April 22, 2025No Comments

The U.S. Quest for Influence in the Arctic Frontier and Greenland

by Marco Dordoni (Arctic Desk)  & Pedro Mendes (US Team)

Introduction

Trump’s second term as President of the United States, has already outlined his key objectives. High on his priorities is the acquisition of Greenland, an autonomous territory under Danish administration. This is not the first time Trump has expressed interest in purchasing Greenland. During his first term, he floated the idea, sparking mixed reactions internationally. Trump described the island as a strategic asset and an economic opportunity due to its abundant mineral resources and its strategic location in the Arctic. However, the Danish government firmly rejected the notion, stating that Greenland was "not for sale." Despite the earlier rejection, the renewed interest in Greenland could stem from the Arctic’s growing significance, both for its untapped natural resources and emerging maritime routes, particularly in the context of climate change and shifting global geopolitics.

This article seeks to examine the strategic interests of the United States in the Arctic—particularly in Greenland—and to trace the evolution of the U.S. Arctic policy over time. It aims to contextualise the resurgence of Trump’s focus on Greenland by analysing both historical developments and contemporary geopolitical dynamics shaping American foreign policy in the region.

The (Un)Frozen Path: U.S. Policy for the Arctic

It is important to analyse the US interest in the Arctic, from a traditional security perspective. As explained in the next section, the proximity of the border with Russia, through the Bering Strait, indicates the need for a greater armed presence, to counter Russia’s growing military activity, as well as the need for strategic dominance in the face of Russia’s ballistic missile range, concurrently with the presence of Russian nuclear submarines in the Kola Peninsula. 

These facts brought to light the strategic potential of the area, Likewise, non-traditional security perspectives point to factors like climate change , which remain beyond the scope of the current article, but may bring a greater flow of traffic to the region, due to the melting of the surrounding ice, which calls for an increased focus on strategic opportunities, like new shipping routes, fibre cables, fishing lanes and raw minerals. 

Current US Administration’s view on the Arctic echoes the former statements about the expansionist danger of Russia and China. Exacerbated by China’s 2018 policy paper, proclaiming itself a “near Arctic State”, China demonstrated interest in the area with initiatives and projects as the “Polar Silk Road”. Despite the dispute over its capabilities and status as an “Arctic State”, Beijing materialized US’s geopolitical fears in the Arctic with this document, positioning itself in the region aiming to challenge the remaining players. 

Policy wise, tracing its origin in 2009, the US’s several documents, like the Arctic Region Policy Directive recognized the Arctic’s strategic importance to American interests, from a security and energy lens. It further led to a greater focus in future documents, as the comprehensive view offered by the 2022 US National Strategy for the Arctic Region and the 2024 DoD Arctic Strategy, which defined the Arctic as critical and prioritized four key vectors: security, climate change, sustainable development, and international governance. 

After years as a footnote in US political priorities, the new American perspective of the Arctic region reacts to the current background. The several stances, policies, documents and increased activity attests to the importance of the region on the geopolitical chessboard.

Why Greenland Matters the U.S. National Security?

In recent years, Greenland has re-emerged as a strategic hub for global security and geopolitical stability. U.S. President Donald Trump notably emphasized this perspective, stating in a recent interview, We really need Greenland for our national security.” This strategic importance encompasses in particular defense and military dimensions but also energy and economic security.

From a defense and military standpoint, Russia’s 2022 invasion of Ukraine significantly reshaped Western strategic priorities, refocusing attention on the Arctic. . Moscow’s military build-up in the region—exemplified by bases such as Nagurskoye, located just 600 miles from Greenland—has heightened concerns in Washington. Greenland’s geographic location has historically been a cornerstone of transatlantic security, serving as a key site for the Distant Early Warning (DEW) Line radar system—based at Pituffik Space base formerly Thule Air Base—and playing a crucial role in anti-submarine warfare due to its strategic position near the Greenland-Iceland-United Kingdom (GIUK) gap.These installations, critical during the Cold War, contributed to NATO's strategic advantage and are once again viewed as essential in countering current threats—namely Russia and, increasingly in Trump’s view, China. The growing Sino-Russian cooperation in the Arctic, extending beyond economic collaboration, further underscores the region's strategic volatility.

Trump has argued that Denmark is ill-equipped to manage these emerging threats, citing its geographic distance from Greenland and limited military capabilities. Furthermore, Greenland's central position in the Arctic makes it increasingly relevant in light of new maritime trade routes expected to open annually due to the melting polar ice cap. Of particular interest to the United States are the Northwest Passage and the Transpolar Route, both of which could place Greenland at the heart of a strategic chokepoint in Arctic navigation.

Greenland has also become a critical focal point in the U.S.–China economic rivalry due to its abundance of strategic resources essential for the global energy transition and for advancing technological capabilities in the defense sector. The island contains 25 of the 34 minerals classified by the EU as Critical Raw Materials, including uranium, cobalt, lithium, and rare earth elements. Estimates suggest that Greenland holds approximately 1.5 million tons of rare earth elements—nearly equivalent to the entire U.S. reserve of 1.8 million tons—thus significantly elevating its value in American strategic planning.

Image by Rolf Johansson from Pixabay

In the context of rising tensions with China, securing access to Greenland’s critical mineral reserves could provide the United States with a significant strategic advantage, especially in the event of a trade conflict over rare earth elements. Nevertheless, substantial challenges hinder the exploitation of these resources. Although Greenland’s autonomous government controls its mineral rights and has expressed openness to foreign the territory suffers from severe infrastructure deficiencies—including a lack of roads and ports—which severely constrain mining operations. The typical timeline to open a new mine can extend up to 16 years, deterring many potential investors

As reported by the Financial Times, currently only one U.S. company holds an exploration license in Greenland, in contrast to 28 licenses held by Canadian and British firms. While the Greenlandic government remains eager to attract foreign investment, high operational costs and logistical challenges have slowed development efforts. Consequently, despite its vast strategic and economic potential, much of Greenland’s resource wealth remains largely untapped.

Reflections and recent developments

The U.S. interest in Greenland, exemplified by Trump’s proposal to acquire the island—whether through economic means or other strategies—reflects a broader shift in international relations. Although firmly rejected by Denmark and the Greenlandic government with the slogan “Greenland is not for sale, and never will be,” the episode highlights how economic and strategic interests of major powers are increasingly challenging long-established principles of international law, such as territorial sovereignty and the inviolability of national borders. Washington’s focus on Greenland extends beyond the Trump presidency and is part of a larger Arctic strategy, driven by military considerations and the region’s vast reserves of minerals and hydrocarbons. 

The general elections held on March 11, followed by negotiations that led to the formation of a new Greenlandic government, reaffirmed existing U.S. concerns and pressures. In response to mounting American efforts to acquire or exert military influence over Greenland, the majority party, Demokraatit—a moderate social-liberal party—opted to form a broad national unity coalition, securing 75% of the parliamentary seats. One of the coalition’s first actions was the release of a joint statement strongly condemning and opposing the repeated U.S. pressure directed at Greenland.

Despite Greenland's unified and firm response, U.S. interest and pressure have not subsided. Following President Trump’s remarks on the potential annexation of Greenland during his meeting with the NATO Secretary General, U.S. Vice President Vance conducted an official visit to the U.S. Space Base at Pituffik on March 29. During the visit, Vance reiterated Greenland’s strategic importance not only for U.S. national security but also for the security of Europe. He emphasized Denmark’s lack of preparedness and its inability to provide adequate defense capabilities for the island, arguing that this shortfall endangers both American and European citizens in the face of threats posed by Russia, China, and other actors.

The U.S. strategy appears to be clear: emphasize the importance of international security and highlight Greenland’s strategic significance in this context, positioning the American security umbrella as the only power capable of providing adequate protection—not only for Greenland and U.S. citizens, but also for European allies. This narrative underlines Denmark’s alleged unpreparedness and inability to ensure such security.

In this regard, the U.S. is likely to support Greenland’s path toward independence, with the aim of later offering military and economic protection. This approach leverages NATO’s limited engagement on the issue—an area still significantly influenced by the strategic direction set by the White House. —and the European Union’s current phase of redefining and reassessing its external action.

April 14, 2025No Comments

AI and Autonomous Weapons: How Tech Firms Are Transforming Global Defence

By Idriss El Alaoui Talibi, Mahssan Afzali, & Michele Mignogna - Defence and Procurement Desk


Introduction

While early forms of autonomous weapons systems (AWS) have existed for decades, the integration of artificial intelligence (AI) has pushed these technologies beyond simple automation, making them more independent, adaptive, and more lethal than ever before. A groundbreaking innovation or a dangerous gamble?

AWS, defined as military systems or “weapons that select and apply force to targets without human intervention” by the International Committee of the Red Cross (ICRC), are no longer futuristic concepts, but rather on-field realities. 

Applications on the Field

Recently, several uses of AI-driven weapons have been recorded in both Ukraine and Gaza, further underscoring how modern battlefields are undergoing a fundamental shift. These incidents signal the dawn of an era where machines transcend their traditional roles as tools and become active combatants.

While Ukraine has leveraged AI-driven drone swarms for reconnaissance and precision strikes, Israel has, in turn, deployed systems such as “Lavender” or “Gospel” in bombing campaigns in Palestine. These battlefield realities embody this shift toward machine-driven decision-making in warfare, hinting at a future where AWS plays decisive roles in combat scenarios, raising several ethical, legal, but also strategic concerns. 

The Third Revolution in Warfare

This shift, often called the “third revolution in warfare,” is being driven by rapid advancements in AI. As the global race for AI dominance intensifies—especially between the U.S. and China—its impact is reaching far beyond the social and economic realms, reshaping military power and defense strategies.

With innovation largely led by the private sector, governments are no longer the primary drivers of technological change. Instead, they must adapt—either by cooperating with or controlling tech firms. The U.S. and China represent two competing models: one focused on aligning public and private innovation, the other on centralising power under a single-party state. How these models perform will shape future global power dynamics and success on the battlefield. 

As said, at the heart of this revolution is the private sector, which is rapidly transforming the defence landscape, and its players. Traditionally, military technology was dominated by established defence contractors such as Lockheed Martin, Boeing, or BAE systems. However, lately, a new wave of tech-driven defence firms is challenging this status quo. Indeed, according to groundbreaking reports from the U.S., Palantir, Anduril, OpenAI, and SpaceX have formed a consortium to bid for defense contracts, leveraging their cutting-edge technologies to introduce AI-enhanced military capabilities to the defense industry. Recent data shows that between 2019 and 2022, U.S. military and intelligence agencies awarded major tech companies contracts worth at least $53 billion. Altogether, these firms aim at offering more agile and cost-effective solutions, potentially, reshaping, not only, modern warfare, but also the industry of defence.

The Involvement of Tech Companies

​Tech companies are driving innovation at a pace that traditional defence contractors struggle to match. For example, Skydio, a San Francisco-based startup, has developed autonomous drones utilising artificial intelligence to execute missions without GPS. On the other hand, collaborations between OpenAI and Anduril Industries aim to integrate advanced AI technologies into military systems to enhance capabilities such as countering drone threats. This contribution, by nature, has resulted in vigorous competition in the pursuit of profit maximization and market dominance in defense technologies. Tech firms are increasingly engaging in defense contracts to expand their market presence. For instance, companies like Palantir and Anduril along with SpaceX and OpenAI are in pursuit of Pentagon contractswhile Skydio has secured significant contracts with the U.S. Department of Defense and its allies

Screenshot

But regardless of their significant effect on military capabilities, these innovations can lead to reduced government control and therefore a cause for concern for national security. According to the World Economic Forum, non-state actors can convert civilian devices, like commercial drones, into lethal AW using open-source AI and lightweight processing. Once such software is adapted for military purposes, its global dissemination becomes challenging to control. 


