{"id":218691,"date":"2025-12-12T21:04:35","date_gmt":"2025-12-12T21:04:35","guid":{"rendered":"https:\/\/yogaesoteric.net\/?p=218691"},"modified":"2025-12-12T21:04:35","modified_gmt":"2025-12-12T21:04:35","slug":"10-trends-for-the-future-of-warfare","status":"publish","type":"post","link":"https:\/\/yogaesoteric.net\/en\/10-trends-for-the-future-of-warfare\/","title":{"rendered":"10 Trends for the Future of Warfare"},"content":{"rendered":"<p>Stories about killer robots, machine-augmented mercenaries, laser weapons and battles in space \u2013 outer or cyber \u2013 have always been good for filling cinema seats, but now they have started to liven up sober academic journals and government white papers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-218695\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/killer-robots-1.jpg\" alt=\"\" width=\"560\" height=\"315\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/killer-robots-1.jpg 960w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/killer-robots-1-300x169.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/killer-robots-1-768x432.jpg 768w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>However, war is about much more than combat or how we fight. Is the sensationalism of high-tech weaponry blinding us to technology\u2019s impact on the broader social, political and cultural context that determines why, where and when war takes place, what makes it more or less likely, and who wins?<\/p>\n<p>Consider artificial intelligence (AI). The potential for developing lethal autonomous weapons systems grabs headlines (\u201c<em>killer robots!<\/em>\u201d), but the greatest impact of AI on conflict may be socially mediated. Algorithmically-driven virtual communication connections funnel people into trans-national but culturally enclosed echo-chambers, radicalising their world-view.<\/p>\n<p>As robots relieve humans of their jobs, some societies will prove better prepared than others in their use of education and infrastructures for transitioning workers into new, socially sustainable and economically productive ways to make a living. Less prepared nations could see increasingly stark inequality, with economically-excluded young people undermining social stability, losing faith with technocratic governance, and spurring the rise of leaders who aim popular anger at an external enemy.<\/p>\n<p>Looking beyond individual technologies allows us to focus on the broader and deeper dimensions of the change coming our way. Professor Klaus Schwab, chairman and founder of the World Economic Forum, argues that the collapse of barriers between digital and physical, and between synthetic and organic, constitutes a Fourth Industrial Revolution, promising a level of change comparable to that brought about by steam power, electricity and computing.<\/p>\n<p>Something that makes this revolution fundamentally different is how it challenges ideas about what it means to be human. For instance, neuroscience is teaching us more about our own fallibility, and also just how \u2018hackable\u2019 humans are. As science continues to uncover difficult truths about how we really operate, we will have to confront basic assumptions about the nature of human beings. Whether this deep transformation will reinforce or undermine a shared sense of human dignity, and what effects it will have on our relationship with organized violence, remain open to question.<\/p>\n<p>The experience of past industrial revolutions can help us begin to search for answers about how this will change the wider context of international security. In the first industrial revolution, deposits of coal and iron ore were one factor determining the \u201cwinners\u201d in terms of economic and geopolitical power.<\/p>\n<p>Today, new modes and artefacts of industrial production will also change demand patterns, empowering countries controlling supply and transit, and disempowering others. Progress in energy production and storage efficiency, for instance, is likely to have profound consequences for the petro-economies and the security challenges of their regions. Although the set of natural resources critical to strategic industries will change, their use as a geo-economic tool will probably be repeated.<\/p>\n<p>For instance, this is widely thought to have occurred when, in the midst of a maritime dispute with Japan in 2010, China restricted export of \u2018rare earths\u2019 that are critical for computing, sensors, permanent magnets and energy storage. With ever more commercial and military value embedded in the technology sector, such key materials will be deemed \u201ccritical\u201d or \u201cstrategic\u201d in terms of national security, and be subject to political as well as market forces.<\/p>\n<p>The 19th Century Industrial Revolution showed how technological asymmetry can translate into geopolitical inequality \u2013 in the words of Hilaire Belloc\u2019s poem \u201c<em>The modern traveller<\/em>,\u201d spoken by a European about Africa: \u201c<em>Whatever occurs, we have got the Maxim Gun, and they have not<\/em>\u201d. (The Maxim Gun was the first recoil-operated machine gun).<\/p>\n<p>What will be the Maxim Gun of our time? Who will have it, and who will not? In the 20th Century, the \u2018haves and have-nots\u2019 of the nuclear weapons club membership became the major determinant of the post-war global order, and \u2013 as seen in the cases of Iran and North Korea today \u2013 this continues to be relevant. Stealth technology and precision guided missiles used to impose a \u201cnew world order\u201d in the early 1990s showed how the gap in military capability separated the United States from others, sustaining its leadership of a \u201cunipolar\u201d order.