The Unending Conflict: How the Character of Warfare Has Transformed in the 21st Century

The fundamental nature of conflict as a political instrument, a violent means to compel an adversary to fulfill one’s will, remains an immutable feature of international relations. Yet, over the past 50 years, the character of this conflict—the domains in which it is fought, the tools employed, and the very definitions of victory and defeat—has undergone a radical transformation. The global strategic landscape has shifted from a state of episodic, declared wars, punctuated by periods of discernible peace, to a condition of persistent, undeclared, multi-domain competition. The clear delineation between war and peace has not merely blurred; it has been deliberately eroded and is now actively exploited as a domain of strategic ambiguity.1

This report analyzes this fundamental evolution in the character of conflict. It begins by establishing a strategic baseline circa 1975, a world defined by the bipolar certainty of the Cold War. In that era, the existential threat of a massive conventional and nuclear exchange between two superpowers paradoxically forced competition into the shadows, creating and refining the playbook for today’s hybrid conflicts. The analysis then traces the profound technological and doctrinal shifts of the post-Cold War era, marked by the “Revolution in Military Affairs” (RMA), which cemented U.S. conventional military dominance but also accelerated the turn toward asymmetric strategies by its rivals.

Finally, the report examines the current state of international competition, arguing that the major powers are already engaged in a form of “undocumented conflict.” This conflict is waged continuously across new and expanded domains—economic, cyber, and informational—and is increasingly shaped by emerging technologies, most notably artificial intelligence (AI). The ultimate battlefield has expanded from physical territory to encompass critical infrastructure, financial systems, and the cognitive domain of public perception itself. The central challenge for national security in the 21st century is no longer simply preparing for a future war, but navigating the unending conflict that is already here.

Section I: The Cold War Baseline – A World of Bipolar Certainty (c. 1975)

Fifty years ago, the strategic environment was defined by a stark, bipolar clarity. The world was divided into two ideological blocs, led by the United States and the Soviet Union, locked in a competition underwritten by the threat of global thermonuclear war.5 This overarching threat of Mutually Assured Destruction created a paradoxical stability at the strategic level. While it made direct, large-scale conventional war between the superpowers unthinkable, it did not eliminate conflict. Instead, it channeled geopolitical competition into deniable, indirect, and asymmetric arenas, creating an incubator for the hybrid methods that define the modern era.

The Conventional Battlefield – The Fulda Gap and the North German Plain

The central front of the Cold War was Europe, where two of the most powerful military alliances in history stood poised for a cataclysmic conventional battle. Military doctrine and force posture on both sides were overwhelmingly focused on this potential high-intensity conflict.

NATO’s strategy was formally codified in 1967 as “Flexible Response.” This doctrine moved away from the previous policy of “Massive Retaliation” and envisioned a tiered response to Warsaw Pact aggression. An attack would be met first with a direct conventional defense, followed by the deliberate and controlled escalation to tactical, and finally strategic, nuclear weapons if necessary.6 The goal was to possess a credible deterrent at every level of the escalatory ladder. NATO’s planning called for its forces to be capable of sustaining a conventional defense in Central Europe for approximately 90 days against a full-scale invasion, allowing time for political negotiation or the decision to escalate.6 However, a sense of unreality pervaded these preparations; while doctrine called for a seamless transition from conventional to nuclear operations, all practical attempts to devise tactics for actually fighting and winning on a nuclear battlefield had proven futile.8

The Warsaw Pact, guided by Soviet military thought, held a fundamentally offensive-oriented doctrine. Soviet theorists believed that the defensive was an inherently weaker form of warfare and that decisive victory could only be achieved through the offense.9 Their plans were officially framed as a massive “counterattack” that would follow the repulse of an initial NATO assault. This offensive would depend on the overwhelming numerical superiority of Soviet-style forces, particularly their vast tank armies, to break through NATO lines along axes like the Fulda Gap and the North German Plain and rapidly advance deep into Western Europe.9 In 1975, the Warsaw Pact enjoyed a considerable numerical advantage in Central Europe, particularly in tanks and artillery, and held the geostrategic advantage of “interior lines,” which allowed for the rapid transfer of forces between fronts.10

This doctrinal standoff fueled an intense technological arms race in conventional weaponry. The mid-1970s saw the introduction of a new generation of military hardware. Tanks were upgraded with stabilized turrets and electronic fire controls, while armored personnel carriers evolved into heavier infantry fighting vehicles from which troops could fight.8 The development of potent anti-tank guided missiles (ATGMs) forced armored divisions to adopt closer cooperation between tanks and infantry.8 Armies on both sides became increasingly motorized and mechanized. This period also saw the first significant use of remotely piloted vehicles (RPVs), or drones, for surveillance and target acquisition, and the maturation of the attack helicopter as a dedicated “tank-busting” platform, a lesson learned from its massive use in Vietnam.8 This unprecedented faith in technology led to a battlefield where the number and quality of electronic systems became a primary index of an army’s modernity.8 For the U.S. Army, this era was one of doctrinal ferment, with its focus shifting cyclically between conventional warfare in Europe, the specter of nuclear conflict, and the immediate lessons of counterinsurgency in Vietnam, resulting in a tactical doctrine more complex than at any other point in its history.12

The Shadow War – Proxy Conflicts and Clandestine Operations

While the armies in Europe planned for a war that never came, the actual superpower conflict was being fought—brutally and continuously—in the shadows and across the developing world. The high risk of nuclear escalation made direct confrontation too dangerous, turning proxy wars and clandestine operations into the primary instruments of geopolitical competition.14

Proxy wars were the main event of the Cold War, accounting for an estimated 20 million deaths, almost all of which occurred in the “Third World”.14 These conflicts were ostensibly local or regional disputes, but they became battlegrounds for the larger ideological struggle between capitalism and communism.16 The superpowers avoided direct military clashes but fueled the fighting by providing massive amounts of funding, weaponry, training, and political backing to their respective surrogate forces.14 The Vietnam War, which saw the United States supporting South Vietnam against the Soviet- and Chinese-backed North, was the most devastating example.5 Other major proxy conflicts of the era included the Angolan Civil War, where the Soviet Union and Cuba backed the MPLA against U.S.-supported factions 18, and the Ogaden War, where the superpowers switched allegiances, with the Soviets ultimately backing Ethiopia against U.S.-supported Somalia.21 These interventions allowed the superpowers to test strategies and military hardware while avoiding a direct “hot war,” but they left a legacy of devastation and long-term instability in the regions where they were fought.16

Parallel to these overt-by-proxy conflicts was a relentless, clandestine war fought by the intelligence agencies of both blocs. The CIA and the KGB engaged in a global struggle for influence through espionage, subversion, and covert action. The CIA’s activities included political subversion, such as providing financial support to officers plotting against Chile’s Salvador Allende before the 1973 coup, and paramilitary operations, such as arming and training mujahideen guerrillas in Afghanistan in the following decade.23 The agency also engaged in numerous, and often bizarre, assassination plots against figures like Fidel Castro.23 Espionage was rampant, with both sides dedicating immense resources to stealing military-industrial secrets and recruiting high-level agents within the other’s government and intelligence services.23 The KGB was notoriously effective in this domain, having infiltrated Western intelligence agencies to the point where the CIA was often “utterly ignorant of Soviet espionage operations” against it.25

The KGB, for its part, conducted what it termed “executive actions” or “wet work” (liquidations) through its secretive 13th Department.26 These operations targeted defectors, dissidents, and other “ideological opponents” abroad with the aim of silencing anti-Soviet voices and sowing fear within émigré communities.26 To maintain plausible deniability, the KGB often employed exotic methods, such as the ricin-filled pellet fired from a modified umbrella used to kill Bulgarian dissident Georgi Markov in London in 1978, and frequently relied on the intelligence services of allied Eastern Bloc nations to carry out the “dirty work”.26 In Africa, Soviet clandestine operations were particularly large-scale, as the KGB and GRU (military intelligence) worked to counter U.S. influence, supply arms to anti-government groups, and exploit the relatively weak capabilities of local security services to establish intelligence networks.27

This history reveals a significant divergence between the war that was being planned for and the war that was actually being waged. While the formal military doctrines of both NATO and the Warsaw Pact were fixated on a decisive, large-scale conventional battle in Europe, the true character of superpower conflict was predominantly irregular, clandestine, and fought through third parties. This created a deep reservoir of institutional knowledge and operational expertise in unconventional warfare, political subversion, and deniable operations within the intelligence and special operations communities. This expertise, developed in the shadows of the Cold War, would prove highly relevant in the multipolar, ambiguous security environment that followed.

