Consultant Emily Rattรฉ examine how open-source AI fits into U.S. efforts to stay ahead — while minimizing the risks of adversarial exploitation. Their analysis offers practical guidance on navigating this fast-moving frontier

Digital Occupation: Pixelated Propaganda, Censored Platforms and the Battle for Narrative in Gaza


Israeli propaganda frames the aggression against the Gaza Strip as a response to an existential threat to the state’s survival. [AFP]

Evolving through decades of political upheaval, military confrontations and shifting media narratives, the Palestinian-Israeli conflict stands as one of the most enduring and complex impasses of the modern era. It is fuelled by unsupported and superstitious Israeli historical assertions about land and control. Nevertheless, 

how individuals all over the world associate with, comprehend and perceive the conflict has been drastically modified by the rise of social media. Social media platforms including X (formerly Twitter), Facebook, Instagram and TikTok have become advanced battlegrounds, 

where stories are intensified, open conclusions are formed and, in some cases, realities and facts are distorted. Social media has become both a weapon for spreading deception and an instrument for democratising data within the setting of Palestine and Israel, making it more troublesome to find common ground. (1)

This study employs critical discourse analysis (CDA) alongside visual rhetoric analysis and networked propaganda theory to examine Israel’s digital propaganda during the Gaza conflict. Drawing on frameworks by Norman Fairclough, Emeritus Professor of Linguistics at Lancaster University, and Teun A. van Dijk, Distinguished University Professor at Pompeu Fabra University in Barcelona and a leading scholar in discourse and ideology, 

the research analyses how language, imagery and media practices reinforce power structures and shape public perception. The methodology focuses on official state communications, 

influencer-led campaigns, viral content (hashtags, films, etc.) and algorithmic suppression tactics. By thematically coding these elements, such as emotional appeals, mythmaking and dehumanization, the study reveals how Israel’s digital propaganda apparatus maintains narrative dominance. Data is sourced from government media, news reports, investigative journalism and academic literature.


Star Wars gets a step closer with new Space Force satellite jamming capabilitie

John Breeden 

A long time ago in a galaxy not so far away — specifically, Peterson Space Force Base in Colorado Springs — the U.S. Space Force took another step towards turning science fiction into tactical reality. Their newest cutting edge piece of equipment, the Counter Communications System Meadowlands, isn’t a droid or a lightsaber, but it might be the next best thing: a sleek, ground-based system that can jam enemy satellites from a remote location with remarkable precision and control. It’s not quite the Force, but it does allow for a single, lone operator to command 300% more satellite disruption missions without ever leaving Earth.

On the modern battlefield, where lines of communication are as critical as lines of fire, CCS Meadowlands represents a strategic leap forward in electronic warfare. The U.S. has often been criticized for falling behind the curve when it comes to EW capabilities, especially when it comes to space-based communications. But this new, lightweight, highly automated EW upgrade brings serious muscle to America’s satellite-jamming capabilities, making it faster and easier to silence adversaries in orbit — at least temporarily. In a world where code can neutralize a threat before the first missile is even launched, Space Force is betting big on systems like this to keep the upper hand in space without ever leaving the ground.

The complete Meadowlands system calls for the deployment of 16 truck-sized satellite dishes along with their supporting electronics to strategic positions around the United States and the world. They ride on six-wheeled trailers that can easily be towed around to wherever needed. The system was built for Space Force by L3Harris and follows up on a much larger and less portable system that became operational in 2020. The latest iteration of the system, dubbed version 10.2, is currently the only ground-based, space signal jamming and control platform in the country’s arsenal.

Col. Bryon McClain, USSF Program Executive Officer for Space Domain Awareness and Combat Power Space Systems Command recently spoke about the upgraded capabilities that CCS Meadowlands now offers at the annual Space Foundation Space Symposium in Colorado Springs. He stressed how two commands came together — Space Operations Command and Space Systems Command — to make Meadowlands possible, and how the new system will add to both the defensive and offensive capabilities of the United States during any future engagements with satellite-equipped enemies.