Additionally, the deployment of AWS has its own ethical complications. A central concern is the delegation of life-and-death decisions to machines without meaningful human control, especially when adhering to principles of distinction and proportionality under International Humanitarian Law. There is growing concern over the ability of these systems to effectively differentiate between combatants and non-combatants and to assess the proportionality of an attack. More complicated would be situations in which AI has picked up biases from underlying data sets and may wrongly determine who a legitimate target is based on factors including gender, age, race, and ability.

Conclusion

The integration of AI and AWS is ushering in a new era of warfare—one increasingly shaped not by governments alone, but by private tech companies whose innovation cycles far outpace traditional defence procurement models. This shift presents both unprecedented opportunities and complex challenges. On the one hand, firms like Palantir, Anduril, SpaceX, OpenAI, and Skydio are redefining what is technologically possible on the battlefield. On the other hand, their growing role in national security raises urgent questionsabout control, accountability, and ethical use.

As the arms race in AI intensifies—particularly between the U.S. and China—it is not only state power but industrial ecosystems that will determine strategic advantage. The success of future military operations may depend less on the quantity of traditional assets and more on the ability to harness real-time data, autonomous systems, and AI-enhanced decision-making. This transforms procurement priorities, requiring defence institutions to adapt procurement frameworks, ensure effective oversight, and navigate a landscape where innovation is driven by market incentives rather than strategic necessity.

If left unchecked, the proliferation of AWS could destabilize existing deterrence models and accelerate a global arms race where lethal capabilities are deployed with reduced human oversight. Conversely, responsible integration—backed by clear policy, ethical safeguards, and intergovernmental coordination—could enhance operational effectiveness while maintaining international legal and moral standards.

Ultimately, the battlefield of tomorrow is being built today—not only in labs and war rooms, but in boardrooms, investment rounds, and strategic alliances between governments and the private sector. The question is no longer if tech companies will reshape global security, but how states will respond to remain in control of it.

March 26, 2025No Comments

The Security Landscape of South Asia: A Country-Wise Analysis

by Arslan Sheikh, Ido Raz, Quanita Khan, & Sabur Shah - South Asia Desk

Introduction

The countries of Afghanistan, Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan and Sri Lanka are all located in South Asia. The sub-region holds immense geopolitical significance at a global scale, characterised by its diverse political structures, economic interdependencies, and security complexities. The region’s security architecture is shaped by traditional geopolitical concerns, including military conflicts, border disputes, and threats of nuclear deterrence, as well as non traditional threats such as climate change, cyber vulnerabilities, terrorism, and transnational crime.

In this study, we will examine and discuss the security situation in each South Asian country within the context of existing international security frameworks and treaties from the United Nations Security Council (UNSC), the South Asian Association for Regional Cooperation (SAARC), and the Shanghai Cooperation Organization (SCO). 

Afghanistan

Afghanistan’s security landscape remains precarious following the return of the Taliban to power in August 2021, leading to international concerns over governance and regional stability. Following accusations of human rights violations of women and minorities, the new regime faces recognition issues from the international community. Due to its strategic location, Kabul’s internal security challenges are problematic for South and Central Asian countries. For instance, the expansion of the Khorasan branch of the Islamic State (ISIS-K) in Afghanistan since the Taliban takeover led to serious concerns in many capitals over cross-border terrorism leakage, either through physical attacks or through radical propaganda. In addition, the harboring of other militant groups, such as the Tehrik-e Taliban Pakistan (TTP) and Al-Qaeda, increases regional tensions and international distrust of Kabul.

Afghanistan, under Taliban rule, faces a severe humanitarian crisis characterized by the systematic exclusion of 2.5 million girls from education beyond sixth grade and 1.1 million women from universities. The maternal mortality rate is alarmingly high at 622 deaths per 100,000 births, while tensions along the Durand Line with Pakistan create ongoing instability. Approximately 8 million Afghans have fled the country, with thousands perishing during migration attempts. The country continues to be a focal point for international security cooperation, mainly through the UN Assistance Mission in Afghanistan (UNAMA) and multilateral counterterrorism frameworks.

Afghanistan faces severe food insecurity and an economic crisis exacerbated by international sanctions and humanitarian constraints. Additionally, environmental degradation and internal displacement contribute to the region’s broader security challenges.

Bangladesh

Due to a recent change in leadership, Bangladesh is still politically vulnerable and has effectively mitigated internal security risks through counterterrorism measures in coordination with regional security frameworks. However, challenges persist in managing sporadic border tensions with Myanmar and India, requiring continued diplomatic engagement and cross-border management strategies.

From a nontraditional security perspective, Bangladesh is one of the most climate-vulnerable countries with rising sea levels threatening coastal communities and agricultural production. Additionally, the Rohingya refugee crisis continues to strain national resources, necessitating sustained international support from organizations such as UNHCR and the International Organization for Migration (IOM).

Bhutan

Bhutan maintains a stable security environment but remains engaged in boundary negotiations with China, which has significant implications for its economic relations with India. The country upholds a policy of strategic neutrality and actively participates in regional security initiatives under SAARC.

Bhutan faces non-traditional security concerns in its fiscal deficits,  climate disasters, and food production scarcity. Due to minimal refinancing and exchange rate risks from the loans it took from India,  Bhutan is facing a hydroelectric debt. The country experiences a high seismic activity as it is located in the Himalayan mountains — between the Indian and Eurasian tectonic plates. As an area prone to earthquakes and floods, agricultural loss makes food production relatively hard. Bhutan has growing concerns over climate change, particularly the impact of glacial melt on hydropower generation. Bhutan’s proactive environmental policies align with global frameworks such as the Paris Agreement, yet external climate pressures remain a persistent challenge.

India

India’s security posture is shaped by its border tensions with Pakistan and China, particularly in Jammu & Kashmir, Aksai Chin, and Arunachal Pradesh, with ongoing disputes over territorial claims.

As the largest military power in South Asia, India prioritizes defense modernization, strategic deterrence, and maritime security, particularly through multilateral frameworks such as the Quadrilateral Security Dialogue (Quad).

Beyond conventional threats, India faces significant non-traditional security challenges, including escalating cybersecurity risks. Additionally, climate change-induced glacier melt continues to threaten regional water security and disrupt food supply chains, exacerbating existing vulnerabilities.

Maldives

The Maldives is a key player in Indian Ocean security, balancing relations between India and China while addressing maritime security challenges such as illegal fishing and transnational crime. Its participation in the Indian Ocean Rim Association (IORA) underscores its commitment to regional stability.

Climate change represents an existential threat, with rising sea levels endangering national infrastructure and livelihoods. The Maldives seeks financial and technological support from initiatives like the Global Climate Fund (GCF) to enhance climate resilience

Source: Photo by Lara Jameson.

Nepal

Nepal’s security considerations are influenced by its geographical positioning between India and China. Border disputes with India and China and economic dependencies shape its strategic outlook, necessitating a balanced foreign policy approach.

Nepal is highly vulnerable to earthquakes and glacial retreats, both of which threaten national infrastructure and water security. The rapid loss of Himalayan glaciers poses severe risks to downstream populations reliant on water reserves, emphasizing the need for sustainable disaster management policies.

Pakistan

Pakistan’s security landscape remains dominated by tensions with India over Kashmir, coupled with national security threats posed by terrorism. The exchanges of cross-border airstrikes with Iran and Afghanistan have further caused regional political instability and a degradation of diplomatic dialogue. Afghanistan, under the Taliban regime, has targeted areas in Pakistan’s Balochistan and Khyber Pakhtunkhwa. Moreover, it is accused of allowing and supporting cross-border attacks from Afghanistan inside Pakistani soil by the TTP and various militant groups. In response to the Afghan-based attacks, Pakistan conducted several airstrikes aimed against the TTP military posts in North Waziristan, which have increased tensions between the two neighbors. Other militant groups, such as the Balochistan Liberation Army (accused of being supported by India—India has officially denied such allegations, and no verifiable evidence has been presented to confirm these claims)—leverage Islamabad’s security problems in an attempt to damage valuable economic projects to further increase security instability in the country. Islamabad is engaged in counterterrorism efforts under the Financial Action Task Force (FATF) to combat illicit financial networks and cooperate with South and Central Asian countries' counterterrorism institutes. 

Water scarcity and economic instability further exacerbate Pakistan’s security challenges. As a low-income country, Pakistan is highly dependent on agricultural production. With growing climate vulnerabilities, the country remains dependent on external assistance and multilateral economic interventions. Pakistan remains the 5th most vulnerable country on the Global Climate Risk Index. 

Sri Lanka

Despite the end of its decades-long civil war, ethnic and religious tensions continue to pose security risks. The 2019 Easter bombings highlighted the ongoing threat of Islamist extremism in the country. Political instability, coupled with post-war reconciliation challenges, remains a concern.

Sri Lanka is currently grappling with a severe financial crisis, which has led to widespread economic instability. Additionally, the country faces the impacts of climate change, with coastal erosion and shifting monsoons threatening agriculture and food security.

Conclusion

South Asia's security landscape is complex, balancing traditional threats such as geopolitical conflicts and non-traditional risks like climate change and cyber threats. Addressing these requires regional cooperation, policy innovation, and sustainable security frameworks. The new ITSS South Asia team will attempt to address the following challenges while suggesting proper solutions the international community could employ to mitigate them. 

March 20, 2025No Comments

Italy’s Geopolitical Tightrope: Meloni’s Leadership, EU Dynamics, and the Transatlantic Balancing Act


By Christian Gaole & Alberto Trame - Italy Desk


Meloni's Geopolitical Challenge: Bridging Continents, Balancing Powers


Italy occupies a pivotal yet precarious position in today’s global landscape, straddling its deep-rooted commitments to the European Union (EU) and its long-standing transatlantic partnership with the United States (US). Under Prime Minister Giorgia Meloni, who has led the country since October 2022, Italy faces a confluence of geopolitical risks, security challenges, and strategic opportunities. As a Mediterranean nation, Italy serves as a bridge between Europe and Africa, a role that amplifies both its vulnerabilities and its potential. Meloni’s leadership, marked by a blend of pragmatism and ambiguity, is central to navigating this complex terrain. This article examines Italy’s geopolitical risks, security issues, and opportunities within the EU and in relation to its transatlantic ties, spotlighting Meloni’s role in shaping the nation’s path forward.


Italy’s Geopolitical Risks: NATO, Ukraine, and Economic Strain


Italy’s geopolitical risks stem from its position within a fracturing NATO alliance, economic pressures exacerbated by global shifts, and domestic political instability. The ongoing war in Ukraine has strained NATO’s cohesion, with differing views among members on how to respond to Russia’s aggression. Italy, a founding member of the alliance, has aligned itself with the Western effort to support Ukraine through military aid and sanctions. However, this stance places it at odds with internal coalition dynamics and economic realities. The conflict has driven up energy costs and disrupted trade, hitting Italy’s export-driven economy hard. Reports indicate a significant GDP decline, with the burden of supporting Ukraine adding to fiscal woes at a time when Italy’s public debt remains among the highest in Europe.