Section II: The Technological Rupture – The Revolution in Military Affairs (RMA)

Beginning in the 1970s and accelerating dramatically after the end of the Cold War, a suite of new technologies catalyzed a fundamental shift in the conduct of conventional warfare. This “Revolution in Military Affairs” (RMA) was characterized by the integration of advanced surveillance, precision-guided weaponry, and networked command and control, creating an era of unparalleled U.S. military dominance.31 However, this very dominance had a profound and unintended consequence: it rendered symmetrical, conventional warfare an untenable option for potential adversaries, thereby accelerating their pivot toward the asymmetric and hybrid methods that now define the contemporary conflict landscape.

The Dawn of Precision and Stealth

Two technologies in particular formed the core of the RMA: precision-guided munitions and stealth.

Precision-Guided Munitions (PGMs), or “smart bombs,” fundamentally altered the calculus of air power. The ability to guide a weapon to its target with a high degree of accuracy represented a quantum leap in lethality and efficiency.33 During the Vietnam War, PGMs proved to be up to 100 times more effective than their unguided “dumb bomb” counterparts.35 This was starkly illustrated by the destruction of the Thanh Hoa Bridge in North Vietnam in 1972. The bridge, a critical supply line, had withstood hundreds of sorties and the loss of numerous aircraft over several years of conventional bombing, but was finally dropped by a small number of aircraft using laser-guided bombs.33 The 1991 Persian Gulf War served as the global debut for this capability on a massive scale. Coalition forces demonstrated that PGMs could destroy Iraqi armored vehicles with pinpoint accuracy in a process pilots dubbed “tank plinking”.33 Overall, while guided munitions accounted for only 9% of the total ordnance used in the war, they were responsible for 75% of all successful hits, proving 35 times more likely to destroy their target per weapon dropped than unguided bombs.33 This shifted the logic of bombing from achieving effects through mass to achieving them through precision.34

Stealth Technology provided the means to deliver these precision weapons by rendering aircraft nearly invisible to enemy radar. Platforms like the F-117 Nighthawk and the B-2 Spirit bomber were designed with faceted shapes and coated in radar-absorbent materials to reduce their radar cross-section (RCS) by several orders of magnitude.37 This innovation effectively negated decades of investment by adversaries in sophisticated integrated air defense systems.39 Like PGMs, stealth technology had its coming-out party during the Gulf War. F-117s flew with impunity over Baghdad, one of the most heavily defended cities in the world at the time, and decimated critical Iraqi command and control nodes, air defense sites, and other high-value targets. No stealth aircraft were lost in the conflict.39

The true power of the RMA, however, lay not in these individual technologies but in their integration into a networked “System of Systems”.40 This concept linked intelligence, surveillance, and reconnaissance (ISR) platforms—such as satellites, spy planes, and drones—with command, control, and communications (C3) networks and precision-strike assets.31 This synergy created a virtuous cycle: ISR assets could find a target, the network could rapidly transmit that information to a decision-maker and a shooter, and a precision weapon could destroy the target with high probability. This integration of technology, doctrine, and organization produced a dramatic increase in military effectiveness.31

Doctrinal Transformation and Asymmetric Consequences

This technological revolution was accompanied by a doctrinal one within the U.S. military. Reeling from the experience in Vietnam and absorbing the lessons of the 1973 Yom Kippur War—where modern ATGMs and surface-to-air missiles (SAMs) inflicted heavy losses on Israeli armor and aircraft—the U.S. Army undertook a profound intellectual reassessment.41

In 1976, the Army published Field Manual 100-5, Operations, which codified a new doctrine known as “Active Defense”.44 This doctrine was a radical departure from previous thinking, focusing almost exclusively on a high-intensity, conventional battle against the Soviet Union in Europe.44 It was heavily focused on firepower, emphasizing the need to “win the first battle of the next war” by attriting the numerically superior Warsaw Pact forces with technologically advanced weaponry.45 Active Defense was controversial, however, and criticized for being too defensive and ceding the initiative to the enemy.41

This critique led to another doctrinal evolution. In 1982, the Army released a new version of FM 100-5 that introduced the concept of AirLand Battle.41 This doctrine was more aggressive and maneuver-oriented, designed specifically to defeat the Soviet operational concept of echeloned attacks.43 AirLand Battle envisioned an “extended battlefield” where U.S. forces would not just defend against the enemy’s front-line troops but would use integrated air power and long-range fires to attack and disrupt their follow-on echelons, command posts, and logistics deep in the rear.42 This required unprecedented levels of cooperation between the Army and the Air Force and was a perfect doctrinal match for the emerging technologies of the RMA.48

The stunning success of this new American way of war in the 1991 Gulf War had a chilling effect on potential adversaries. It became clear that challenging the United States in a conventional, state-on-state conflict was a recipe for swift and certain defeat. This reality, however, did not lead to a more peaceful world. Instead, it created a “compelling logic for states and non-state actors to move out of the traditional mode of war”.51 Unable to compete symmetrically, adversaries were forced to invest in asymmetric capabilities and strategies that could bypass or neutralize U.S. technological strengths.32 This strategic adaptation accelerated the global shift toward the very hybrid, irregular, and grey-zone methods that had been practiced during the Cold War. The RMA, in effect, made conventional war obsolete for most actors, thereby making unconventional conflict the new norm. The U.S. military had perfected a doctrine for fighting a specific adversary in a specific way, just as that adversary collapsed and the fundamental character of conflict was shifting beneath its feet.

Section III: The Expanded Battlefield – Hybrid Actors in New Domains

The end of the Cold War and the subsequent era of U.S. conventional military primacy did not end great power competition; it merely displaced it. Conflict migrated from the physical battlefield into non-physical and previously non-militarized domains. We have entered a state of persistent, low-level conflict where the distinction between peace and war is not simply blurred but is actively manipulated as a strategic tool. Adversaries now operate in a “grey zone,” employing hybrid methods to achieve strategic objectives without crossing the threshold of overt warfare.

The New Domains of Contestation

The modern battlefield is no longer confined to land, sea, and air. It has expanded to encompass the global economic system, digital networks, and the critical infrastructure that underpins modern society.

Economic Warfare has evolved into a primary instrument of statecraft, a sophisticated method of coercion that leverages global interdependence as a weapon.52 The “weaponization of finance” allows states, particularly the United States with its control over the global dollar-based financial system, to “cripple [countries] financially” through targeted sanctions against individuals, companies, and entire sectors of an economy.52 The unprecedented sanctions imposed on Russia following its 2022 invasion of Ukraine, which froze central bank assets and cut off major banks from international payment systems, demonstrate the power of this tool.56 Similarly, the “weaponization of trade” involves using tariffs, embargoes, and regulatory barriers to induce policy changes in a target state by exploiting economic dependencies.53 China’s campaign of economic coercion against Australia, which targeted key exports like wine, barley, and coal after Australia called for an inquiry into the origins of COVID-19, is a prime example of this strategy in action.59 Russia has also long used its position as a major energy supplier to Europe as a tool of political leverage, manipulating gas prices and threatening supply cutoffs to achieve foreign policy goals.62 This trend transforms economic interdependence from a source of mutual benefit into a critical vulnerability.55

Cyber Warfare has matured from a tool of espionage into a distinct domain of military operations. The watershed moment was the 2010 Stuxnet attack, a highly sophisticated computer worm believed to be a joint U.S.-Israeli operation. Stuxnet infiltrated Iran’s Natanz nuclear facility and caused physical damage to its uranium enrichment centrifuges, demonstrating for the first time that malicious code could produce kinetic effects.67 Since then, state-sponsored cyber operations have become commonplace. Advanced Persistent Threat (APT) groups linked to the governments of China, Russia, Iran, and North Korea now routinely conduct campaigns against adversaries.71 Their objectives range from espionage and intellectual property theft to prepositioning for future disruptive attacks on critical infrastructure, including telecommunications, energy grids, and transportation networks.74

Critical Infrastructure has become a new front line. The physical systems that support the global economy and information flow are now considered legitimate targets for grey-zone aggression. Undersea cables, which carry an estimated 99% of all transoceanic digital communications and trillions of dollars in financial transactions daily, are a point of extreme vulnerability.78 This vast network is susceptible to damage from both accidental causes, like fishing trawlers and dragging anchors, and deliberate sabotage.80 State actors, particularly Russia, are developing the capabilities to target these cables. Russia’s Main Directorate for Deep-Water Research (GUGI) operates specialized submarines and surface vessels, such as the

Yantar, which are equipped for deep-sea operations and have been observed loitering near critical cable routes.78 Recent incidents in the Baltic Sea, where data cables and a gas pipeline were damaged by a Chinese-flagged vessel dragging its anchor, have heightened concerns about coordinated hybrid attacks.83 The key strategic advantage of such attacks is the challenge of attribution. It is exceptionally difficult to prove that a cable cut by a commercial vessel was an intentional act of state-sponsored sabotage rather than an accident, providing the aggressor with plausible deniability and complicating any response by NATO or other targeted nations.78

The Doctrine of Ambiguity – Hybrid and Grey-Zone Warfare

To describe this new era of persistent, ambiguous conflict, analysts have developed two interrelated concepts: grey-zone conflict and hybrid warfare.