Ukraine’s drone attack offers fearful lessons for a Chinese invasion force


Ukraine’s massive drone strike against Russian air bases on 1 June should reverberate across all theaters of conflict. But there is one Western Pacific scenario where it could be very relevant indeed: a Chinese invasion of Taiwan.

There was a micro-panic among invasion watchers in March when a brief video appeared, and then vanished, showing an impressively large and unique Chinese device, a series of barges with telescoping vertical pylons in their hulls and built-in bridges at each end. Towed into place in line astern, the barges would extend their pylons to the sea bottom and lift themselves out of the water, connect themselves with bridges and extend a long cable-stayed ramp to the shore.

The system is designed to bypass Taiwan’s ports and allow commercial ro-ro ships to directly and rapidly discharge vehicles ashore. That’s important because an invasion of Taiwan would be so massive—300,000 troops is the baseline estimate in a comprehensive recent study by the US Naval War College—that for a navy to provide enough sealift is almost inconceivable.

But the mobile pier, ingenious as it is, acknowledges a basic fact: there is no alternative in Taiwan to an amphibious assault through the surf line, with the goal of then seizing nearby port or using the beach as a landing point for the pier. Attractive alternatives such as directly seizing a major port or using airborne force to grab centers of gravity (Hostomel was another Ukraine lesson) don’t exist.

Completed in October 2022, the War College study is the product of a conference held in 2021, before Russia began its full-scale invasion of Ukraine. The study doesn’t mention the kind of drones used in Ukraine—but they could make an enormous difference.

China’s amphibious forces, a joint army-navy responsibility, are built on a blend of the assets and technologies used by the US Marine Corps and others, technologies based on experience in World War II and Korea, where the last major amphibious landing took place.

Star Wars gets a step closer with new Space Force satellite jamming capabilities

John Breeden 

A long time ago in a galaxy not so far away — specifically, Peterson Space Force Base in Colorado Springs — the U.S. Space Force took another step towards turning science fiction into tactical reality. Their newest cutting edge piece of equipment, the Counter Communications System Meadowlands, isn’t a droid or a lightsaber, but it might be the next best thing: a sleek, ground-based system that can jam enemy satellites from a remote location with remarkable precision and control. It’s not quite the Force,

but it does allow for a single, lone operator to command 300% more satellite disruption missions without ever leaving Earth.

On the modern battlefield, where lines of communication are as critical as lines of fire, CCS Meadowlands represents a strategic leap forward in electronic warfare. The U.S. has often been criticized for falling behind the curve when it comes to EW capabilities, especially when it comes to space-based communications. But this new, lightweight, 

highly automated EW upgrade brings serious muscle to America’s satellite-jamming capabilities, making it faster and easier to silence adversaries in orbit — at least temporarily. In a world where code can neutralize a threat before the first missile is even launched, Space Force is betting big on systems like this to keep the upper hand in space without ever leaving the ground.

The complete Meadowlands system calls for the deployment of 16 truck-sized satellite dishes along with their supporting electronics to strategic positions around the United States and the world. They ride on six-wheeled trailers that can easily be towed around to wherever needed. The system was built for Space Force by L3Harris and follows up on a much larger and less portable system that became operational in 2020. The latest iteration of the system, dubbed version 10.2, is currently the only ground-based, space signal jamming and control platform in the country’s arsenal.

The Influence Evolution Harnessing AI Innovation While Preserving Human Connection in Social Media


Social media stands at a pivotal juncture where technology and humanity converge. From productivity tools to fully autonomous AI agents, we are witnessing a fundamental shift in how content is created, 

distributed, and consumed. This evolution presents dual futures: one in which AI influencers and agents dominate engagement, and another that embraces decentralized networks that enhance user agency. What is now at stake isn’t merely technological advancement but the authenticity of human connection.