Economic challenges are further intensified by external pressures. The EU’s push for rearmament, aimed at bolstering defenses against potential Russian threats, demands increased military spending from member states. Italy, currently spending below NATO’s 2% GDP target, faces calls to ramp up its defense budget. This comes as the country grapples with the fallout from potential US tariffs, which could target Italian exports like machinery and luxury goods, vital to its economic stability. These economic strains test Meloni’s ability to maintain national unity while meeting international obligations, a task complicated by the fragile coalition she leads.


Domestically, political instability poses a significant risk. Meloni heads a right-wing coalition that includes parties with divergent views on foreign policy. Her deputy, Matteo Salvini, has often leaned toward populist and nationalist rhetoric, occasionally clashing with EU directives and NATO’s unified stance. This internal discord threatens to undermine Italy’s ability to project a coherent foreign policy, weakening its influence in Brussels and Washington. Meloni must tread carefully to hold her government together, balancing coalition demands with the need to assert Italy’s role on the global stage.


Security Issues: Mediterranean Vulnerabilities and EU Dependence


Italy’s security challenges are most pronounced in the Mediterranean, a region that encapsulates its strategic importance and its vulnerabilities. The sea serves as a conduit for migration from North Africa, a persistent issue that has fueled domestic political debates and strained Italy’s resources. Alongside migration, the Mediterranean is a hotspot for terrorism and a critical artery for energy supplies, with Italy heavily reliant on gas pipelines and maritime routes. These threats demand a robust security framework, yet Italy often finds itself shouldering the burden with limited support from its EU partners.


The EU’s fragmented approach to Mediterranean security exacerbates Italy’s challenges. Northern member states tend to prioritize eastern threats, like Russia, over southern concerns, leaving Italy to advocate alone for greater focus on migration and regional stability. Meloni has sought to elevate Italy’s role as a Mediterranean power, pushing for EU- wide policies to address these issues, but progress remains slow. This north-south divide within the EU underscores a broader problem: the bloc’s lack of strategic autonomy. Dependent on the US for defense through NATO, the EU struggles to act independently, a dynamic that leaves Italy exposed to shifts in American priorities.


The transatlantic relationship, while a cornerstone of Italy’s security, introduces its own risks. The US has long provided the backbone of NATO’s military might, but potential changes in American leadership — particularly a return to a more isolationist or transactional stance — could disrupt this arrangement. Such a shift would force Italy and other European nations to increase defense spending, a daunting prospect given Italy’s economic constraints. Moreover, a reduced US presence in Europe could embolden adversaries, heightening security risks in the Mediterranean and testing Italy’s ability to respond effectively.


Opportunities: The Piano Mattei and Transatlantic Leverage


Amid these challenges, Italy has opportunities to strengthen its geopolitical standing, notably through the Piano Mattei, a strategic initiative spearheaded by Meloni’s government. This plan seeks to deepen ties with Africa and the Indo-Pacific, positioning Italy as a key player in fostering economic and security partnerships. Unlike traditional aid models, the Piano Mattei emphasises mutual benefit, aiming to address migration and energy security at their roots while opening markets for Italian firms. By leveraging its geographic proximity and historical connections to Africa, Italy could secure alternative energy sources and reduce dependence on volatile suppliers, all while enhancing its influence in a region of growing global importance.

Source: President of the Council of Ministers Giorgia Meloni at the Meeting of the North Atlantic Council -licence


The success of this initiative, however, depends on international backing, particularly from the US. As a superpower with interests in countering China’s expansion in Africa, the US could view the Piano Mattei as a complementary strategy, offering political and economic support to amplify Italy’s efforts. Meloni has worked to strengthen Italy’s transatlantic ties, recognising that American endorsement could unlock resources and credibility for her ambitious plan. This alignment also positions Italy to benefit from US priorities within NATO, such as maintaining stability in the Mediterranean and supporting broader Western interests.


Italy’s transatlantic relationship offers additional leverage within the EU. By aligning closely with the US, Italy can enhance its stature as a reliable partner, potentially gaining greater sway in shaping NATO and EU policies. This is particularly valuable in the Mediterranean, where Italy’s security concerns align with American strategic goals, such as countering terrorism and securing energy routes. Meloni’s government could use this partnership to push for a more balanced EU security agenda, one that addresses southern challenges as seriously as eastern ones, thereby reinforcing Italy’s role as a bridge between continents.


Meloni’s Role: A Balancing Act Amidst Complexity


Giorgia Meloni’s leadership is defined by her ability to navigate this intricate web of risks and opportunities. Her approach often hinges on strategic ambiguity, a tactic that allows her to adapt to shifting dynamics without fully committing to any single path. Within the EU, she balances Italy’s obligations — such as supporting Ukraine and increasing defense spending — with domestic calls for economic relief and sovereignty. In the transatlantic sphere, she cultivates a strong relationship with the US while preparing for potential changes in American policy that could alter Italy’s security calculus. This balancing act is not without its challenges. Meloni’s coalition remains a weak link, with internal tensions threatening to derail her agenda. Salvini’s influence, for instance, pulls the government toward a more Euroskeptic stance, complicating efforts to deepen EU integration or meet NATO commitments. Economically, Meloni faces the daunting task of reviving Italy’s growth while contending with external pressures like US tariffs and EU rearmament costs. Her ability to implement the Piano Mattei hinges on maintaining domestic stability and securing foreign support, a tall order given these constraints.


Meloni’s leadership is also shaped by the broader transatlantic context. The US remains Italy’s most critical ally, but its future direction introduces uncertainty. A potential return to a more pragmatic, America-first policy could align with Meloni’s conservative platform — particularly on issues like migration and energy — but it might also reduce US engagement in Europe, forcing Italy to shoulder more responsibility. Meloni must position Italy to benefit from American support while preparing for scenarios where that support wanes, a delicate dance that requires foresight and flexibility.


Conclusion: Navigating Uncertainty with Strategic Foresight


Italy stands at a crossroads, its geopolitical risks and security challenges matched by significant opportunities. The war in Ukraine, economic strains, and Mediterranean vulnerabilities test the nation’s resilience, while the Piano Mattei and its transatlantic ties offer paths to greater influence. Giorgia Meloni’s leadership is pivotal in this equation, her ability to balance domestic pressures with international demands determining Italy’s trajectory.


To secure Italy’s future, Meloni must harness strategic foresight, leveraging the country’s unique assets — its Mediterranean position, historical ties, and EU membership — to carve out a stronger role in a multipolar world. The Piano Mattei could redefine Italy’s relationship with Africa and beyond, while a robust transatlantic partnership could bolster its security and economic prospects. Yet, success requires adaptability, as Italy navigates the uncertainties of EU cohesion, US policy shifts, and coalition politics. With careful stewardship, Italy can transform its challenges into strengths, ensuring its place as a key player in an evolving global landscape.

March 10, 2025No Comments

The Future of Multilateralism: A New Era Under Trump’s America?

By Clémence Van Damme & Pedro Mendes - The US Desk

Introduction 

    According to John Ruggie, multilateralism refers to coordinating relations between three or more states by certain principles. He argues that NATO was predicated on two multilateralist principles, the indivisibility of threats to the collective (response irrespective of the attacker) and “diffuse reciprocity” (members expecting a rough equivalence of benefits over time). The same NATO now doubts the American commitment to respond. 

    These shared principles appear to be changing with the Trump administration. The signing of an executive order on February 4th, to review all current multilateral organisations, and determine whether American support should be withdrawn, marks the “America First” rhetoric, which saw a withdrawal of the Paris Climate Agreement, the World Health Organization, concurrently with USAid’s large cut in funding. Ultimately, are we witnessing a shift in foreign policy or a schism in American multilateralism? 

    The Erosion of Multilateralism Under Trump 

    The signing of this executive order, originated from an alleged drift from the agency's original mission, contrary to the interests of the US and its allies. In light of the broader political context, this change in stance gives rise to an increased criticism of multilateral agreements. 

    Trump’s criticism of multilateralism concerns three aspects; international organisations infringing on American sovereignty (regardless of its voluntary involvement and consistent with the Constitution), the restriction of the US’s freedom of action (in contrast with the predictability and trade-offs of the collective effort), and the cost of this multilateral involvement, which is the subject of much debate. 

    Policy-wise, the once-held belief of Ukraine’s Victory being vital, is being shattered by sharp criticism of Ukrainian leadership, the demands for a swift end to hostilities, and a semblance of peace. The possibility of a narrative that grants Russia a chance to turn the context into a political victory, undermines the “Western” model and denotes its failures. However, the latest diplomatic developments with Ukrainian leadership might even prompt Russia to escalate the conflict and risk paving the way for revisionist adversaries to challenge American primacy with renewed vigour. 

    What this means to the LIO (liberal international order) is a constant challenge to some of its core characteristics, namely, free trade and open markets being contested by tariffs, a US-led “Western” perspective permeating institutions, and organisations, being opposed by an aggressive pursuit of “vital interests”, and the political exceptionalism of the US, “the city atop a hill”, contrasting with a more unilateralist, nationalist, realist pursuit of political goals, albeit, far from isolationist. 

    Case Study: US Withdrawal from the World Health Organisation

    On January 20, 2025, the White House issued an executive order announcing the US withdrawal from the World Health Organisation (WHO). Donald Trump announced his intent to leave in July 2020 based on several concerns: the WHO’s handling of the COVID-19 pandemic, its failure to implement crucial reforms, and its lack of independence from political influence. He also cited what he called « unfairly onerous and out of proportion » financial demands.

    As the largest financial contributor, providing 34% of the WHO’s $6.8 billion budget for 2024-2025, the US’s departure threatens critical operations, including the WHO’s health emergencies program. US funding accounts for up to 40% of its operations, forming a critical « backbone » for emergency health responses in conflict zones. Additionally, specialised initiatives such as polio eradication and tuberculosis treatment face uncertain future.

    Moreover, Washington’s move will undermine US diplomatic influence. It will limit its ability to engage with nations, especially those with strained political relations, through health initiatives, ultimately risking to harm long-term security, economic interests, and geopolitical stability. This power vacuum paves the way for nations to expand their influence in global health governance. By shaping international norms in its favour and leveraging health diplomacy, countries like  China can strengthen bilateral partnerships.

    In addition, Trump’s withdrawal has strained transatlantic relations, as European nations, like Germany, view this decision as a retreat from multilateral cooperation, prompting European leaders to reconsider US leadership in global health. Furthermore, this decision sets a precedent for other right-wing governments, such as those in Argentina and Italy, which have also cited their intent to leave.

    Source: Image by Gerd Altmann from Pixabay (URL:https://pixabay.com/photos/trump-president-usa-america-flag-2546104/ )

    The implications of Trump’s exit exacerbate the broader decline of multilateral cooperation, reinforcing a pattern of disengagement from international agreements such as the Paris Climate Accord and the UN human rights body. This has been viewed by several observers as indicative of the US’s shift toward unilateral policies, reducing its participation in global health efforts, and further isolating it on the international stage.

    Washington has however pursued alternative bilateral agreements, such as its recent health cooperation initiative with India. This signals an effort to maintain strategic influence in global health while shifting away from multilateral frameworks.

    Conclusion: What Comes Next? 

    The change in American foreign policy within the Trump administration poses a great challenge to the multilateral order established after WWII. The US withdrawal from multilateral organisations represents a profound shift towards focused bilateral relations and transactional diplomacy, where national interests are given precedence over the principles set for cooperation. Such drastic changes, however, have deep repercussions, ranging from the global impact on health security to diplomatic soft power, and international relations as a whole. 