The Grey Zone is the conceptual space in which this competition occurs. It is defined by the Center for Strategic and International Studies (CSIS) as “the contested arena somewhere between routine statecraft and open warfare”.86 It is a realm of coercive and subversive activity deliberately designed to remain below the threshold that would provoke a conventional military response.1 In this space, revisionist powers like Russia and China use a range of non-military and quasi-military tools—including information operations, political and economic coercion, cyber operations, and the use of proxies—to gradually achieve strategic gains and weaken adversaries without triggering a full-scale war.86

Hybrid Warfare is the methodology employed within the grey zone. It is not a new form of warfare, but rather the integrated and synchronized application of multiple instruments of power—conventional and unconventional, military and non-military, overt and covert—in a unified campaign to achieve a strategic objective.89 Russia’s 2014 annexation of Crimea and subsequent intervention in the Donbas region of Ukraine is the archetypal modern example. This operation seamlessly blended the use of deniable special forces (“little green men”), local proxy militias, economic pressure, cyberattacks, and a sophisticated, multi-platform disinformation campaign to achieve its goals before the West could formulate a coherent response.51

This environment has also transformed the nature of Proxy Warfare. The Cold War model of two superpowers manipulating client states has been replaced by a far more complex, multipolar system.96 Today’s sponsors include not only great powers but also ambitious regional actors like Iran, Saudi Arabia, Turkey, and the UAE. The proxies themselves are no longer just state armies but a diverse ecosystem of non-state actors, including militias, transnational terrorist groups, private military companies, and political movements, many with their own ideologies and agendas that may diverge from those of their sponsors.96 The proliferation of advanced technology, from anti-tank missiles to armed drones and secure communications, has made these proxy forces more lethal and capable than ever before.101 Modern proxy battlefields, such as the Syrian civil war, are characterized by a dizzying array of local and international actors, with multiple sponsors backing various factions, creating a complex and brutal multi-sided conflict.14 Iran’s long-standing support for Hezbollah is a prime example of a modern proxy relationship, where financial aid, weapons, and training have cultivated a formidable non-state actor that serves as a key instrument of Iranian foreign policy.106

The defining trend of this new era is the normalization of hostile acts. Actions that would have once been considered casus belli—such as sabotage of critical national infrastructure, systemic economic coercion, or major cyberattacks against government and industry—are now treated as features of routine international competition. This has shifted the nature of conflict from an episodic state of declared war to a persistent condition of undeclared competition. In this grey zone, ambiguity is not a byproduct of conflict; it is a central objective and a strategic weapon. The ability to conduct a hostile act while making attribution difficult or impossible paralyzes the victim’s decision-making process and allows the aggressor to act with a degree of impunity.

FeatureUnited States / WestRussian FederationPeople’s Republic of China
Doctrine NameGrey-Zone / Hybrid Warfare ResponseNew Generation Warfare / Gerasimov DoctrineThree Warfares / Systems Destruction Warfare
Primary ObjectiveMaintain status quo; deter/counter aggression; manage escalationRevise post-Cold War order; re-establish sphere of influence; destabilize adversariesAchieve regional hegemony; displace U.S. influence; unify Taiwan; secure resource access
Key Tools / MethodsSanctions; support to partners/proxies; cyber operations; special operations forces; freedom of navigation operations (FONOPs)Information-psychological warfare; cyber operations; economic coercion (esp. energy); use of deniable special forces and proxies; political subversionPublic opinion warfare; psychological warfare; legal warfare (lawfare); economic coercion (trade, investment); cyber espionage; maritime militia
Role of MilitaryPrimarily a deterrent and response force; kinetic action is a last resort, often through SOF or proxiesConcealed military means supplement non-military efforts; special forces (Spetsnaz) and conventional forces are used for intimidation and decisive actionMilitary presence (PLA) creates physical leverage; used for intimidation and coercion (grey-zone tactics); prepared for decisive conventional action if necessary
Role of InformationReactive; focus on countering disinformation and attributionCentral; aims to alter consciousness, create domestic chaos in target state, and achieve “information superiority” before kinetic actionFoundational; aims to control the narrative, shape domestic and international opinion, demoralize the adversary, and legitimize CCP actions
Sources8689111

Section IV: The Cognitive Domain – The Battle for Perception

Perhaps the most fundamental transformation in the character of conflict over the past half-century has been the elevation of the human mind and collective public perception as a primary, and often decisive, battlefield. The strategic objective is increasingly not to defeat an enemy’s military forces, but to erode their society’s cohesion, paralyze their political will, and manipulate their very understanding of reality. This is narrative warfare, and its tools have evolved from state-controlled broadcast media to a global, AI-powered, social media-driven disinformation engine.

The Weaponization of Media and Social Media

The power of modern media to shape conflict was evident throughout the late 20th century, but the rise of the internet and social media in the 21st century created a new paradigm.

The Arab Spring, beginning in late 2010, was the first major geopolitical event to showcase the power of social media as a tool for political mobilization. Activists across Tunisia, Egypt, and other nations used platforms like Facebook, Twitter, and YouTube to organize protests, share information about government brutality, and bypass state-controlled media censorship to broadcast their message to a global audience.115 In Egypt, the “We Are All Khaled Said” Facebook page became a rallying point for a movement that ultimately toppled a decades-old regime.117 This demonstrated the potential for these new platforms to empower organic, bottom-up movements and challenge authoritarian control.120

However, state actors quickly recognized the power of these tools and began to co-opt them for their own purposes, leading to the industrialization of influence operations. The most prominent example is Russia’s Internet Research Agency (IRA), a state-sponsored “troll farm” dedicated to conducting online influence operations.121 The IRA’s tactics, revealed in detail following its interference in the 2016 U.S. presidential election, involve a sophisticated, multi-layered approach. Operators create and manage vast networks of fake social media accounts, or “bots,” designed to impersonate real citizens.122 These accounts are used to amplify divisive narratives, spread disinformation, and infiltrate online communities on both the political left and right, with the overarching goal of exacerbating existing social divisions and eroding trust in democratic institutions.123 The IRA’s methods include “narrative switching,” where accounts post non-political content most of the time to build a credible persona before injecting targeted political messages, and organizing real-world events, such as opposing protests, to bring online division into the physical world.122

This weaponization of information is not merely opportunistic; it is now a core component of state military doctrine. China’s concept of the “Three Warfares” explicitly codifies this approach. It includes “public opinion warfare” to dominate narratives and ensure domestic and international support, “psychological warfare” to demoralize an adversary and weaken their will to fight, and “legal warfare” (lawfare) to use international and domestic law to challenge the legitimacy of an opponent’s actions.114 Similarly, Russia’s doctrine of

“New Generation Warfare” (often associated with General Valery Gerasimov) views “information-psychological warfare” as a critical tool for achieving strategic goals by creating domestic chaos within a target state, often before any military action is taken.3 The Syrian Civil War serves as a stark case study of this new reality, where a brutal physical conflict has been accompanied by a relentless narrative war waged by all factions—the Assad regime, various rebel groups, and their respective foreign backers (including Russia, Iran, and Western powers)—each using traditional and social media to frame the conflict, legitimize their actions, and demonize their opponents.125

The AI-Powered Disinformation Engine

If social media provided the platform for modern information warfare, artificial intelligence is now providing the engine, promising to “supercharge” disinformation campaigns by dramatically increasing their speed, scale, and sophistication.130