The relationship between AI and influencers exists on a spectrum rather than as a binary distinction.

The unique ability of social media to foster parasocial relationships is being transformed by AI, raising fundamental questions about authenticity, trust, and the nature of digital influence.
The tension between AI agent deployment and decentralized human-centered models represents fundamentally different visions for how social media will evolve – each with distinct implications for human connection, content authenticity, and platform governance.
Effective policy must balance innovation with the safeguarding of human agency by creating frameworks that harness AI’s capabilities while ensuring transparency, user control, and the preservation of meaningful human connection.

Below you will find the online version of this text. Please download the PDF version to access all citations.

As artificial intelligence (AI) transforms how content is created and consumed, social media stands at a critical inflection point. This transformation presents both unprecedented opportunities for ­creativity and efficiency and profound risks to authenticity and meaningful engagement. This DGAP Policy Brief examines the complex relationship between AI technologies and social influence, mapping the spectrum from AI-­assisted human creators to fully autonomous AI agents. Our central argument is that effective governance must balance technological innovation with the preservation of human agency and connection that made social media valuable in the first place. By developing nuanced frameworks rather than binary approaches, we can shape a digital future that amplifies rather than diminishes our humanity.


Critical and Emerging Technologies Index


Built with public and commercial data, this Index is a quantitative model presented through an interactive dashboard. It enables policymakers, 

strategists, and researchers to assess the national power of 25 countries across key technology sectors: Artificial Intelligence, 

Biotechnology, Semiconductors, Space, and Quantum. Move the sliders in the Dashboard below to test different analytic inputs, and read the country reports for in-depth analysis on different nations' tech trajectories.

Apple’s Supply Chain: Economic and Geopolitical Implications

Chris Miller |Vishnu Venugopalan

Key Points Over the past decade, many electronics firms have talked about diversifying their supply chains. An analysis of Apple—America’s biggest consumer electronics firm—illustrates that most of their manufacturing supply chain remains in China, though there have been limited increases in Southeast Asia and India.

China’s role for Apple has grown substantially. Ten years ago, Apple relied on China primarily for final assembly, while today Apple not only assembles devices in China, it also sources many components from the country.

However, Chinese-owned firms generally only play a role in lower-value segments of the supply chain. Many of the higher-value components—even those made in China—are produced in factories owned by Japanese, Taiwanese, or US firms.
Introduction

“Designed in California, assembled in China,” reads the text etched on the back of most iPhones. For over a decade, the iPhone has exemplified China’s central role in producing the world’s electronics and solidified the country’s status as the world’s leading manufacturer. Today, electronics constitute around a quarter of China’s exports; China counted for nearly a third of the entire world’s electronics exports. Apple— the world’s most valuable manufacturer of consumer electronics—stands at the center of this manufacturing base, having played a major role in helping build China’s capabilities.1

Analysts who track Apple’s supply chain have demonstrated how Apple not only assembles many of its devices in China but also has over time sourced more components from China. Economist Yuqing Xing has calculated that iPhones manufactured in 2009 sourced nearly all their components from outside China with only the final assembly (costing $6.50 per iPhone) happening in China.2 In contrast, by 2018, many components were sourced from China, totaling $104 per iPhone. Journalist Patrick McGee has reported how Apple spent billions of dollars buying equipment to place in Chinese factories, enabling them to produce more components

A Professor Was Fired for Her Politics. Is That the Future of Academia?

Sarah Viren

As Finkelstein prepared to go home, she noticed a text from someone claiming to be the college’s provost, Laura Furge. “I had just done the online phishing training,” she told me later. “And I was like, ‘I know that if the provost texts me on an unknown number, it’s spam.’” She deleted and blocked the message. Then she checked her email. There was a message from the provost there as well.

“So, I unblocked her number and called her,” she said. Furge told Finkelstein that the Department of Education had opened an investigation into Muhlenberg for potential civil rights violations. The college had yet to receive the underlying complaint, but they knew a professor had been named, and campus administrators assumed that professor was Finkelstein.