    All these considerations beg the question of how likely a return to multilateralism in future administrations is, and why would that approach be justified, given the damage caused by withdrawing from treaties and organisations. Trust in US commitment to these frameworks has been eroded, and other challengers have taken America’s leading role in the international arena. Such policies may change, but the amount of time China and other countries have had to set normative behaviour and relationships to fill the gap left by America’s absence makes the need to reconsider how the objectives of multilateral policies have shifted.  

    This draws attention to one of the most important problems which is: Can effective global governance exist without consistent American leadership, or are we witnessing the emergence of a new multipolar system with competing spheres of influence?

    February 26, 2025No Comments

    EU’s bottlenecks and opportunities for further defence integration

    by Eline Stensen Gulliksen - UK & European Desk

    Introduction

    Increased geopolitical tensions caused by a war on the European continent and the re-election of Donald Trump, a NATO sceptic, as president of the United States have brought the question of the EU's military capabilities back to the agenda. America has been a well-recognised backbone of European security through NATO; however, recent discussions concerning the need for a “stronger Europe” with more capabilities have arisen. The Common Security and Defence Policy (CSDP) is the umbrella that covers EU defence matters, and the European Defence Agency (EDA) is a body under the CSDP aiming to improve the defence capabilities of the EU by coordinating efforts with member states. This blog article will examine some structural bottlenecks that the EU needs to face on their way to the strategic autonomy it has longed for.

    Challenges and opportunities for further EU defence cooperation.

    The EDA's work coordinating efforts between member states has numerous positive effects for member states and the EU. Firstly, this joint procurement will make spending more effective and, hence, more targeted, enabling member states to spend better. This can further lead to more specialised military equipment and innovation. Initiatives the EDA has launched, such as permanent structured cooperation (PESCO) and the new project on hybrid drive trains for military vehicles launched on December 11th 2024, show a positive trend towards cooperation on EDA projects with positive outcomes.

    The EDA assists member states' militaries in collaborating effectively, maintaining “open doors” for cooperation among two or more states. This can help prevent the emergence of different systems that create bottlenecks for efficient collaboration in areas such as information sharing and the ability to manage one another's weapon systems when it is necessary to coordinate actions, either through CSDP or NATO missions where EU states are to take the lead. Although efforts and initiatives through the EDA, such as PESCO, have been launched to help EU member states coordinate efforts more effectively to increase the capabilities of the CSDP, some structural bottlenecks need to be addressed. Integrating defence projects and industries can be tricky due to the intergovernmental nature of the CSDP in the EDA. Projects depend on member states’ initiatives and willingness to cooperate on these matters, as defence and military are core interests to sovereign states due to the anarchic nature of the international system. States may be cautious about further integrating within these areas because of security implications.

    Building on the above, the diverging national interests of member states based on various aspects such as geography, resources, threat perception and strategic culture create differences among states' willingness to enter EDA projects. Another aspect that needs to be considered is the EU’s reliance on the United States. As long as many EU states see the US as a security guarantor, it does not incentivise member states to increase the military capabilities of the EU. However, with Donald Trump's recent election as President of the United States, the EU should re-evaluate this idea and strive for more autonomy, especially after the Munich security conference where tensions with the US developed further, and now, as discussions arise about negotiating a peace deal between Russia and Ukraine, and the EU does not have a seat at the table.

    The EDA has numerous opportunities if member states align and integrate properly and effectively through joint projects. The EU has a strong political will, and increasing its capabilities through the EDA will make it a more credible actor in the international system and make it more autonomous in its neighbourhood, which is precisely what the EU needs in these critical times. With a more “capable” CSDP through EDA projects, the EU could finally get the strategic autonomy it has longed for and cut reliance on the US as a security guarantor while balancing them, which would reverse the security implications of the US threatening to leave NATO. Improving the EU´s crisis response could be a massive opportunity for the EU, further building on the credibility of the EU in the international system. Looking at when EU states, France and the UK (the UK left the EU in 2020) were to take the lead in the 2011 NATO-led operation in Libya, it clearly showed the weaknesses of the EU to act autonomously in its neighbourhood due to a divergence in systems and a lack of capabilities. If EU member states coordinate efforts through EDA initiatives, this could provide great opportunities for the EU’s actorness.

    Flag of Ukraine in liberated Kherson - rawpixels.com

    Potential threats that successful EDA cooperations could face include friction with NATO. Further defence integration between EU states and increasing the capabilities of the EU could be seen as undermining NATO, which could further affect the EU’s relationship with the US. Therefore, the EU needs to have close dialogues with the US as they are improving its capabilities. Divergence in member states' economies in the EU could lead to budgetary constraints and inequitable burden-sharing between member states. This could create fragmentation between EU member states since the EDA projects are “volunteer” and create inefficiency and potential new problems for the EU to face internally. 

    Conclusion

    Concluding this blog article, a recommendation is for the EU to cooperate closely with NATO, especially the US, through the processes of EDA projects. Keeping NATO and the US in the loop could prevent friction with crucial powers and security guarantors on Europe´s way to gaining more autonomy. As mentioned earlier in this article, a structural bottleneck for successful projects is the intergovernmental nature of the CSDP and the EDA. A recommendation is, therefore, to make more projects mandatory for all EU member states and have a set percentage of GDP that each country should contribute to prevent friction over burden-sharing internally.

    February 13, 2025No Comments

    The Entrance of the Gulf States to the Global Space Race

    by Alice Elizabeth Strophair - Middle East Team 

    Introduction 

    Space exploration has historically been dominated by the USA and the USSR. It was one of the many arenas in which they competed to demonstrate their superiority. Today, although the USA and Russia are still major players in space exploration, they have been joined by a host of other countries. China and India immediately come to mind with their recent space initiatives. However, the Gulf states have also started to demonstrate their ambitions. At first, the Gulf states investment in the space sector was limited and inconsistent, but recently their space programmes and policy have been included in broader initiatives such as national plans - Saudi Arabia’s Vision 2030 plan, the UAE 2031; Qatar National Vision 2030; and Oman’s Vision 2040. For the UAE this has included, in 2023, sending their first astronaut, Sultan Al Neyadi, into space, completing “the longest ever Arab space mission”The Gulf states' significant investments in the commercial space sector has been part of a broader strategy to diversify their economies, build national cohesion, and develop their national branding. In addition, in the 21st century, the notion of military power has also been redefined by new technologies, including space-based assets. Gulf states are aware of their geostrategic position and consequently are competing among themselves to become regional leaders in space programmes and advanced technologies. 

    The Need for Economic Diversification

    Over the past century, the Gulf states have built their economy through the exploitation of their natural resources, mainly oil and gas. As a result, their GDP per capita has been second-to-none: Qatar $119K, the UAE $82K, Bahrain $67K, and Saudi Arabia $66K. However, in the future, their economies could be jeopardised by factors such as the reduction of crude oil prices (due to the development of fracking and shale gas), the global shift toward renewable energy (as concerns over climate change increase), and, ultimately, the depletion of their natural resources. Although powerful relative to their size and population, the Gulf states are rentier states, and represent the most oil-dependent countries in the world. Their investment in the space sector is an important part of their ongoing economic transition to address these factors.

    The UAE has established a national space agency (2016-2022), which is aimed to create “a vibrant commercial space sector.” To that end, the UAE has  launched several funding campaigns: the “Space Means Business” campaign, the Emirates Mission to the Asteroid Belt (EMA), and the National Space FundThese campaigns generated more than $800 million (USD) for “groundbreaking programs [supporting] international and Emirati companies cooperating in space-sector engineering, sciences, and research applications” - and the Space Economic Zones Program “intended to support space startups and other small- and medium-sized enterprises”. 

    In 2016, as part of its economic diversification strategy, Saudi Arabia unveiled its Vision 2030 plan. The plan seeks to achieve Saudi Arabia's energy transition goals via the development of a competitive commercial space sector. In 2018, Saudi Arabia set up its own space agency, which, in 2022, was followed by the Saudi Space Accelerator Program, to which it will allocate up to $2 billion by 2030.

    Both the UAE and Saudi Arabia want to ensure the long-term resilience and competitiveness of their economies. They perceive their investment in the space sector as a means of developing a knowledge-based society, in which their citizens contribute to the national prosperity through innovation and entrepreneurship. In both countries, young generations are actively encouraged to pursue careers in the space sector.

    Opportunities of New Partnerships & Potential Military Applications

    The ambition to be the regional leader in the space sector has seen the different states seek out partnerships with established and emerging players in space exploration. For example, the UAE is committed to developing international partnerships with emerging players such as China, India, and Israel. In 2023, the UAE and China agreed to build a joint research and development centre in Abu Dhabi to work on several aspects of space exploration.

    In the context of the increasing tension and rivalry between the USA and China, the Gulf states have “to manage a difficult balancing act”, simultaneously maintaining their traditional ties to the USA, while engaging with China on space exploration - with its ambition to establish “a new space diplomacy” with the Global south. This situation is reflected in the ratification of the USA led Artemis Accords in 2020 by the UAE, Saudi Arabia and Bahrain, while also taking part in talks with China at the China-Gulf Cooperation (G.C.C) summit in 2022.

    Photo by SpaceX on Unsplash

    The UAE has shown even greater pragmatism in being both a member of the Artemis Accords and cooperating in the International Luna Research Station (IRLS), co-founded by China and Russia. However, due to the UAE’s and Saudi Arabia’s military dependence on the USA, there are limits to their cooperation with ChinaIn 2022, the USA International Traffic in Arms Regulations “prevented the Emirati rover “Rashid 2” from joining a Chinese Chang’e 7 mission to the moon”. The Chinese Chang’e 7 programme, which will be launched in 2026, aims at exploring the moon’s environment and its available resources. China’s rapid progress in space research and development is viewed by the USA as a direct threat to its own interests. 

    In the 21st century, the adoption of new and advanced technologies coming out of space research programmes for military purposes is reshaping military power. Space systems provide countries with strategic advantages, with the possibility of conducting ISR (Intelligence, Surveillance, Reconnaissance) missions over disputed territories. To decrease its military dependency on satellite imagery from foreign countries, the UAE “partially manufactured its own high-resolution imaging satellites” (KhalifaSat and MBZ-SAT) for use in its territorial dispute over the islands of Abu Musa, and the Greater and Lesser Tunbs, with the Islamic Republic of Iran (IRI).

    Conclusion 

    The investment and development related to the space sector is now an integral part of each of the Gulf states respective national visions. Its importance is part of the economic, social, and military aspirations for the future. However, it requires maintaining a balance in relationships with both old and new partners, along with risk management of new technologies and their utilisation. The development of military applications from these space programmes could jeopardize the security and stability of the region. To contain these risks and maintain a broad range of collaborations, the use of diplomacy will be paramount. The development of space exploration treaties, establishing common rules and norms, potentially even a space governance. In response to these risks, Saudi Arabia and the UAE appear to be in favour of agreeing on common rules and norms. Iran has looked to enter into a space treaty with Russia and China. 

    February 12, 2025No Comments

    Unraveling ISIS: Islamic State’s Offices across Africa

    A Comparative Analysis of the Cases of ISWAP and ASWJ in Nigeria and Mozambique

    By Massimiliano Dosmo and Leonardo Pesci - Africa Team

    Since its inception in 2014, the Islamic State in Syria and Iraq (ISIS) has become a transnational Jihadist movement whose ideology and practices inform insurgents’ strategies and objectives across the world. One after another, movements pledged allegiance to the Islamic State, elevating ISIS as a structuring force for many religious-based factions in Africa. This article investigates the proliferation of ISIS-affiliated groups on the continent, comparing how the Islamic State operates in Nigeria and Mozambique. Specifically, the article seeks to understand how the strategic, operational, governance, and ideological practices of ISIS affiliates converge - or diverge - from the ones of ISIS’s core group.