The most alarming development is the rise of deepfakes and other forms of synthetic media. Using advanced AI techniques like generative adversarial networks (GANs), malicious actors can now create highly realistic but entirely fabricated audio and video content.132 This technology makes it possible to convincingly impersonate political leaders, military officials, or other public figures, having them appear to say or do things they never did.134 The national security implications are profound. A well-timed deepfake video could be used to fabricate a scandal to influence an election, spread false orders to military units to create chaos, or create a fake atrocity to serve as a pretext for war.135 An AI-generated image of an explosion at the Pentagon in 2023 briefly caused a dip in the U.S. stock market, demonstrating the real-world impact of such fabrications.137

Beyond deepfakes, AI is being used to automate and personalize propaganda on an unprecedented scale. Large language models can now generate false news articles and social media posts that are often indistinguishable from human-written content.138 These tools can be used to create tailored messages designed to appeal to the specific psychological vulnerabilities of target audiences, and to automate the operation of vast bot networks that can amplify these messages across multiple platforms.130 This dramatically lowers the barrier to entry for conducting large-scale influence operations, making these powerful tools available not just to states, but to a wide range of malicious actors.138

The cumulative effect of this AI-driven information warfare is not simply the spread of more falsehoods. Its ultimate strategic objective is the erosion of trust itself. The goal is not necessarily to make people believe in a specific lie, but to destroy their confidence in all sources of information—in the media, in government institutions, in scientific experts, and ultimately, in their own ability to discern fact from fiction. This fosters a state of what can be called “epistemic exhaustion,” where citizens become so overwhelmed by the flood of conflicting information that they disengage from civic life, making them passive and more susceptible to manipulation. A population that trusts nothing cannot form the consensus required to recognize and counter a national security threat, thereby achieving an adversary’s goal of societal paralysis without firing a single shot.

Section V: The Next Revolution – The AI-Enabled Battlespace

Just as the integration of precision, stealth, and networking catalyzed a Revolution in Military Affairs at the end of the 20th century, artificial intelligence is now driving another profound transformation in the character of warfare. This emerging revolution is centered on three key elements: the compression of decision-making to machine speed, the proliferation of intelligent autonomous systems, and the dominance of data as the central resource of military power. This shift promises unprecedented efficiency but also introduces complex new risks of escalation and loss of human control.

Accelerating the Kill Chain – AI in Intelligence and C2

Modern military operations are drowning in data. A torrent of information flows from satellites, drones, ground sensors, and countless other sources, far exceeding the capacity of human analysts to process it in a timely manner.140 Artificial intelligence is becoming the essential tool for turning this data overload into a decisive advantage.

The U.S. Department of Defense’s Project Maven (officially the Algorithmic Warfare Cross-Functional Team) is a flagship initiative in this area. Launched in 2017, Maven employs machine learning algorithms to automatically analyze full-motion video from drones and other ISR platforms.142 The system can detect, classify, and track objects of interest—such as vehicles, buildings, or groups of people—freeing human analysts from the tedious task of watching countless hours of footage and allowing them to focus on higher-level analysis and decision-making.144 This capability dramatically accelerates the intelligence cycle, reducing the time it takes to find and validate a target from hours or days to minutes or even seconds.146

This accelerated intelligence is being fed into increasingly AI-enhanced Command and Control (C2) systems. The objective is to create a seamless, networked architecture that connects any sensor to any decision-maker and any weapon system on the battlefield. This concept is at the heart of the U.S. military’s overarching strategy for Joint All-Domain Command and Control (JADC2).147 AI algorithms within these C2 systems can fuse data from disparate sources to create a unified, real-time operational picture, predict enemy movements, analyze potential courses of action, and recommend optimal responses to commanders.140 The ultimate goal is to radically compress the “sensor-to-shooter” timeline, enabling forces to act at a tempo that overwhelms an adversary’s ability to react.

This pursuit of AI-driven military advantage has ignited a fierce technological competition, often described as an AI arms race, primarily between the United States and China.150 China has made AI a national priority and is pursuing a strategy of “military-civil fusion” to systematically leverage the expertise and innovation of its burgeoning private tech sector and universities for military modernization.111 Beijing’s goal is to achieve “intelligentized warfare,” using AI to achieve “decision dominance” through a highly integrated “systems warfare” approach.111 While the United States is widely seen as maintaining a lead in developing the most advanced, cutting-edge AI models, China’s state-directed approach gives it an advantage in the broad-scale adoption and practical integration of AI technologies across its military and economy.153

The Proliferation of Autonomy

The most visible and disruptive impact of AI on the battlefield is the proliferation of autonomous and semi-autonomous systems, particularly unmanned aerial vehicles (UAVs).

The drone revolution has unfolded in two parallel tracks. On one end of the spectrum are sophisticated, reusable military drones like the Turkish Bayraktar TB2. In conflicts such as the 2020 Nagorno-Karabakh war, the TB2 proved devastatingly effective, combining long-endurance surveillance with precision-guided munitions to destroy Armenian air defenses, armor, and artillery, effectively dominating the battlefield.154 On the other end of the spectrum is the widespread use of cheap, commercially available, and often disposable drones, a trend brought to the forefront by the war in Ukraine. Both sides have deployed thousands of small quadcopters for reconnaissance and, more significantly, as first-person-view (FPV) “kamikaze” drones capable of destroying multi-million-dollar tanks and other armored vehicles.157 This has created a new reality of attritional drone warfare, where the low cost and sheer quantity of these systems can overwhelm even sophisticated defenses.159

This trend points toward the next frontier of military autonomy: Lethal Autonomous Weapon Systems (LAWS), colloquially known as “killer robots.” These are weapon systems that, once activated, can independently search for, identify, target, and kill human beings without direct human control over the final lethal decision.150 The development of LAWS raises profound legal and ethical challenges. Organizations like the International Committee of the Red Cross (ICRC) have raised serious concerns about whether such systems can comply with the core principles of International Humanitarian Law (IHL), such as distinction, proportionality, and precaution.163 Key questions revolve around accountability—who is responsible when an autonomous weapon makes a mistake?—and the fundamental ethical principle of “meaningful human control” over the use of lethal force.166 In response to these concerns, the ICRC and numerous other bodies have called for the negotiation of new, legally binding international rules to prohibit unpredictable autonomous systems and those that target humans directly.162

The relentless pace of technological development is creating a strategic environment where the speed of combat is poised to exceed the limits of human cognition. As AI-enabled C2 systems compress decision cycles to seconds and autonomous weapons are designed to react instantly to threats, conflicts between two AI-enabled militaries may be fought and decided at machine speed, potentially before human commanders can fully comprehend the situation or intervene. This creates an inescapable and dangerous strategic logic: to remain competitive, militaries feel compelled to delegate more and more decision-making authority to AI systems, despite the profound ethical concerns and the immense risk of rapid, unintended escalation.171

Furthermore, the proliferation of cheap, effective, and increasingly autonomous systems is upending the traditional military-technical balance. The war in Ukraine has vividly demonstrated the problem of “cost asymmetry,” where inexpensive drones, costing only a few thousand dollars, can neutralize or destroy highly valuable military assets like tanks and warships that cost millions.158 Defending against swarms of these cheap drones with expensive, sophisticated air defense missiles is an economically unsustainable proposition.160 This challenges the entire Western military model, which has for decades relied on a relatively small number of expensive, technologically superior platforms. The future battlefield may not be dominated by the nation with the most advanced fighter jet, but by the one that can deploy the largest, most adaptable, and most intelligent swarm of inexpensive, autonomous, and attritable systems.

Conclusion: A State of Undocumented, Perpetual Conflict

The evidence of the past 50 years is conclusive: while the fundamental nature of war as a political act has not changed, its character has been irrevocably transformed. The clear, binary world of the Cold War, with its defined states of “peace” and “war,” has been replaced by a state of persistent, multi-domain competition. The lines have not just blurred; they have been erased and weaponized. The major powers are not on the brink of a new conflict; they are, and have been for some time, engaged in one. It is an undocumented, undeclared, and unending conflict fought not primarily with massed armies on physical battlefields, but with a new arsenal of hybrid tools across a vastly expanded battlespace.

This transformation has been driven by a confluence of factors. The nuclear stalemate of the Cold War forced competition into the shadows, normalizing the use of proxies, covert action, and political subversion. The subsequent Revolution in Military Affairs created such a profound U.S. advantage in conventional warfare that it compelled adversaries to abandon symmetrical competition and double down on these asymmetric, hybrid methods. The globalization of finance and information, coupled with the proliferation of cyber capabilities and advanced technologies, provided the new domains—economic, digital, and cognitive—in which this competition would be waged.