It made sense. For months, students, alumni and strangers had been complaining about Finkelstein. They started a Change.org petition the previous fall, demanding that she be fired for “dangerous pro-Hamas rhetoric” and “blatant classroom bias against Jewish students.” As evidence, the petition, and its 8,000 signers, had offered up screenshots of Finkelstein’s posts: a photo of her, on Oct. 12, in a kaffiyeh, a kaffiyeh-patterned face mask and a tank top that read “Anti-Zionist Vibes Only,” below which she had written “Free Gaza, free Palestine, stop the ongoing genocide by the Israeli and American war machines.” In another, on Oct. 26, she wrote, “ISRAEL DOES NOT HAVE THE RIGHT TO DEFEND ITS OCCUPATION.”

Furge didn’t have many details to share with Finkelstein. “She was like, ‘I wanted you to know so you didn’t hear it from the press first,’” Finkelstein recalled. “And — this is so me — I was like, ‘Laura, I am always trying to help the college have different experiences.’” Furge, Finkelstein said, “didn’t really laugh.”

10 June 2025

India Must Disrupt Pakistan’s Strategy Of Deceptive Peace Before Retaliation – Analysis

Fair Observer, Srijan Sharma

The guns have fallen silent along the Line of Control (LoC) between Pakistani- and Indian-administered Kashmir. A fragile ceasefire is in place, but this calm is unlikely to last. Pakistan has a long history of breaking ceasefires and provoking conflict.

India’s recent military operation, Operation Sindoor, forced a temporary de-escalation and pushed Pakistan onto the defensive. Yet this tactical success should not breed complacency. The underlying tensions remain unresolved, and future flashpoints are all but inevitable. India must urgently move beyond reactive measures and prepare a calibrated, forward-looking strategy to address the next wave of threats before they emerge.
A history of deception and conflict

Pakistan’s obsession with India and extremist ideologies motivates its security apparatus to engage in misadventures. In past wars, from the Indo-Pakistani war of 1971 to the Kargil War of 1999, Pakistan refused to learn lessons and instead instilled a false peace or escalated anti-India rhetoric. For decades, Indo-Pakistani relations operated in the shadows of calculated diplomacy. After 2016, Pakistan increased anti-India rhetoric and began using fundamentalist methods and terror networks.

Pakistan cannot match India’s firepower. Despite this, Pakistan takes the risk of limited fighting to counter India’s responses. When conflict crosses a threshold, Pakistan pushes back and initiates a brief diplomatic pause. Following the 2001 Agra Summit, India and Pakistan began a normalization process, which failed. Six months later, terrorists attacked the Indian Parliament. India launched Operation Parakram, leading to a standoff and a ceasefire in November 2003. Just two months after the ceasefire, terrorists attacked Jammu Railway Station, killing four soldiers and six civilians and injuring others.

In April 2005, India and Pakistan agreed to open the frontier dividing Kashmir. The same year, they launched a bus service across Kashmir. Two months later, five Lashkar-e-Taiba terrorists attempted to attack Ram Janmabhoomi. Three months after that, Delhi experienced serial blasts. All of this occurred within five months of opening a major land route.

India: Navigating Privacy and Transparency in the Digital Age

Amit Upadhyay and Abhinav Mehrotra

India’s digital transition in recent decades has led to a blurring of boundaries between the public and private, with calls for increased privacy protection amid the need for transparency and accountability.

As digital governance continues to expand, personal data is becoming central to state and corporate functions. This has given rise to various legal and constitutional questions that revolve around preserving individual privacy without weakening public accountability.

To ensure the integrity and protection of personal data, the government is required to frame laws allowing individuals to protect their rights while allowing them access to various services such as healthcare, banking, education, and digital platforms offered by the public and private sectors.