    Origins and formation of the groups 

    Starting with the origins and group formation, the Islamic State West Africa Province (ISWAP) originated as a splinter faction of the Jihadist group Boko Haram, which was established in Maiduguri, Borno State, Nigeria, in 2002 by Muhammad Yusuf. After Mohammed Yusuf was killed in an unsuccessful uprising in 2009, the movement, under the new leadership of Abubakar Shekau, began an insurgency against the Nigerian government to create a Caliphate in the Lake Chad Basin area. In 2016, Boko Haram split into two groups: Jama'atu Ahlis Sunna Lidda'adati wal-Jihad (JAS), commanded by Abubakar Shekau, and ISWAP, led by Abu Musab al Barnawi. The separation was the outcome of internal disputes within Boko Haram that were brought on by some skepticism shown by ISIS's higher authority following Shekau's decision to break with Al-Qaeda and join ISIS. This skepticism was given by the fact that, although Shekau had been designated as Waly (leader) of ISWAP and had pledged his loyalty to ISIS, his leadership skills and doctrinal beliefs were a major source of worry for Al-Baghdadi. These worries were subsequently confirmed when Al-Baghdadi received grievance letters from Shekau's subordinates. Specifically, Shekau was accused of being too violent against the Muslim population, using indiscriminate violence against them, which represented an ideological clash with the ISIS view. This resulted in Al-Baghdadi's decision to not trust Shekau as the legitimate leader of ISWAP. From ISWAP’s inception, it is evident how ISIS actively influenced the group’s leadership due to an ideological clash with the previous leader. 

    On the other hand, Ansar al-Sunna, also known as al-Sunna wal-Jamaat’s (ASWJ), history in Mozambique can be traced to 2015, when the group started as a religious organisation in Mocimboa da Pria, one of the districts of Cabo Delgado Province in northern Mozambique. It emerged as an armed group in 2017, taking advantage of socio-economic issues such as widespread poverty, the exclusion of Muslim populations, and official indifference. In 2019, it started operating under the umbrella of the Islamic State Central Africa Province (ISCAP), which also included the Islamic State’s affiliate in the Democratic Republic of Congo (DRC), and joined ISIS, having previously adhered to Salafi-jihadist theology. The primary connections between ASWJ and ISIS are the ideological foundation, based on Salafi-jihadism, and promotional backing. However, it has much autonomy compared to more disciplined ISIS branches. Despite adopting ISIS's rhetoric on the establishment of an Islamic caliphate, its operational framework and governance are representative of the local reality. While ASWJ employs ISIS-style recruitment tactics, such as appealing to local concerns, it does not adopt the organisational rigor that ISIS has previously enforced on its branches.

    Territoriality, governance and engagement with the population

    A crucial element of this analysis is the territoriality, governance, and engagement strategies that the two groups employ. ISWAP takes on a methodical approach to administration, drawing inspiration from the administrative framework of ISIS. The organization manages commercial activity, collects taxes, and offers a few social services, including food distribution and dispute resolution. In contrast to Boko Haram's previous indiscriminate cruelty, ISWAP has immediately tried to gain local support by presenting itself as an alternative to the Nigerian government. Its governance model, aimed at winning the hearts and minds of the local population, has allowed  ISWAP to sustain its insurgency and maintain control over key territory surrounding Lake Chad. ISWAP's governance structure is one area where ISIS has a direct influence. Similar to ISIS, ISWAP uses a structured governance model, establishing a Sharia-law-based judicial hierarchy, designating governors for captured areas, and implementing financial measures to support its operations. ISWAP’s success in controlling the area demonstrates ISIS's preference for long-term administration as opposed to just gaining territory. Its capacity to offer services, including agricultural help and medical assistance, stands in stark contrast to the Nigerian government's neglect of rural communities

    In contrast, ASWJ’s governance approach is less structured. Although it has exercised authority over certain parts of Cabo Delgado, it lacks a strong administrative framework. While they struggle to deliver basic services, the organisation enforces Sharia rule in conquered territory. Instead of using organised taxation, it engages in extortion and looting, and it frequently has coercive relationships with the local population. This lack of structured governance has hindered its ability to maintain sustained legitimacy among people. For these reasons, ASWJ’s governance is severely hampered by its excessive reliance on external funding and illicit activities, such as drugs and rubies smuggling. Consequently, unlike ASWJ, ISWAP has developed a more structured logistical network, securing a steady supply of weapons, food, and fuel directly from ISIS. It has also integrated foreign fighters into its ranks, benefiting from training provided by ISIS operatives in the region. ASWJ’s patchy and fluctuating implementation of Islamic governance initiatives, combined with its leadership’s short-term strategic objectives, has made long-term territorial control more challenging. This has prevented ISIS from fully sustaining the group’s operations, unlike in the case of ISWAP.

    Funding Activities and Financial Revenues 

    The current analysis cannot overlook the financial and fundraising practices of ISWAP and ASWJ within their respective contexts. Despite the notorious difficulty in pinpointing direct financial connections, there are nonetheless converging similarities between ISIS, ISWAP, and ASWJ’s fundraising practices. ISIS’s core group in Syria and Iraq has largely benefitted from a different range of revenue sources. These included oil extraction and trade, taxation, lootings, robberies, kidnapping for ransom, extortion of local communities, and tariffs on import/export within their territories. Additionally, private donors and international fundraising networks generated a substantial part of ISIS's financial revenues. 

    While tracing direct financial links between ISIS’s core leadership and its Mozambican affiliate remains speculative due to limited evidence, the same cannot be said for ISWAP. During the first years of activities, ISIS's financial support was instrumental to the group's territorial and logistic affirmation. Evidence demonstrates ties between ISIS and ISWAP consisting of regular triangulations of money - up to USD 782.000 between 2015 and 2016. On the other hand, the closer engagement with local communities allowed the group to impose Zakat, a taxation system representing one of the primary sources of financial entrances. Leveraging the Quranic obligation, the group legitimises its authority in collecting taxes from private and business communities including farmers, traders, and fishermen. The practice avoided predatory actions characterising other Nigerian groups such as Boko Haram and JAS, creating patterns of predictability within communities. Despite this, ISWAP’s financial system is anyway reliant on the ransoms of local elites and international workers.

    On the other hand, ASWJ's economic sustainment seems primarily reliant on illegal local trade and local and external donations. The region has historically represented a notorious hotspot of illicit trafficking and smuggling routes. The centrality of the port of Mocímboa da Praia elevates Cabo Delgado as a central hub for insurgents to trade and contraband goods, including timber, charcoal, rubies, and ivory. Notably, drug trafficking of heroin and methamphetamines from South Asia has become one of their main sources of income. A substantial part of ASWJ's financial entrances arises from local entrepreneurs demanding protections, as well as taxed loans borrowed to small businesses. While the above-mentioned appeared as the main financial revenues of the group, alternative fundraising activities confirm the tendency to rely on kidnapping for ransoms and the participation in human and organ trafficking routes of the Horn of Africa. Finally, although financial connections between ASWJ and ISIS are not sustained by verifiable evidence, it is nonetheless conceivable that links between the group and external funders from smaller ISIS cells in South Africa around the continent exist.

    Source: Think Tank Experts Warn of Growing Islamist Financing Network in South Africa; Photo by ZUMA Press, Inc.

    Group’s Objectives and Evolutions

    Despite initial analogies, Nigerian and Mozambican territorial dynamics, logistical capacities, and counter-insurgency strategies have not only differentiated the evolutions of the groups but also their ideological and practical closeness to ISIS. 

    Both groups started with low-profile activities. Between 2015 and 2017, ASWJ was mainly composed of religious leaders, managing religious spaces and spreading Salafist doctrines, delegitimising secular institutions and state law. Similarly, ISWAP’s first steps in 2016-2018 are defined as the “consolidation” phase, characterised by a few activities and attempts of the group to define themselves from Boko Haram.

    Between 2019 and 2021, both groups pledged allegiance and received formal recognition from the Islamic State’s core group, simultaneously intensifying the violence and frequency of attacks. ASWJ expanded its territorial presence to the four main coastal districts of Cabo Delgado. Approximately 16–20 monthly attacks targeted cargo transports, contractors, and security forces, spreading in neighboring Tanzania. ISWAP structured its internal composition, expanded its territorial control, and improved its engagement with the population acquiring notable legitimacy. The incursions remained targeted towards Nigerian security forces and military bases expanding to international workers and organisations in rural areas around the Lake Chad Basin. 

    With opposed outcomes,  2021 represented a turning tide for two groups, directly reflected in their relation and closeness to ISIS. Mozambican counter-insurgency strategy included contractors and international interventions to recapture major urban centers. Militants were forced to change their strategies, the number of attacks decreased, and tactics shifted to guerrilla actions, targeting civilians in smaller and rural villages. Meanwhile, ISWAP reinforced its bureaucratic organisation, and expanded its numerical basis, and territorial control, benefitting from the Sambisa offensive and the killing of JAS leader Shekau. Its territorial presence spilled over the Lake Chad Region, and at least 10 other Nigerian states

    Therefore, while pledging allegiance to ISIS brought both groups under the broader Islamic State umbrella, they did not necessarily adopt ISIS’s ideological and strategic framework. While ISWAP followed ISIS’s structured governance and military strategy, ASWJ opted for a more localised approach adapted to the Mozambican context. Its affiliation with ISIS provided it with branding, logistical, and financial support, but it did not transform ASWJ into a fully ISIS-controlled entity. 

    Conclusion

    All in all, the overall structure and actions of the two ASWJ and SWAP reflect a varying degree of convergence from ISIS's core ideology. While the closer relationship between ISIS and ISWAP has informed the evolution of the latter, the looser approach toward ASWJ is enshrined in the group's relatively independent actions. However, it is important to notice how in both cases the groups still showed, even if in a different manner, a high degree of independence in the choice of their local strategy due to the different nature of the socio-political context of their territories, toward the application of ISIS core ideology.

    January 20, 2025No Comments

    Assessing the Cybersecurity Challenges of Smart Cities 

    by Wesley Issey Romain & Giulia Saccone - AI, Cyber Security & Space Team

    Introduction

    The emergence of the “smart city” as a concept in the 1980s and a reality in the mid-2000s coincided with the rapid development of technology and internet worldwide. Two decades later, in 2024, growing urbanisation, environmental concerns, social and governance issues, shifting lifestyles, and economic and residential attractiveness contribute to deeper reliance on digital tools and emergent technologies, such as Internet of Things (IoT) devices and artificial intelligence (AI). Consequently, protecting smart cities’ infrastructures, networks and IoT devices against data theft, sabotage, surveillance, ransomware, terrorism, and other cybercrimes – whether from state-sponsored hacker groups or non-state actors – is crucial for government, private businesses, and civil society stakeholders.