Today, Russia, China, the United States, and other powers are engaged in a constant struggle for advantage in the grey zone. This is a conflict fought with sanctions designed to cripple economies, with cyberattacks that probe critical infrastructure, with deniable sabotage of undersea cables, with proxy forces that allow for influence without attribution, and, most pervasively, with information campaigns designed to fracture societies from within.

The advent of artificial intelligence is now catalyzing the next revolution, one that promises to accelerate the speed of conflict beyond human comprehension. AI is transforming intelligence analysis, command and control, and the very nature of weaponry, pushing toward a future of algorithmic warfare and autonomous systems. This raises the specter of a battlefield where decisions are made in microseconds and escalation can occur without deliberate human intent.

In this new era, the traditional concept of “victory” is becoming obsolete. Victory is no longer solely defined by a signed treaty or a captured capital. It may be the successful paralysis of a rival’s economy through financial warfare 55; the quiet degradation of their military readiness through sustained cyber espionage 76; the fracturing of their political system through a multi-year disinformation campaign 123; or the achievement of a decisive technological breakthrough in AI that renders an adversary’s entire military doctrine irrelevant.150

The greatest danger of this new paradigm is not necessarily a deliberate, cataclysmic war, but the potential for uncontrollable escalation out of the grey zone. A miscalculation in a proxy conflict, a cyberattack with unforeseen cascading effects, or the autonomous action of an AI-powered weapon system could trigger a rapid spiral into a conventional conflict that no party initially intended. The central challenge for national security in the 21st century is therefore twofold: not only to prepare to win the wars of the future, but to learn how to successfully navigate the unending, undocumented conflict that is already here.


If you find this post useful, please share the link on Facebook, with your friends, etc. Your support is much appreciated and if you have any feedback, please email me at in**@*********ps.com. Please note that for links to other websites, we are only paid if there is an affiliate program such as Avantlink, Impact, Amazon and eBay and only if you purchase something. If you’d like to directly donate to help fund our continued report, please visit our donations page.