However, in April, Indian opposition parties cried foul over the 2023 Digital Personal Data Protection Act (DPDP), seeking the repeal of a particular provision – Section 44(3) – claiming that it infringed on the Right to Information Act. The opposition’s contention was that the “surreptitious” passing of the Act in 2023 could potentially adversely impact press freedom and citizens’ right to information.

Personal data protection in India has been shaped by recent legislative developments.

The enactment of the DPDP Act was an essential step in this direction, as it established a comprehensive framework for data privacy. The law provides individuals the right to protect their personal data, with the necessity of using such data for lawful purposes such as governance, business operations, or for public interest including issuance of Aadhaar, subsidies, pensions etc.


India vs Pakistan: The battle for air superiority


As the dust settles over the India-Pakistan conflict—triggered by India’s missile strikes on nine terrorist hubs in Pakistan-occupied Kashmir (PoK) and Punjab province in response to the Islamabad-sponsored terrorist attack in Pahalgam in April—it is time for a reckoning of how the two adversaries fared. Uniquely, over four intense, 

dramatic days (May 7-10), the theatre of war was the skies on either side of the Line of Control (LoC) and the international border. Airpower was the key factor, manifested not in the dogfights of yore, but their modern equivalent, comprising precise strikes, 

electronic warfare and smart coordination between aircraft, ground radars and airborne early warning and control system (AEW&CS)/ Airborne Warning and Control System (AWACS) aircraft. Drones and missiles were used aplenty by Pakistan, and India’s multi-layered air defence (AD) system rose to the occasion like never before. According to the Indian Army, its air defence units neutralised nearly 800-900 Pakistani drones during Operation Sindoor.

If, early on May 7, the Pakistani air defence had no immediate answer to the loitering munitions/ kamikaze drones, and SCALP/ Storm Shadow air-launched cruise missiles and HAMMER bombs fired from the Rafales of the Indian Air Force (IAF) that destroyed the terrorist camps, the Pakistan Air Force’s (PAF) J-10CEs, F-16s and JF-17 fighter jets did pose a threat. Indeed, Pakistan has claimed—without definitive proof or explicit acknowledgement from India—that several Indian jets were lost. Significantly, wary of each other’s missiles, 

particularly those launched beyond visual range (BVR), both forces operated well within their respective air space. However, on May 8 and 10, after Indian missile and drone strikes took out vital Pakistani air defence radars in Lahore and Karachi—one precious PAF AWACS was reportedly lost too—its air defence systems were rendered toothless, 

largely driving the PAF from the skies. So, after Pakistan targeted Indian air bases and military installations with drones and missiles on May 9 and 10—almost all of which were intercepted and shot to pieces—it was helpless before India’s retaliatory barrage of SCALP and BrahMos supersonic missiles, fired by aircraft and from the ground on eight Pakistani air bases, including the Nur Khan base near Rawalpindi, the general headquarters of the Pakistan army. Thus chastened, Pakistan is said to have called for a ceasefire.

India-EU deal holds key to a new world trade era

Brabim Karki

India and EU are locked in trade negotiations that could reset the global trade order. Image: X Screengrab

The European Union and India have reached consensus on almost half of the topics to be covered by a trade deal they hope to seal this year, according to a report.

The India-EU trade deal isn’t just about tariffs or trade quotas—it’s a cultural cage match between India’s vibrant, improvisational spirit and Europe’s love for order. And if resolved in a win-win deal, it could rewrite the rules of global trade.

This trade pact is more than a deal on goods; it’s a daring experiment in fusing two wildly different worldviews: India’s adaptive, sometimes chaotic economic approach—rooted in jugaad, the art of making do with what’s at hand—with Europe’s rigid, regulation-heavy ethos.

This tension isn’t necessarily a flaw; it’s the deal’s potential secret sauce. By forcing both sides to confront their blind spots, this agreement could birth a new trade model that values flexibility over cookie-cutter uniformity, giving India a chance to tilt the global economic balance more toward the Global South.