    This paper argues that despite the constant and multifaceted cybersecurity threats smart cities encounter, holistic and long-term solutions exist to maintain and enhance the security of their infrastructures and prevent any potential massive disruption. Our article mainly uses qualitative and quantitative data from secondary sources. It will be organised into five parts in the subsequent order:

    Firstly, it will provide a brief understanding of the concept of a “smart city” and a presentation of its interpretations, strengths, opportunities, and primary stakeholders. The second part (II) will discuss the leading cyber security challenges smart cities face and demonstrate how the advent of emerging technologies and new threat actors will continue to impact smart cities’ overall safety and integrity. Finally, the third, fourth, and last parts (III, IV, and V) will each present an existing and potential solution to strengthen the security of intelligent cities’ IT infrastructures against cyber threats and disruptions.

    A brief presentation of the concept of the smart city

    The concept of “smart city” started appearing in academia around the 1990s; however, the notion has been popularised through IBM’s Smart Cities Challenges. Although nowadays there is not a univocal definition of a smart city, for this article, we may define them as an urban area where ICT and IoT occupy a pivotal role in data collection, anonymisation and analysis for the improvement of citizens’ quality of life, addressing contemporary challenges on a multi-stakeholder partnership. It is hence characterised by the use of diverse IoT-based systems (from smart grids to garments with sensors), which change from city to city–which implies the diverse definition of smart cities. Therefore, connectivity is the indispensable trait that every IoT device should have to join the smart city’s network, and scalability is what ensures that every project can be initially implemented on a small scale and then expanded in the wide urban landscape. Furthermore, users’ participation is vital for concretising the effects of a smart city and spotting new challenges1.  

    The main sectors involved are the ones of mobility, where IoT devices, AI and 5G optimise citizens’ transportation both on private vehicles and public transportation; energy, where smart grids allocate energy efficiently based on demand; and health, where IoT timely communicates through 5G the physiological state of individuals to provide timely responses and targeted therapies. IoT implementation in housing is important not only for this latter aim but also for improving lifestyle, with a house capable of responding to our daily necessities in a timely manner. IoT paired with AI can be functional for improving surveillance and predicting crime. Recently, smart cities’ R&D has also focused on public administration and citizenship participation, boosting the efficiency of public administration and creating smart communities for boosting citizens' engagement in local politics2.

    Smart cities aim to improve citizens’ quality of life by addressing urbanisation challenges through energy efficiency and responsive systems enabled by IoT devices. However, only 16% of cities can independently afford these projects due to high costs and diverse program requirements. To attract investors and drive innovation, cities use their smart city mission as a branding strategy, fostering advancements in underdeveloped but essential areas and consequentially creating long-term investments and competitiveness on the international stage. Partnerships with international bodies, research institutions, and other smart cities have proven effective for acquiring cutting-edge technology and best practices, mainly through city-to-city collaborations that bypass traditional bureaucratic channels.

    The success of a project in a smart city resides in the coordination of the multiple stakeholders, which play simultaneous roles as planners, developers, implementation agents and follow-up responsible. The main actors involved are public stakeholders - namely national and local governments, administration and political institutions – that enable the coordination, monitoring and compliance of other players through policy formulation. Following, we have the private sector – composed of companies and start-ups primarily focused on the ICT field, investors, and in specific contexts, energy suppliers and property developers – that, in the case of cybersecurity, provide ICT infrastructures and investments in cutting-edge technology to boost the system readiness for cyberattacks. The Academic group has emerged as knowledge brokers, concurring with private counterparts in offering solutions in the implementation stage. Civil stakeholders – namely press, NGOs, and private citizens - play a dual role as recipients and contributors of projects, dispensing continuous feedback to the abovementioned categories thanks to advocacy and data sharing. 

    The digital challenges of smart cities with emerging technologies.

    Due to its incorporation of mixed technologies, software, and hardware, a smart city would inevitably be exposed to multiple cyber attacks by various threat actors. Experts have suggested that smart cities necessitate novel and inventive approaches to safeguard devices and applications, taking into account factors such as resource limitations, the nature of distributed architecture and geographic dispersion while confronting issues such as unreliable communication, insufficient data, and privilege safeguarding. Regardless of whether the cyber attack is conducted on the perception layer (sensor, actuators, RFID or GPS), on the network layer (Bluetooth, Wi-Fi, and LAN), or on the application layer (Smart Home, Health, and Grid), most common cybersecurity risks associated with smart cities can be summarised into four types.

    First, the Distributed Denial of Service (DDoS) is perhaps the most documented practice of cyber attacks against a service or a network. DDoS is a malicious attack restricting digital traffic by inundating a target with excessive internet traffic, utilising compromised computer systems and IoT devices as sources. A cybercriminal could, for example, launch a DDoS attack to gain a smart city’s charging station, traffic light, or public transportation network, which could become a component of a botnet employed to disable another system. In 2018, CISCO indicated that the number of DDoS attacks worldwide was 7.9 million and had forecasted a substantial rise to 15.4 million in 2023. Additionally, most recent statistics data showed that DDoS attacks increased by 46% in the first half of 2024 in comparison to 2023, with peak attack power jumping from 1.6 Tbps to 1.7 Tbps, in which online gaming, technology, financial services, and telecommunications were the most targeted industries with 49%, 15%, 12%, and 10% respectively. 

    Secondly, data exfiltration from devices such as traffic lights, CCTV cameras, parking meters, or public services servers is another significant challenge for smart cities as they gather extensive data from citizens. Public data theft violates the confidentiality, integrity, and availability of public data, as cybercriminals can use compromised information to perpetrate ransomware or other fraudulent transactions with third parties on the dark web. Privacy violations, financial loss, legal problems, and loss of trust from citizens are just a few of the damaging effects of data leaks from a city’s IoT devices. Such incidents have happened and are more frequent than one may think. For example, in July 2024, a large-scale data theft conducted by a cybercriminal group was reported in the United States in Columbus, Ohio. After the breach of private data stolen from over a hundred thousand ordinary people stored in public IT infrastructures and municipal agencies, a ransomware operation was launched, and sensitive information was divulged on the dark web. This type of incident will likely occur again as cities rely more and more on technology.

    Thirdly, device hijacking is another threat associated with smart cities. Hacker groups often seek to control a device to influence the myriad of technological equipment constituting a smart city infrastructure and network. IT experts argue that IoT devices frequently possess default credentials that malicious actors can use, and weak data encryption, absence of periodic software updates, and interconnectedness render them easily compromised by hackers

    Fourth, Permanent Denial of Service (PDoS) is documented as a devastating cyber risk to any technologically advanced and dynamic city. IT experts have noted that, in contrast to sporadic DDoS, which results in ephemeral cyber disruptions, PDoS causes permanent hardware damage and substantial economic consequences, potentially endangering human life in healthcare and critical infrastructure sectors

    Urban areas are projected to accommodate 68% of the global population by 2050, propelled by urbanisation and demographic expansion. Consequently, such prevision, coupled with the advancement and availability of devices and digital tools, the participation of state-sponsored and non-state actors groups in malign cyber-attacks is undoubtedly a source of concern for developed and emerging countries, global cities and their inhabitants. At the same time, it should be observed that cities worldwide do not share the same level of cyber threat. As Cesar Cerrudo mentioned, while most cities possess technology, the effectiveness of smart cities varies based on the extent of technological advancements implemented. Some cities have implemented more technology while others have less.

    Smart cities are expected to face several digital challenges with the availability and advent of new technologies; nevertheless, solutions and measures exist to enhance security and prevent disruptions.

    Source: Illustration generated by AI

    Threat detection and investments in advanced technology

    Existing measures are primarily concerned with ensuring data and privacy protection based on trust, integrity, and confidentiality to prevent leaks from sensors, cameras, other IoT devices, and critical infrastructures. To support them and address the main concerns raised by industry and academia on privacy and data protection, the cybersecurity sector has focused on the mitigation of breaches in IoT for privacy protection, improving device authentication, access control, and firmware updates to provide better data anonymisation, secure data sharing and analytics for safe decision-making. A smart city is a goldmine of personal data due to its pivotal role in enhancing the quality of life of citizens and the interconnectedness through IoT. This provides criminals with a myriad of access points on devices with limited.

    Blockchain technology has demonstrated a high potential solution thanks to its capacity to transmit information securely and directly. Specifically, this technology can be applied to cybersecurity to protect personal data. In the case of e-governance, it enables individuals to manage their credentials independently, bypassing centralised controlling authorities. Seoul is a fitting example: in 2018, the city started applying blockchain in its public administration, and during the same year, it developed a metaverse secured by blockchain for document issuance and citizen participation.

    AI application is another game-changing technology that can boost smart cities’ cybersecurity thanks to their high computational and predictive qualities, which, applied to the fog computing layer, could protect them from cyberattacks despite their resource constraints – i.e. limited storage and RAM3. In particular, the fog layer managing the data transfer between the IoT devices and the Cloud layer provides a higher amount of computing load than those two extremes, lower latency in the communications between the IDS and the IoT, and lower energy consumption. This enables the operators to isolate the attack, repel it, and avoid its spread throughout the network, allowing an interrupted flow of smart city services. In particular, ML can be applied to both SDIS and AIDS. On the other hand, it can ease the time-consuming characteristics of updating the signature database. Regarding the latter, it can enhance the precision of attack detection, lowering the rate of false positives.

    Biometrics is already used to facilitate authentication thanks to the uniqueness of individual features, addressing the constant concern for privacy and security. They have already found wide applications in the smart economy field, like the fingerprint and face recognition used by Apple Pay, face recognition for video surveillance devices of Amazon Web Services, and voice recognition employed by Amazon Alexa for telemedicine in the UK.

    Strengthening and facilitating public-private partnerships

    It is already visible from these few examples how private and public sectors coexist in the development of smart cities’ security, acting in synergy for optimising the outcomes of their projects thanks to risk and resource sharing and the relative reduction of costs; access to the private’s technical and management skills and the innovation enhancement for effective, creative and real-time solutions. An example is the collaboration between Barcelona’s Municipal Institute of Informatics and CISCO to implement a communication protocol for CERT and CSIRT to detect, share, respond and recover from cybersecurity threats and vulnerabilities in IoT devices.

    Indeed, Barcelona is a perfect example of a smart city where public and private partnerships (PPP) can thrive thanks to companies with a sound knowledge of the local market, the involvement of all the stakeholders – citizenship included – to commit them towards the same type of projects and ease the tensions through transparency and responsibility, and trust-building practices, which are paramount in the initial phases. The cruciality of trust building is visible in the failure of the PPP of Sidewalk Labs and Waterfront Toronto, where the lack of involvement of the citizens led to tensions that resulted in boycott protests of the project. 

    However, it must be pointed out that this factor is crucial in democracies, where citizenship plays an active role in shaping smart cities. Nevertheless, transparency is a value that benefits all smart cities regardless of the ongoing regime since it communicates the reliability of the projects and the worth of investing in this transformation.

    Strengthening and facilitating regional and international cooperation, information sharing and dialogue among experts

    PPPs are not the only method to transform and strengthen the security of smart cities; international fora, capacity-building projects, and collaboration among cities play fundamental roles. At the international level, the United Nations Economic Commission for Europe (UNECE) and the UN-HABITAT coordinate the global platform "United for Smart Sustainable Cities" (U4SSC) to encourage the transition from traditional to smart cities, which has also developed a set of key performance indicators (KPIs) for sustainable cities, a valuable instrument for agenda setting and performance evaluation adopted by more than 50 cities worldwide.