Sources Used

  1. Grey-zone (international relations) – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Grey-zone_(international_relations)
  2. The Blurring Of War And Peace: Hybrid Warfare – Analysis …, accessed September 30, 2025, https://www.eurasiareview.com/19042021-the-blurring-of-war-and-peace-hybrid-warfare-analysis/
  3. The Russian Understanding of War: Blurring the Lines Between War and Peace, accessed September 30, 2025, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/2131233/the-russian-understanding-of-war-blurring-the-lines-between-war-and-peace/
  4. The Opposite of War is Not Peace – Futurist Speaker, accessed September 30, 2025, https://futuristspeaker.com/future-scenarios/the-opposite-of-war-is-not-peace-2/
  5. Cold War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War
  6. Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76v41/d52
  7. NATO and The Cold War | Imperial War Museums, accessed September 30, 2025, https://www.iwm.org.uk/learning/resources/nato-and-the-cold-war
  8. Tactics – Conventional War, Terrorism, Strategy – Britannica, accessed September 30, 2025, https://www.britannica.com/topic/tactics/From-conventional-war-to-terrorism
  9. What was Warsaw Pact defence strategy if NATO invaded them? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/1leggj2/what_was_warsaw_pact_defence_strategy_if_nato/
  10. 13. National Intelligence Estimate 11-14-75, Washington, September 4, 1975. – Historical Documents – Office of the Historian, accessed September 30, 2025, https://history.state.gov/historicaldocuments/frus1969-76ve15p1/d13
  11. NATO and Warsaw Pact: Force Comparisons, accessed September 30, 2025, https://www.nato.int/cps/en/natohq/declassified_138256.htm
  12. The Evolution of US Army Tactical Doctrine, 1946-76, accessed September 30, 2025, https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/doughty.pdf
  13. The Evolution of US Army Tactical Doctrine, 1946-76 (Leavenworth Papers, Number 1), accessed September 30, 2025, https://apps.dtic.mil/sti/citations/ADA211791
  14. Proxy wars, explained | FairPlanet, accessed September 30, 2025, https://www.fairplanet.org/story/what-are-proxy-wars-and-where-are-they-happening/
  15. Proxy war – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Proxy_war
  16. Proxy wars – (US History – 1945 to Present) – Vocab, Definition, Explanations | Fiveable, accessed September 30, 2025, https://fiveable.me/key-terms/united-states-history-since-1945/proxy-wars
  17. Eight “Hot Wars” During the Cold War | CFR Education, accessed September 30, 2025, https://education.cfr.org/learn/reading/eight-hot-wars-during-cold-war
  18. The Angolan civil war (Chapter 8) – The USSR in Third World Conflicts, accessed September 30, 2025, https://www.cambridge.org/core/books/ussr-in-third-world-conflicts/angolan-civil-war/6A98027220E926A6783DFCE2A320DB15
  19. The Angola Crisis 1974–75 – Milestones in the History of U.S. Foreign Relations – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1969-1976/angola
  20. Angolan Civil War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Angolan_Civil_War
  21. “Buried in the Sands of the Ogaden”: The Horn of Africa and SALT II, 1977–1979 – Office of the Historian, accessed September 30, 2025, https://history.state.gov/milestones/1977-1980/horn-of-africa
  22. Ogaden War Between Somalia and Ethiopia | Research Starters – EBSCO, accessed September 30, 2025, https://www.ebsco.com/research-starters/history/ogaden-war-between-somalia-and-ethiopia
  23. Central Intelligence Agency – Intelligence, Surveillance, Covert Ops …, accessed September 30, 2025, https://www.britannica.com/topic/Central-Intelligence-Agency/Activities
  24. Cold War espionage – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Cold_War_espionage
  25. During cold war both KGB and CIA had high ranking moles inside their organisations. Is it known which side did better job at infiltrating their opponent and getting sensitive information as cold war progressed? : r/AskHistorians – Reddit, accessed September 30, 2025, https://www.reddit.com/r/AskHistorians/comments/4jkybw/during_cold_war_both_kgb_and_cia_had_high_ranking/
  26. A global kill list: Inside the KGB’s secret retribution operations beyond the Iron Curtain, accessed September 30, 2025, https://theins.ru/en/history/281554
  27. COVERT OPERATIONS OF THE USSR IN AFRICA Текст научной статьи по специальности – КиберЛенинка, accessed September 30, 2025, https://cyberleninka.ru/article/n/covert-operations-of-the-ussr-in-africa
  28. Africa–Soviet Union relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Africa%E2%80%93Soviet_Union_relations
  29. AFRICA (SOVIET POLICY) (Hansard, 6 February 1978) – API Parliament UK, accessed September 30, 2025, https://api.parliament.uk/historic-hansard/commons/1978/feb/06/africa-soviet-policy
  30. Soviet Spies in Africa: How the KGB Strengthened Soviet Influence on the Continent During the Cold War. : r/coldwar – Reddit, accessed September 30, 2025, https://www.reddit.com/r/coldwar/comments/1n91egf/soviet_spies_in_africa_how_the_kgb_strengthened/
  31. Revolutions in Military Affairs – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/tr/pdf/ADA360252.pdf
  32. The Revolution in Military Affairs and Conflict Short … – USAWC Press, accessed September 30, 2025, https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1893&context=monographs
  33. Precision-guided munition – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Precision-guided_munition
  34. Precision Guided Munitions and the New Era of Warfare – Military Analysis Network, accessed September 30, 2025, https://man.fas.org/dod-101/sys/smart/docs/paper53.htm
  35. Getting Closer: Precision Guided Weapons in the Southeast Asia War – Air Force Museum, accessed September 30, 2025, https://www.nationalmuseum.af.mil/Visit/Museum-Exhibits/Fact-Sheets/Display/Article/195858/getting-closer-precision-guided-weapons-in-the-southeast-asia-war/
  36. Precision Guided Munitions: Revolutionizing Warfare Accuracy, accessed September 30, 2025, https://aviationanddefensemarketreports.com/precision-guided-munitions-revolutionizing-warfare-with-accuracy/
  37. Stealth aircraft – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_aircraft
  38. Stealth technology – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Stealth_technology
  39. Lessons from Stealth for Emerging Technologies – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/lessons-from-stealth-for-emerging-technologies/
  40. Revolution in military affairs – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Revolution_in_military_affairs
  41. From Active Defense to AirLand Battle: The Development of Army Doctrine, 1973-1982, accessed September 30, 2025, https://www.tradoc.army.mil/wp-content/uploads/2020/10/From-Active-Defense-to-AirLand-Battle.pdf
  42. What did AirLand Battle address that previous NATO Cold War strategies were failing at? : r/WarCollege – Reddit, accessed September 30, 2025, https://www.reddit.com/r/WarCollege/comments/b8q6k0/what_did_airland_battle_address_that_previous/
  43. AirLand Battle: The Development of a Doctrine – DTIC, accessed September 30, 2025, https://apps.dtic.mil/sti/pdfs/AD1119406.pdf
  44. THE POLITICAL CONTEXT OF US ARMY DOCTRINE, 1974-1976 | Small Wars Journal by Arizona State University, accessed September 30, 2025, https://smallwarsjournal.com/2020/10/29/political-context-us-army-doctrine-1974-1976/
  45. How was the Military doctrine of active defense born? : Focusing on the process of writing the FM 100-5 Operations 1976 edition – Korea Journal Central, accessed September 30, 2025, http://journal.kci.go.kr/imhc/archive/articleView?artiId=ART002939313
  46. Doctrinal Development—AirLand Battle – Army University Press, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/MR-75th-Anniversary/75th-Doctrinal-AirLand/
  47. AirLand Battle and Modern Warfare, accessed September 30, 2025, https://www.nids.mod.go.jp/english/event/forum/pdf/2014/09.pdf
  48. WAR ON THE 21ST CENTURY BATTLEFIELD: REVISITING GENERAL STARRY’S CONCEPTUAL FRAMEWORK, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/conceptual-framework/
  49. AirLand Battle Doctrine – MERIP, accessed September 30, 2025, https://merip.org/1983/01/airland-battle-doctrine/
  50. The Lessons of AirLand Battle and the 31 Initiatives for Multi-Domain Battle – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/perspectives/PE300/PE301/RAND_PE301.pdf
  51. Countering Hybrid Warfare: Conceptual Foundations and Implications for Defence Forces – GOV.UK, accessed September 30, 2025, https://assets.publishing.service.gov.uk/media/5da9a79ae5274a5ca507c6bb/20190401-MCDC_CHW_Information_note_-_Conceptual_Foundations.pdf
  52. Weaponization of Finance – Encyclopedia.pub, accessed September 30, 2025, https://encyclopedia.pub/entry/36941
  53. The Weaponization of Trade – Columbia SIPA – Columbia University, accessed September 30, 2025, https://www.sipa.columbia.edu/sites/default/files/migrated/downloads/Capstone%2520Report%2520%2528Eurasia%2520Group%2529.pdf
  54. Weaponizing Trade – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/weaponizing-trade
  55. Weaponizing Financial and Trade Flows: The Case of Failing Western Sanctions, accessed September 30, 2025, https://internationalbanker.com/finance/weaponizing-financial-and-trade-flows-the-case-of-failing-western-sanctions/
  56. Russia Sanctions and Export Controls: U.S. Agencies Should Establish Targets to Better Assess Effectiveness, accessed September 30, 2025, https://www.gao.gov/products/gao-25-107079
  57. International sanctions during the Russo-Ukrainian War – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/International_sanctions_during_the_Russo-Ukrainian_War
  58. The Economic Impact of Russia Sanctions – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs-product/IF12092
  59. How China’s Coercive Measures Against Australia Backfired | The Heritage Foundation, accessed September 30, 2025, https://www.heritage.org/china/report/how-chinas-coercive-measures-against-australia-backfired
  60. China is still coercing Australia—with implicit threats | The Strategist, accessed September 30, 2025, https://www.aspistrategist.org.au/china-is-still-coercing-australia-with-implicit-threats/
  61. Warning from Australia: Meet the Threat of Chinese Economic Coercion to Democracy, accessed September 30, 2025, https://www.cnas.org/publications/commentary/warning-from-australia-meet-the-threat-of-chinese-economic-coercion-to-democracy
  62. Energy policy of Russia – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Energy_policy_of_Russia