Trade deals sound like dusty policy papers, but they’re the arteries of the global economy, pumping goods, ideas, and power across borders. With world trade fracturing under US tariff threats and China’s constrictive supply chain grip, India and the EU are racing to secure their economic futures.

India, with its 1.4 billion people and roaring growth, is no longer a bit player. The EU, a trade giant, needs new partners as old alliances wobble. Recent reports peg the deal’s deadline for late 2025, but the real story is how this pact could redefine who sets the terms in a world where emerging powers are flexing their muscles.

Afghanistan: A Carrot in U.S. Talks with Russia and Iran

Matthew Mai

Four years ago, the United States ended its war in Afghanistan. Since the U.S. withdrawal, Afghanistan and counterterrorism have rightly been deprioritized as foreign policy issues. However, 

amid the Trump administration’s efforts to achieve a modus vivendi with Russia and Iran, cooperation on monitoring terrorist threats from Afghanistan could be another carrot Washington offers to both countries. U.S. security and prosperity are not affected by what happens in South-Central Asia. But unchecked terrorism in Afghanistan has much graver consequences for Russia and Iran.

The tragically executed withdrawal from Afghanistan should not obscure the long-term benefits of terminating U.S. involvement: the war was unwinnable for political and military reasons; a significant drain on U.S. military resources; and a humanitarian disaster for the Afghan people. Despite claims Afghanistan would become a haven for global terrorist organizations, the United States has not faced a serious threat to the homeland from groups operating in South-Central Asia.

By contrast, terrorism is a relevant security challenge for Russia and Iran that won’t be going away any time soon. ISIS-K, a South Asian affiliate of the Islamic State, is based out of Afghanistan and Pakistan. Its ranks include Chechens, Uzbeks, 

Tajiks, Afghans, and Pakistanis, many of whom were previously members of other regionally based terrorist groups. ISIS-K’s grievances against Russia and Iran are largely motivated by the former’s wars in Afghanistan and Chechnya and the latter’s adherence to Shia Islam. Both countries also waged long military campaigns against ISIS in Syria (and in Iran’s case, Iraq).

The China Challenge in Critical Minerals: The Case for Asymmetric Resilience

Pascale Massot

China is the dominant player in global critical minerals supply chains, especially in the midstream segments. The country controls, on average, two-thirds of the production or refining of major critical minerals such as lithium, graphite, cobalt, nickel, copper, and rare earth elements and above 90 percent for the latter. In 2022, the United States was more than 50 percent import dependent on 51 mineral commodities. According to the United States Geological Survey (USGS), China was the leading supplier for 17 of these and ranked among the top three sources for 24.

The U.S. was caught “sleeping at the wheel” – and it was not alone. Western governments have found themselves staring at the China challenge from the vantage point of decades of open-market-driven minerals procurement policy. Since the last quarter of the 20th century and until very recently, the neoliberal globalization paradigm in the West left to market forces the task of fulfilling critical mineral security objectives. This led to decades of internationalization, financialization, and global supply chain reconfiguration to align with profit motive and shareholder value maximization. In parallel, labor, environmental, civil society, and indigenous rights considerations continued to improve, a positive development that has also compounded the delocalization incentives of mining and refining industries.

As geopolitical strategic competition with China heats up, the realization that this paradigm is ill adapted to the pursuit of economic security has set Western governments scrambling to put together a set of responses building on the de-risking agenda popularized by Ursula von der Leyen in 2023 (coined months prior by German Chancellor Olaf Scholz). In North America, this agenda has tended to focus on three legs: onshoring/friend-shoring, diversification, and reindustrialization.

Yet current policy discussions suffer from growing pains resulting from an incomplete paradigm shift away from a market-led approach, insufficient appreciation of the scale and nature of China’s dominance, overly ambitious and underfunded targets, underspecified end goals, and too narrow an understanding of what ultimately constitutes resource security.