    The ITU, thanks to the Smart Sustainable Cities program, supports the development of stable, secure, reliable and interoperable ICT devices for sustainable cities. The Smart Cities Council is a network of experts providing capacity building and investment programs, which, among all the objectives, aim to ensure cyber, privacy, and data protection. At the regional level, for instance, the EU provides the Smart Cities Marketplace: a platform for the various stakeholders involved in the field to improve citizens’ quality of life and increase the competitiveness of European cities and industry with respect to EU climate targets.

    While at the level of bilateral agreements, Singapore has exploited its expertise to catalyse agreements from distant poles, such as China and the US, for mutual cyber capacity-building projects. Those multilevel initiatives have a common effect that addresses one of the biggest challenges of smart cities intra and interoperability: the normative and standard differences between cities, which makes PPP challenging and prevents effective data protection, the biggest concern in the research field.

    Conclusion

    In conclusion, despite the persistent, increasing, and diverse cybersecurity risks faced by smart cities, comprehensive and sustainable solutions are available to safeguard their infrastructures and avert significant disruptions. Firstly, it has been shown that the notion of a smart city originated in academic circles throughout the nineties. The concept emphasises mobility, energy, and health, with research and development concentrating on public administration and citizen participation. It was argued that successful projects necessitate the collaboration of several stakeholders, including planners, developers, implementation agents, and follow-up measures, to enhance the quality of life for citizens.

    The second part of the article sought to demonstrate that smart cities incorporate various technologies, including software and hardware, making them vulnerable to multiple cyber-attacks from a wide range of threat actors. DDoS and PDoS attacks, data exfiltration, and device hijacking attacks are common cybersecurity dangers. The involvement of both state-sponsored and non-state actors in malicious cyber-attacks is a cause for concern for both developed and emerging nations, as well as capital cities around the globe and their populations.

    Thirdly, it has been observed that investments in cutting-edge technologies to prevent cyber threats are deemed pertinent and practical. For instance, tools such as blockchain technology provide a safe and direct method for information transmission, positioning it as a viable option for cybersecurity. Besides, artificial intelligence applications can improve cybersecurity in smart cities through their computational and predictive abilities. Lastly, biometrics, characterised by its distinctive attributes, is employed for authentication, mitigating privacy and security issues.

    The successful example of the city of Barcelona, introduced in the fourth part of the paper, confirmed that public-private collaborations improve security and optimise project results via risk and resource sharing, cost reduction, access to private technical and managerial expertise, and innovation. Additionally, it has been demonstrated that transparency is essential for smart cities.

    Lastly, multilateral forums are part of the solution. International forums and initiatives to increase capacity building are essential to strengthening the safety of smart cities. Developing reliable, secure, and stable information and communication technology devices must be encouraged within forums such as the ITU’s Smart Sustainable Cities. Only through the listed solutions can government, public, and private stakeholders ensure that smart cities remain safe.


    References

    1. Houichi, Mehdi. “Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach.” p.394. ↩︎
    2. Hermann P. Rapp., and Moebert, Joechen. “Smart Cities: Investing in the urban future”. ↩︎
    3. Houichi, Jaidi, Bouhoula, 2024; ↩︎

    Abaimov, Stanislav. “Understanding and Classifying Permanent Denial-of-Service Attacks”. Journal of Cybersecurity and Privacy. 2024; 4(2):324-339. Retrieved from: <https://doi.org/10.3390/jcp4020016

    Admass, Wasyihun Sema., Yirga Yayeh Munaye., and Abebe Abeshu Diro. 2024. “Cyber Security: State of the Art, Challenges and Future Directions.” Cyber Security and Applications 2:100031. Retrieved from:  <https://doi.org/10.1016/j.csa.2023.100031>.

    Alibasic, Armin., et al. “Cyber Security for Smart Cities: A Brief Review”. In Data Analytics for Renewable Energy Integration: 4th ECML PKDD Workshop, DARE 2016, Riva del Garda, Italy, September 23, 2016, Revised Selected Papers 4. 22-30, Springer International Publishing. 2017. Retrieved from: <https://e-tarjome.com/storage/btn_uploaded/2019-08-14/1565752729_9885-etarjome-English.pdf>

    BASE. “Smart City”. May 2019. Retrieved from: <https://www.baseland.fr/en/recherches/smart-city/>

    Borgeaud, Alexandra. 2024. “Global web application critical vulnerability taxonomy 2023”. Statista. February 20, 2024. Retrieved from: <https://www.statista.com/statistics/806081/worldwide-application-vulnerability-taxonomy/>

    Cerrudo, Cesar. “An Emerging US (and World) Threat: Cities Wide Open to Cyber Attacks”. Technical Report, Securing Smart Cities, 1-22, 2015. Retrieved from: <https://securingsmartcities.org/wp-content/uploads/2015/05/CitiesWideOpenToCyberAttacks.pdf>

    Cho, Young-Im. “Lecture 4 - Biometrics in Smart City” Lecture, September 2023. Retrieved from: <https://pb.edu.pl/iro/wp-content/uploads/sites/32/2023/09/Biometrics_intelligent_solutions_III_ON-SITE_Young_Im_Cho_4.pdf>

    “DDoS Attacks Trends for Q1-Q2 2024: Insights from Gcore Radar Report.” GCORE, August 14, 2024. Retrieved from: <https://gcore.com/blog/radar-q1-q2-2024-insights/>

    Department of Health and Social Care. “News Story - NHS Health Information Available through Amazon’s Alexa.” October 7, 2019. Retrieved from: <https://www.gov.uk/government/news/nhs-health-information-available-through-amazon-s-alexa>

    European Commission. “Smart Cities”. European Commission. Retrieved from: <https://commission.europa.eu/eu-regional-and-urban-development/topics/cities-and-urban-development/city-initiatives/smart-cities_en>

    “European Cybersecurity Test Project in the City.” 2022. Info Barcelona. January 2, 2022. Retrieved from: <https://www.barcelona.cat/infobarcelona/en/tema/smart-city/european-cybersecurity-test-project-in-the-city_1141253.html>

    Gatlan, Sergiu. “City of Columbus: Data of 500,000 stolen in July ransomware”. Bleeping Computer. November 4, 2024. Retrieved from: <https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/>

    Hamid, Bushraet al. “Cyber Security Issues and Challenges for Smart Cities: A survey”. 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 2019, pp. 1-7. Retrieved from: <https://ieeexplore.ieee.org/abstract/document/9024768>

    Houichi, Mehdi., Faouzi Jaidi., and Adel Bouhoula. 2024. “Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach.” Computers, Materials & Continua 81 (1): 393–441. Retrieved from:  <https://doi.org/10.32604/cmc.2024.054007>

    Iberdrola, “BLOCKCHAIN4CITIES –  Blockchain Technology at the Service of Urban Management.”. Retrieved from: <https://www.iberdrola.com/innovation/blockchain-for-smart-cities-urban-management>

    Institute for Defense and Business (IDB). “What Are the Cybersecurity Risks for Smart Cities”  <https://www.idb.org/what-are-the-cybersecurity-risks-for-smart-cities/>

    International Telecommunications Union (ITU). “Smart Sustainable Cities.” ITU, 12/21. Retrieved from: <https://www.itu.int/en/mediacentre/backgrounders/Pages/smart-sustainable-cities.aspx>

    Jayasena, N.S., H. Mallawaarachchi, and K.G.A.S. Waidyasekara. “Stakeholder Analysis For Smart City Development Project: An Extensive Literature Review.” Edited by E. Mohd Ahnuar, R. Mohd Nordin, J. Yunus, and N.A. Abdul Rahman. MATEC Web of Conferences 266 (2019): 06012. Retrieved from: <https://doi.org/10.1051/matecconf/201926606012>

    Machap, Kamalakannan. & Hua Qiang. “Evaluating firewall tools and techniques in enhancing network security”. Journal of Applied Technology and Innovation, Vol. 6, No. 1, 2022. Retrieved from: <https://www.researchgate.net/publication/357553876_Evaluating_firewall_tools_and_techniques_in_enhancing_network_security>

    Md Mamunur, Rashid., et al. “Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques.” International Journal of Environmental Research and Public Health 17, no. 24 (December 14, 2020): 9347. Retrieved from: <https://doi.org/10.3390/ijerph17249347>

    Medium. “Cybersecurity for Smart Cities: Addressing Vulnerabilities in Urban Infrastructure”. Emerging India Analytics, February 2024. Retrieved from: <https://medium.com/@analyticsemergingindia/cybersecurity-for-smart-cities-addressing-vulnerabilities-in-urban-infrastructure-516298a1882e#:~:text=Investing%20in%20advanced%20technologies%20such,before%20they%20cause%20any%20damage.>

    Mijwil, Maad M. et al. “Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects”. Mesopotamian Journal of Cybersecurity. Vol. 2022, pp. 1- 4. Retrieved from: <https://www.iasj.net/iasj/download/6b7ef8fef416253e>

    Quan, Xiangyu, and Marte C.W. Solheim. 2023. “Public-Private Partnerships in Smart Cities: A Critical Survey and Research Agenda.” City, Culture and Society 32 (March):100491. Retrieved from: <https://doi.org/10.1016/j.ccs.2022.100491>

    Rapp, Hermann P., and Moebert, Joechen. “Smart Cities: Investing in the urban future”. Focus Germany, Deutsche Bank Research, October 20, 2023. Retrieved from: <https://www.dbresearch.com/PROD/RPS_EN-PROD/PROD0000000000530349/Smart_Cities%3A_Investing_in_the_urban_future.pdf?undefined&realload=~FwCKBc6XEJ3FEyBsL5KPmoB9DlvuMggYIE4xFVFd1HD6M6ik7YBEvSN9~iSWgQ~>

    Seoul Metropolitan Government, “Metaverse Seoul, the New Continent of Seoul.”. Seoul Metropolitan Government. Retrieved from: <https://english.seoul.go.kr/policy/smart-city/metaverse-blockchain/

    Sharma, Shamneesh., and Nidhi Mishra. “Horizoning Recent Trends in the Security of Smart Cities: Exploratory Analysis Using Latent Semantic Analysis.” Journal of Intelligent & Fuzzy Systems 46, no. 1 (January 10, 2024): 579–96. Retrieved from: <https://doi.org/10.3233/JIFS-235210.>

    Singapore Ministry of Digital Development and Information “Singapore and Shenzhen Drive Smart City Collaboration with 14 New Projects.” n.d. Singapore Ministry of Digital Development and Information. Accessed December 30, 2024. Retrieved from: <https://www.mddi.gov.sg/media-centre/press-releases/singapore-and-shenzhen-drive-smart-city-collaboration/>

     “Smart Cities and Smart Buildings Sector Report” European Cyber Security Organisation (ECSO), March 2018. Retrieved from: <https://ecs-org.eu/?publications=https-ecs-org-eu-documents-publications-5fdb27182b472-pdf>

    Smart Cities Council “Smart Cities Council Works to Deliver Sector-Wide Upliftment through Specialized Products and Services.” 2025. Smart Cities Council. December 30, 2025. Retrieved from: <https://smartcitiescouncil.com/smartcitiescouncil/advisory/.>

    United Nations Department of Economic and Social Affairs. “68% of the world population is projected to live in urban areas by 2050, says UN”. 16 May 2018. Retrieved from: <https://www.un.org/development/desa/en/news/population/2018-revision-of-world-urbanization-prospects.html>

    Urban Technology Alliance “Smart City Diplomacy: A Promising Approach for Global Urban Solutions.” Urban Technology Alliance. Accessed December 30, 2024. Retrieved from:  <https://www.urbantechnologyalliance.org/2024/09/25/smart-city-diplomacy-a-promising-approach-for-global-urban-solutions/>.