  63. The Use of Energy Resources as Foreign Policy Tools: The Russian Case – ResearchGate, accessed September 30, 2025, https://www.researchgate.net/publication/344615948_The_Use_of_Energy_Resources_as_Foreign_Policy_Tools_The_Russian_Case
  64. Energy as a tool of foreign policy of authoritarian states, in particular Russia – European Parliament, accessed September 30, 2025, https://www.europarl.europa.eu/RegData/etudes/STUD/2018/603868/EXPO_STU(2018)603868_EN.pdf
  65. Russia’s Energy Diplomacy – Chatham House, accessed September 30, 2025, https://www.chathamhouse.org/sites/default/files/19352_0511bp_lough.pdf
  66. Weaponisation of finance: Regulators’ worries in a geopolitically fragile world, accessed September 30, 2025, https://www.orfonline.org/expert-speak/weaponisation-of-finance
  67. Iran’s use of cyberspace has evolved from an internal means of information control and repression to more aggressive attacks on foreign targets. The regime has been developing its own cybersecurity software and internet architecture in order to protect and insulate its networks, and it has been developing technological cyber expertise as a form of asymmetric warfare against a superior conventional US military. – Congress.gov, accessed September 30, 2025, https://www.congress.gov/crs_external_products/IF/HTML/IF11406.web.html
  68. Stuxnet | CFR Interactives, accessed September 30, 2025, https://www.cfr.org/cyber-operations/stuxnet
  69. Full article: Stuxnet, revisited (again): producing the strategic relevance of cyber operations, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/23738871.2025.2492570
  70. Stuxnet: The world’s first cyber weapon – Center for International Security and Cooperation, accessed September 30, 2025, https://cisac.fsi.stanford.edu/news/stuxnet
  71. State Sponsored Cyber Warfare – Identity Management Institute®, accessed September 30, 2025, https://identitymanagementinstitute.org/state-sponsored-cyber-warfare/
  72. NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations – National Security Agency, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/
  73. Mutual Defense in Cyberspace: Joint Action on Attribution – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution
  74. U.S. government scrambles to stop new hacking campaign blamed on China, accessed September 30, 2025, https://www.washingtonpost.com/technology/2025/09/25/cisa-federal-hacks-cisco/
  75. What are state-sponsored cyber attacks? | F‑Secure, accessed September 30, 2025, https://www.f-secure.com/en/articles/what-are-state-sponsored-cyber-attacks
  76. Secure Cyberspace and Critical Infrastructure – Homeland Security, accessed September 30, 2025, https://www.dhs.gov/archive/secure-cyberspace-and-critical-infrastructure
  77. Countering Chinese State-Sponsored Actors Compromise of … – CISA, accessed September 30, 2025, https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a
  78. Submarine cable security is all at sea • The Register, accessed September 30, 2025, https://www.theregister.com/2025/09/29/submarine_cable_security_report_uk/
  79. Protection of Undersea Telecommunication Cables: Issues for Congress, accessed September 30, 2025, https://www.congress.gov/crs-product/R47648
  80. Subsea telecommunications cables: resilience and crisis preparedness – Parliament UK, accessed September 30, 2025, https://publications.parliament.uk/pa/jt5901/jtselect/jtnatsec/723/report.html
  81. International law doesn’t adequately protect undersea cables. That must change., accessed September 30, 2025, https://www.atlanticcouncil.org/content-series/hybrid-warfare-project/international-law-doesnt-adequately-protect-undersea-cables-that-must-change/
  82. Safeguarding Subsea Cables: Protecting Cyber Infrastructure amid Great Power Competition – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/safeguarding-subsea-cables-protecting-cyber-infrastructure-amid-great-power-competition
  83. Hybrid Attacks Rise on Undersea Cables in Baltic and Arctic Regions – Jamestown, accessed September 30, 2025, https://jamestown.org/program/hybrid-attacks-rise-on-undersea-cables-in-baltic-and-arctic-regions/
  84. Why Russia and China May Be Cutting Europe’s Undersea Cables | WSJ – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=pyz7nSAKF9E
  85. Risky Game: Hybrid Attack on Baltic Undersea Cables | Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/risky-game-hybrid-attack-baltic-undersea-cables
  86. Gray Zone Project – CSIS, accessed September 30, 2025, https://www.csis.org/programs/gray-zone-project
  87. Gaining Competitive Advantage in the Gray Zone: Response Options for Coercive Aggression Below the Threshold of Major War – RAND, accessed September 30, 2025, https://www.rand.org/content/dam/rand/pubs/research_reports/RR2900/RR2942/RAND_RR2942.pdf
  88. Today’s wars are fought in the ‘gray zone.’ Here’s everything you need to know about it., accessed September 30, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/
  89. Defining HYBRID WARFARE, accessed September 30, 2025, https://www.marshallcenter.org/sites/default/files/files/2020-05/pC_V10N1_en_Wither.pdf
  90. NATO and Countering Hybrid Warfare – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/nato-and-countering-hybrid-warfare
  91. Hybrid warfare – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hybrid_warfare
  92. Hybrid Warfare – New Threats, Complexity, and ‘Trust’ as the Antidote – NATO, accessed September 30, 2025, https://www.nato.int/docu/review/articles/2021/11/30/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote/index.html
  93. War in Donbas – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/War_in_Donbas
  94. Russia-Ukraine War | Map, Casualties, Timeline, Death Toll, Causes, & Significance | Britannica, accessed September 30, 2025, https://www.britannica.com/event/2022-Russian-invasion-of-Ukraine
  95. Ukraine: Conflict at the Crossroads of Europe and Russia | Council on Foreign Relations, accessed September 30, 2025, https://www.cfr.org/backgrounder/ukraine-conflict-crossroads-europe-and-russia
  96. TWENTY-FIRST CENTURY PROXY WARFARE – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Twenty-First_Century_Proxy_Warfare_Final.pdf
  97. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World Since the 2011 NATO Intervention – Cloudfront.net, accessed September 30, 2025, https://d1y8sb8igg2f8e.cloudfront.net/documents/Proxy_wars_one_pager-v2.pdf
  98. Twenty-First Century Proxy Warfare: Confronting Strategic …, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/a-new-age-of-proxy-warfare/
  99. Engaging non-state armed actors in state- and peace … – ICRC, accessed September 30, 2025, https://www.icrc.org/sites/default/files/external/doc/en/assets/files/review/2011/irrc-883-schneckener.pdf
  100. The role of non-state actors in building human security – Centre for Humanitarian Dialogue, accessed September 30, 2025, https://hdcentre.org/wp-content/uploads/2016/07/The-role-of-non-state-actors-in-building-human-security-May-2000.pdf
  101. Twenty-First Century Proxy Warfare: Confronting Strategic Innovation in a Multipolar World, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare-confronting-strategic-innovation-multipolar-world/rethinking-proxy-warfare/
  102. Twenty-First Century Proxy Warfare – New America, accessed September 30, 2025, https://www.newamerica.org/future-security/reports/twenty-first-century-proxy-warfare/
  103. Timber Sycamore – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Timber_Sycamore
  104. Full article: Disposable rebels: US military assistance to insurgents in the Syrian war, accessed September 30, 2025, https://www.tandfonline.com/doi/full/10.1080/13629395.2023.2183664
  105. America Had Already Lost Its Covert War in Syria—Now It’s Official, accessed September 30, 2025, https://tcf.org/content/commentary/america-already-lost-covert-war-syria-now-official/
  106. Hezbollah–Iran relations – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Hezbollah%E2%80%93Iran_relations
  107. Hezbollah, Hamas, and More: Iran’s Terror Network Around the Globe | AJC, accessed September 30, 2025, https://www.ajc.org/news/hezbollah-hamas-and-more-irans-terror-network-around-the-globe
  108. Understanding Iran’s Use of Terrorist Groups as Proxies – American University, accessed September 30, 2025, https://www.american.edu/sis/news/20240205-understanding-irans-use-of-terrorist-groups-as-proxies.cfm
  109. Iran’s Islamist Proxies in the Middle East – Wilson Center, accessed September 30, 2025, https://www.wilsoncenter.org/article/irans-islamist-proxies
  110. U.S. vs Russian “Hybrid Warfare” Doctrine: A Comparative Glance – Grey Dynamics, accessed September 30, 2025, https://greydynamics.com/u-s-vs-russian-hybrid-warfare-doctrine-a-comparative-glance/
  111. Russia and China Look at the Future of War, accessed September 30, 2025, https://understandingwar.org/research/future-of-war/russia-and-china-look-at-the-future-of-war-2/
  112. Gerasimov doctrine (The Russian “New Generation Warfare … – WARN, accessed September 30, 2025, https://warn-erasmus.eu/glossary/doktrina-gerasimova-rosijska-vijna-novogo-pokolinnya/
  113. en.wikipedia.org, accessed September 30, 2025, https://en.wikipedia.org/wiki/Three_warfares#:~:text=%22Three%20warfares%22%20(Chinese%3A,warfare%20(also%20termed%20lawfare).
  114. Political Warfare against Intervention Forces > Air University (AU …, accessed September 30, 2025, https://www.airuniversity.af.edu/JIPA/Display/Article/4167178/political-warfare-against-intervention-forces/
  115. sites.stedwards.edu, accessed September 30, 2025, https://sites.stedwards.edu/pangaea/the-role-of-social-media-in-the-arab-spring/#:~:text=Social%20media%20helped%20Tunisia%20and,was%20happening%20instead%20of%20organizing.
  116. Social Media And The Arab Spring By Samira F. Hassan A Capstone submitted to the Graduate School Camden Rutgers, The State Univ, accessed September 30, 2025, https://mals.camden.rutgers.edu/files/Social-Media-and-the-Arab-Spring.pdf
  117. Social media’s role in the Arab Spring – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Social_media%27s_role_in_the_Arab_Spring
  118. (Social) Media and Politics and the Arab Spring Moment – IEMed, accessed September 30, 2025, https://www.iemed.org/publication/social-media-and-politics-and-the-arab-spring-moment/
  119. The Legacy of the “Facebook Revolution”: How did the Arab Spring shape citizen use of social media? – King’s Think Tank, accessed September 30, 2025, https://kingsthinktankspectrum.wordpress.com/2025/01/30/the-legacy-of-the-facebook-revolution-how-did-the-arab-spring-shape-citizen-use-of-social-media/
  120. The Influence of Social Media in Egypt during The Arab Spring – SIT Digital Collections, accessed September 30, 2025, https://digitalcollections.sit.edu/capstones/2944/
  121. Internet Research Agency – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Internet_Research_Agency
  122. How Russia’s Internet Research Agency Built its … – -ORCA, accessed September 30, 2025, https://orca.cardiff.ac.uk/id/eprint/122489/1/Political%20Quarterly%20IRA%20Dawson%20&%20Innes.pdf
  123. Fact Sheet: What We Know about Russia’s Interference Operations – German Marshall Fund, accessed September 30, 2025, https://www.gmfus.org/news/fact-sheet-what-we-know-about-russias-interference-operations
  124. “The Tactics & Tropes of the Internet Research Agency” by Renee DiResta, Kris Shaffer et al. – UNL Digital Commons – University of Nebraska–Lincoln, accessed September 30, 2025, https://digitalcommons.unl.edu/senatedocs/2/
  125. Conflict Propaganda in Syria: Narrative Battles – 1st Edition – Oliver – Routledge, accessed September 30, 2025, https://www.routledge.com/Conflict-Propaganda-in-Syria-Narrative-Battles/Boyd-Barrett/p/book/9780367697488
  126. Syrian revolution and the conflict over narratives | SyriaUntold – حكاية ما انحكت, accessed September 30, 2025, https://syriauntold.com/2021/03/19/syrian-revolution-and-the-conflict-over-narratives/
  127. The Battle of the Narratives Around Syria | German Marshall Fund of the United States, accessed September 30, 2025, https://www.gmfus.org/news/battle-narratives-around-syria
  128. How did combatants’ narratives and social media shape Syria’s civil war? | ClarkU News, accessed September 30, 2025, https://www.clarku.edu/news/2024/02/29/how-did-combatants-narratives-social-media-shape-syrias-civil-war/
  129. LESSONS FROM SYRIA’S LOW-PROFILE NARRATIVE WAR, accessed September 30, 2025, https://warroom.armywarcollege.edu/articles/narrative-war/
  130. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns-2/
  131. AI and the Future of Disinformation Campaigns | Center for Security and Emerging Technology – CSET, accessed September 30, 2025, https://cset.georgetown.edu/publication/ai-and-the-future-of-disinformation-campaigns/
  132. Understanding the Impact of AI-Generated Deepfakes on Public Opinion, Political Discourse, and Personal Security in Social Media – IEEE Computer Society, accessed September 30, 2025, https://www.computer.org/csdl/magazine/sp/2024/04/10552098/1XApkaTs5l6
  133. Understanding Offensive AI vs. Defensive AI in Cybersecurity – Abnormal AI, accessed September 30, 2025, https://abnormal.ai/blog/offensive-ai-defensive-ai
  134. Combatting deepfakes: Policies to address national security threats and rights violations, accessed September 30, 2025, https://arxiv.org/html/2402.09581v1
  135. Rising Threat – Deepfakes and National Security in the Age of Digital Deception, accessed September 30, 2025, https://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1078&context=covacci-undergraduateresearch
  136. NSA, U.S. Federal Agencies Advise on Deepfake Threats, accessed September 30, 2025, https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3523329/nsa-us-federal-agencies-advise-on-deepfake-threats/
  137. Crossing the Deepfake Rubicon – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/crossing-deepfake-rubicon
  138. AI-driven disinformation: policy recommendations for democratic resilience – PMC, accessed September 30, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC12351547/
  139. Weaponized storytelling: How AI is helping researchers sniff out disinformation campaigns | FIU News – Florida International University, accessed September 30, 2025, https://news.fiu.edu/2025/weaponized-storytelling-how-ai-is-helping-researchers-sniff-out-disinformation-campaigns
  140. AI-Enhanced Command & Control Systems Transforming Military – Defence Industries, accessed September 30, 2025, https://www.defence-industries.com/articles/ai-enhanced-command-and-control-c2-systems-transforming-military
  141. Enhance command and control with AI and machine learning – Microsoft Industry Blogs, accessed September 30, 2025, https://www.microsoft.com/en-us/industry/blog/government/2023/06/20/enhance-command-and-control-with-ai-and-machine-learning/
  142. Project Maven – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Project_Maven
  143. ECS’ John Heneghan on Supporting NGA’s Maven Program – ExecutiveBiz, accessed September 30, 2025, https://www.executivebiz.com/articles/ecs-john-heneghan-nga-maven-program
  144. Artificial Intelligence as a Combat Multiplier: Using AI to Unburden Army Staffs, accessed September 30, 2025, https://www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2024-OLE/AI-Combat-Multiplier/
  145. United States’ Project Maven And The Rise Of AI-Assisted Warfare …, accessed September 30, 2025, https://defensetalks.com/united-states-project-maven-and-the-rise-of-ai-assisted-warfare/
  146. AI at the Pentagon: How Maven’s CTO Brings AI into Military Operations | IIA @MIT 2025, accessed September 30, 2025, https://www.youtube.com/watch?v=LBUKDhtlOEI
  147. Marine Corps names leadership for Project Dynamis amid push for new AI capabilities, accessed September 30, 2025, https://defensescoop.com/2025/09/23/marine-corps-project-dynamis-ai-leadership/
  148. AI-Enabled Command and Control Systems for Integrated Land, Air, and Sea Operations | by SIAM Student’s Chapter VIT Bhopal | Medium, accessed September 30, 2025, https://medium.com/@siam_VIT-B/ai-enabled-command-and-control-systems-for-integrated-land-air-and-sea-operations-ea27ed86c30d
  149. AI at War: The Next Revolution for Military and Defense | Capitol Technology University, accessed September 30, 2025, https://www.captechu.edu/blog/ai-war-next-revolution-military-and-defense
  150. Artificial intelligence arms race – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Artificial_intelligence_arms_race
  151. Essay: Reframing the U.S.-China AI “Arms Race”: Introduction – New America, accessed September 30, 2025, https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/introduction/
  152. China Is Using the Private Sector to Advance Military AI | Center for …, accessed September 30, 2025, https://cset.georgetown.edu/article/china-is-using-the-private-sector-to-advance-military-ai/
  153. How the US Could Lose the AI Arms Race to China | American Enterprise Institute – AEI, accessed September 30, 2025, https://www.aei.org/op-eds/how-the-us-could-lose-the-ai-arms-race-to-china/
  154. Turkish Drones Disrupting Battlefields: A Case Study of Nagorno …, accessed September 30, 2025, https://wahacademia.com/index.php/Journal/article/download/227/186
  155. Baykar Bayraktar TB2 – Wikipedia, accessed September 30, 2025, https://en.wikipedia.org/wiki/Bayraktar_TB2
  156. The Role of Turkish Drones in Azerbaijan’s Increasing Military Effectiveness: An Assessment of the Second Nagorno-Karabakh War – Insight Turkey, accessed September 30, 2025, https://www.insightturkey.com/articles/the-role-of-turkish-drones-in-azerbaijans-increasing-military-effectiveness-an-assessment-of-the-second-nagorno-karabakh-war
  157. Why lasers might be the answer to invasive drone attacks | DW News – YouTube, accessed September 30, 2025, https://www.youtube.com/watch?v=tFAZmb56ulU
  158. Ethiopian Civil War vs. Ukraine Invasion: Why TB2 Bayraktar Drones Worked For One & Failed The Other – Simple Flying, accessed September 30, 2025, https://simpleflying.com/ethiopia-vs-ukraine-why-drones-worked-failed/
  159. Drone Saturation: Russia’s Shahed Campaign – CSIS, accessed September 30, 2025, https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign
  160. What Iran’s Drones in Ukraine Mean for the Future of War | The Washington Institute, accessed September 30, 2025, https://www.washingtoninstitute.org/policy-analysis/what-irans-drones-ukraine-mean-future-war
  161. David vs. Goliath: Cost Asymmetry in Warfare – RAND, accessed September 30, 2025, https://www.rand.org/pubs/commentary/2025/03/david-vs-goliath-cost-asymmetry-in-warfare.html
  162. Contribution by the International Committee of the Red Cross submitted to the Chair of the Convention on Certain Conventional Weapons (CCW, accessed September 30, 2025, https://docs-library.unoda.org/Convention_on_Certain_Conventional_Weapons_-Group_of_Governmental_Experts_on_Lethal_Autonomous_Weapons_Systems_(2021)/GGE_LAWS_-_June_2021_-_ICRC_-_written_contribution.pdf
  163. Autonomy in weapon systems | SIPRI, accessed September 30, 2025, https://www.sipri.org/research/armament-and-disarmament/emerging-military-and-security-technologies/autonomy-weapon-systems
  164. Autonomous Weapon Systems and International Humanitarian Law: Identifying Limits and the Required Type and Degree of Human–Machine Interaction | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2021/policy-reports/autonomous-weapon-systems-and-international-humanitarian-law-identifying-limits-and-required-type
  165. Compliance with International Humanitarian Law in the Development and Use of Autonomous Weapon Systems: What Does IHL Permit, Pr – SIPRI, accessed September 30, 2025, https://www.sipri.org/sites/default/files/2023-03/ihl_and_aws.pdf
  166. Retaining Human Responsibility in the Development and Use of Autonomous Weapon Systems: On Accountability for Violations of International Humanitarian Law Involving AWS | SIPRI, accessed September 30, 2025, https://www.sipri.org/publications/2022/policy-reports/retaining-human-responsibility-development-and-use-autonomous-weapon-systems-accountability
  167. The road less travelled: ethics in the international regulatory debate on autonomous weapon systems, accessed September 30, 2025, https://blogs.icrc.org/law-and-policy/2024/04/25/the-road-less-travelled-ethics-in-the-international-regulatory-debate-on-autonomous-weapon-systems/
  168. UN and Red Cross join voices against danger of autonomous weapons – Prensa Latina, accessed September 30, 2025, https://www.plenglish.com/news/2023/10/05/un-and-red-cross-join-voices-against-danger-of-autonomous-weapons/
  169. International Committee of the Red Cross (ICRC) position on autonomous weapon systems, accessed September 30, 2025, https://www.cambridge.org/core/journals/international-review-of-the-red-cross/article/international-committee-of-the-red-cross-icrc-position-on-autonomous-weapon-systems-icrc-position-and-background-paper/32AEF7294791D19101D96970E85B0459
  170. ICRC’s Intervention on AI Based Weapon under International Humanitarian Law: A Critical Analysis – UniversePG, accessed September 30, 2025, https://www.universepg.com/public/img/storage/journal-pdf/1728999629_ICRCs_intervention_on_AI_Based_Weapon_under_international_humanitarian_law_a_critical_analysis.pdf
  171. The challenges of AI command and control | European Leadership Network, accessed September 30, 2025, https://europeanleadershipnetwork.org/commentary/the-challenges-of-ai-command-and-control/