    US-ASEAN Smart Cities Partnership, “CET Smart City Project Pairing Initiative Sends Delegation of U.S. Experts to Singapore.” 2024.. May 30, 2024. Retrieved from: <https://www.usascp.org/us-expert-delegation/>

    UTA - Urban Technology Alliance. “Smart City Diplomacy: A Promising Approach for Global Urban Solutions”. Retrieved from: <https://www.urbantechnologyalliance.org/2024/09/25/smart-city-diplomacy-a-promising-approach-for-global-urban-solutions/>

    Uyarra, Elvira, Jon Mikel Zabala-Iturriagagoitia, Kieron Flanagan, and Edurne Magro. “Public Procurement, Innovation and Industrial Policy: Rationales, Roles, Capabilities and Implementation.” Research Policy 49, no. 1 (February 2020): 103844. Retrieved from: <https://doi.org/10.1016/j.respol.2019.103844>

    Vempati, Smita., & N. Nalini. “Securing Smart Cities: A Cybersecurity Perspective on Integrating IoT, AI, and Machine Learning for Digital Twin Creation.” Journal of Electrical Systems, 20-5s, pp. 2817-2827, 2024. Retrieved from: <https://journal.esrgroups.org/jes/article/view/3052>

    Waseem Anwar, Raja. & Saqib Ali. “Smart Cities Security Threat Landscape: A Review”. Computing and Informatics, Vol 41, 2022, pp. 405-423. Retrieved from: <https://www.cai.sk/ojs/index.php/cai/article/view/2022_2_405>

    Yin, Chuantao. et al. “A literature survey on smart cities” Science China. Information Sciences58 (10), 1-18, 2015. Retrieved from: <https://www.researchgate.net/publication/281670019_A_literature_survey_on_smart_cities>

    Yue, Zhai, and Ping Gao. “Understanding the Stakeholders of Smart City Governance.” Machester: Manchester Centre for Digital Development Working Paper 105, 2023. Retrieved from: <https://hummedia.manchester.ac.uk/institutes/gdi/publications/workingpapers/di/dd_wp105.pdf 

    January 19, 2025No Comments

     The Kashmir Conflict: The Tip of a Dangerous Glacier – Part II

    by Davide Gobbicchi - Human Security Team

    Having illustrated the region’s history and political structure, this second part of the article will look at the solutions to the Kashmir conflict proposed throughout the last decades, and the underlying motivations behind their failure to be adopted.

    Solutions to the Kashmir Conflict

    The debate around Kashmir has offered three major solutions to the current stalemate:

    1. Political Independence

    A strand of the academic debate around Kashmir has argued that granting the region independence would lift the burden off the shoulders of India and Kashmir (thus the international community) while simultaneously allowing the Kashmiri people to best safeguard their own unique identity. This approach presents two problems:

    • Fractured Kashmiri Identity: as mentioned in the first paragraph of this paper, the seven decades of war characterizing Kashmir have greatly consumed the Kashmiriyat and the regional identity resulting from it, polarizing communities and fueling division. Within this context, it is hard - if not impossible - to imagine the Kashmiri people being able to agree on independence and on what country to build afterwards.  
    • Indo-Pakistani opposition: given Kashmir’s importance to both New Delhi and Islamabad (more of this in the next paragraph), it is even harder to believe that either of the two countries would ever grant its part of the region independence.

          2.   Formal Partition 

    Several authors such as Wolpert argue that a formal partition of Kashmir based on the Line of Control between India and Pakistan would be the “most realistic solution”; however, this policy would face two problems:

    • Conflicting views regarding partition: while some of India and Kashmir’s major political actors have accepted the current Line of Control as the new Indo-Pakistani border, Pakistan has several times categorically opposed it without providing feasible alternatives, thereby leaving no margin of political dialogue. 
    • Prerequisites for peace are treated as consequences of future peace: the transformation of the LoC into a soft border, and Kashmir’s demilitarization have for decades been seen as the two fundamental initial steps to be taken towards a conflict resolution in Kashmir. However, despite pressures from the international community, both India and Pakistan refuse to take significant measures in that direction, each waiting for the other to make the first move. Within this strategy adopted by both sides in the conflict, it seems unlikely that a common agreement on Kashmir’s formal partition will be achieved any time soon. 

           3.   Autonomy

    The debate on Kashmir’s autonomy has rotated around two kinds of autonomy:

    1. Separate autonomy: this approach advocates for the establishment of five different autonomous provinces (Kashmir; Jammu; Ladakh; Azad Kashmir; Gilgit-Baltistan) with the following characteristics:
    • free access to one another and to/from India and Pakistan;
    • individual democratic constitution(s) and legislature for all local issues;
    • defense and financial treaties between India and Pakistan for regional defense and foreign affairs;
    • a high-level governing body (comprising India; Pakistan and the 5 Autonomous Provinces) for cross-regional issues and demilitarization;
    1. Joint autonomy: another frequently discussed option, it envisages the creation of a no-borders Kashmir Economic Union with India and Pakistan jointly managing defense and foreign affairs, and the current Line of Control separating the two parts of Kashmir  being a mere formality.

    Despite this third solution being the most popular and feasible (for it would be the one to best balance Kashmiri desire for autonomy and Indo-Pakistani interests), it nonetheless presents - similarly to the other two solutions previously discussed - two major issues:

    • Prerequisites for peace treated as consequences of future peace: (same as in the “formal partition” solution.)
    • Indian repression of Kashmiris’ attempts to engage in “political building processes”: the 2019 abrogation (discussed in the previous paragraph) of articles 370 and 35a of the Indian Constitution led to a centralization of power in the hands of New Delhi; this move hindered local forms of political engagement that would have helped India and Pakistan develop solutions to the conflict accepted by the very people living the conflict. The consequent de-legitimacion and de-responsabilisation of Kashmiri civil society drew locals away from official political processes and pushed them towards underground organizations that provided fertile ground to the Islamization and radicalization of society.    

    As shown in this paragraph, all three major solutions to the Kashmir conflict offered by the international academic debate present problems that make them unfeasible in the short run. These issues are largely the product of Indian and Pakistani unwillingness to compromise, much to the disadvantage of the region’s population. It is by now clear that the limbo in which Kashmir finds itself is nothing but a reflection of the critical nature of Indo-Pakistani relations worsened by their respective national interests. The paper will now turn to this.

    Map 1: Erstwhile Princely State of Jammu & Kashmir. Currently, Gilgit-Baltistan and Azad Kashmir are administered by Pakistan, UT of Jammu & Kashmir and UT of Ladakh by India, and Aksai Chin by China.
    Source and link: Wikimedia Commons.

     Indo-Pakistani motivations behind the Kashmir conflict 

    The inability - or unwillingness - to take significant steps towards the resolution of Kashmir’s current state of affairs by both New Delhi and Islamabad conceals deep-rooted interests and discourses on both sides of the conflict: Kashmir’s resource-rich nature and important role as a water supplier make it vital for both countries’ economy. From a geopolitical point of view, the region serves as a bridge connecting South Asia to Central Asia and China, constituting a major economic corridor for both India and Pakistan. Apart from these obvious reasons, Kashmir plays a bigger role in both countries’s identity; let us analyze each of the two nations’ point of view:

    • India’s discourses and interests in Kashmir: there are three major motivations behind New Delhi’s desire to control Kashmir:
    1. Muslim Kashmir as a confirmation of India’s pluralist and secular federalism: Kashmir gradually became the symbol of India’s secular side of the political debate, which saw the region’s internal and external diversity as the alternative to hindu-nationalism. 
    2. Avoid the Balkanisation of the country: granting Kashmir independence would in turn foment nationalisms all over the diverse Indian nation, posing a serious threat to the country’s stability and unity.
    3. Avoid the radicalisation of the subcontinent: as many analysts claim, an independent (even more Pakistani) Kashmir would likely become a safe haven for islamic fundamentalism, which would then easily spill into India fomenting religious radicalism (islamic in action, hindu in reaction).
    • Pakistan’s discourses and interests in Kashmir: similarly to India, we find three main reasons for the country’s claims on Kashmir:
    1. Muslim Kashmir as the last piece in the national unification process: Pakistan gradually came to perceive itself as the homeland in which all muslims of South Asia could unite under one common Islamic Republic; given this self-bestowed identity and role, Kashmir - being the only muslim region of the subcontinent not under Pakistani control - represents the ultimate confirmation of the country’s identity.
    2. Religious sentiment as a means to ensure national unity: given the complex internal problems currently faced by the country, promoting the narration of a jihad in Kashmir against foreign oppressors could unite the people of Pakistan and distract them from bigger looming problems.
    3. The Pakistan Army’s major role in the country: the historical importance of the army in Pakistan has given it a great amount of political power; any (quasi) conflict increases the army’s power and legitimacy within society, whereas any stability has the opposite effect. Given the army’s weight in the decisions of Islamabad, it is no wonder that the government has so far promoted a policy of destabilization across Kashmir. 

     Conclusion

    As this paper has shown, Kashmir is a complex region with a unique history and identity. Despite the erosion of Kashmiriyat tolerance and the rise of religious fundamentalism caused by seven decades of war, this identity still exists and should not be ignored by Indo-Pakistani processes of national homogenisation; it should rather be given voice to by official political channels, so as to avoid the proliferation of alternative violent forms of civic engagement - namely terrorism. Granting the region autonomy (as mentioned in the third solution of the third section of this paper) could be a mean to avoid this; however, given Kashmir’s complex political division and the clashing interests and discourses of India and Pakistan, a joint or separate autonomy for the region seems highly unlikely in the short run. While India perceives protests in Kashmir as the product of a Pakistani-backed radical minority, Pakistan sees the turmoils as a natural expression of the popular religious and nationalistic sentiment; consequently, each country believes the other to be the main reason behind the continuation of the conflict, and itself as the only solution to it. Given its position, a prolonged destabilization and radicalisation of Kashmir could bear consequences on the larger Asian region; given the nuclear-power status of both India and Pakistan, a worsening of their relations could have repercussions on the larger international community. It is therefore of utmost importance to avoid the crystallization of the conflict. Three important steps could have positive effects in this direction: 

    • Promote local forms of civic and political engagement (as opposed to India’s abrogation of article 370 and the consequent disruptive effect that it had on Kashmiri society). 
    • Take concrete actions tackling regional fundamentalism and terrorism (as opposed to Pakistan’s current ambiguity and past sponsorship of major radical islamist groups).
    • Promote Indo-Pakistani confidence-building measures to reduce fear and mutual mistrust,  thereby creating a channel for communication and ultimately cooperation (as opposed to the historically poor Indo-Pakistani relations characterized by 4 major wars and several clashes).

    While the international community has since the failed UN mediation of 1947 always regarded Kashmir as a private issue between the two countries, it is by now clear that India and Pakistan alone are unable - or unwilling - to come to realistic solutions. The international community should then change its approach to Kashmir and act as a mediator between New Delhi and Islamabad in order to ensure the fulfillment of the three policies just mentioned, able to constitute a solid basis from which to later achieve a more ambitious regional autonomy; major actors directly affected by the region’s instability - such as China or Russia - could start working in this direction, consequently dragging the US and the EU (both afraid of leaving the region in the hands of Moscow and Beijing) into the region with the UN supervising cooperation among great powers. The need to change our approach to the Kashmir conflict is drastic and urgent, for it affects not only the region’s stability and security, but that of the international community as a whole.