<\/p>\n<p>According to the US deputy secretary of defence Robert Work, \u201c<em>There\u2019s no question that US military technological superiority is beginning to erode<\/em>\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-218701 aligncenter\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-2-scaled.webp\" alt=\"\" width=\"560\" height=\"315\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-2-scaled.webp 2560w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-2-300x169.webp 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-2-1024x576.webp 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-2-768x432.webp 768w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-2-1536x864.webp 1536w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-2-2048x1152.webp 2048w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>History can only tell us only so much. There is a need for fresh thinking about the implications of the Fourth Industrial Revolution for international security.<\/p>\n<p><strong>Strategic destabilisation<\/strong><\/p>\n<p><strong>1. Waging war may seem \u201ceasier\u201d.<\/strong> If increased reliance on machines for remote killing makes combat more abstract from our everyday experience, could that make it more tolerable for our societies, and therefore make war more likely? Those who operate lethal systems are ever more distant from the battlefield and insulated from physical danger, but this sense of advantage may prove illusory. Those on the receiving end of technological asymmetries have a stronger incentive to find other ways to strike back: when you cannot compete on a traditional battlefield, you look to where your adversary is vulnerable, such as through opportunistic attacks on civilians.<\/p>\n<p><strong>2. Speed kills.<\/strong> \u201c<em>The speed at which machines can make decisions in the far future is likely to challenge our ability to cope, demanding a new relationship between man and machine<\/em>.\u201d This was the assessment of US Major General William Hix at a conference on the future of the Army in October 2016. The speed of technological innovation also makes it hard to keep abreast of new military capabilities, easier to be misled on the actual balance of power, and to fall victim to a strategic miscalculation. The fact that some capabilities are deliberately hidden just makes it harder. Because offensive cyber capability relies so much on exploiting one-off vulnerabilities, it is difficult to simultaneously demonstrate and maintain a capability. Once a particular vulnerability has been exploited, the victim is alerted and will take steps to fix it. General Hix again: \u201c<em>A conventional conflict in the near future will be extremely lethal and fast, and we will not own the stopwatch<\/em>.\u201d<\/p>\n<p><strong>3. Fear and uncertainty increase risk.<\/strong> The expectation that asymmetries could change quickly \u2013 as may be the case with new strategic capabilities in areas like artificial intelligence, space, deep sea and cyber \u2013 could incentivise risk-taking and aggressive behaviour. If you are confident that you have a lead in a strategically-significant but highly dynamic field of technology, but you are not confident that the lead will last, you might be more tempted to use it before a rival catches up. Enhanced capacity to operate at speed puts security actors into a constant state of high alert, incentivises investment in resilience, and forces us to live with uncertainty. Under these conditions, war by mistake \u2013 either through over-confidence in your ability to win, or because of exaggerated threat perception \u2013 becomes more likely.<\/p>\n<p><strong>4. Deterrence and pre-emption<\/strong>. When new capabilities cause a shift in the balance between offensive and defensive advantage \u2013 or even the perception of such a shift, it could increase the incentives for aggression. For example, one of the pillars of nuclear deterrence is the \u201csecond strike\u201d capability, which puts the following thought into the consciousness of an actor contemplating a nuclear attack: \u201c<em>even if I destroy my opponent\u2019s country totally, their submarines will still be around to take revenge<\/em>\u201d. But suppose swarms of undersea drones were able to track and neutralize the submarines that launch nuclear missiles? Long-range aerial drones can already navigate freely across the oceans, and will be able to fly under the radar deep into enemy territory. Such capabilities make it possible in theory for an actor to escape the fear of second-strike retaliation, and feel safer in launching a pre-emptive strike against aircraft in their hangars, ships in port, and critical infrastructure, with practically no chance of early warning. Indeed, cyberattacks on banks, power stations and government institutions have demonstrated that it is no longer necessary to fly bombers around the world to reach a distant enemy\u2019s critical infrastructure without early warning. The idea of striking a \u2018knockout blow\u2019 may come to seem feasible once more.<\/p>\n<p><strong>5. The new arms race is harder to control<\/strong>. One of the mechanisms for strategic stability is arms control agreements, which have served to limit the use of nuclear, biological and chemical weapons. When it comes to the multiple combinations of technology we see as a hallmark of the Fourth Industrial Revolution, one of the obstacles to international agreement is caused by uncertainty about how strategic benefits will be distributed. For instance, the international community is currently debating both the ethics and practicality of a ban on the development of lethal autonomous weapons systems. One of the factors holding this debate back from a conclusion is a lack of consensus among experts about whether such systems would give an advantage to the defender or the attacker, and hence be more likely to deter or incentivize the escalation of conflict. Where you stand on the issue may depend on whether you see yourself as a master of the technology, or a victim. Another obstacle to imposing control is the wider cast of players.<\/p>\n<p><strong>6. A wider cast of players.<\/strong> As cutting-edge technology becomes cheaper, it spreads to a wider range of actors. Consider the development of nuclear bombs \u2013 the last breakthrough in weapons technology that re-wrote the rules of international security. Although the potential for a fission bomb was understood in terms of theoretical physics, putting it into practice involved thousands of scientists and billions of dollars \u2013 resources on a scale only a few nations could muster. Over 70 years later, the club of nuclear weapons states remains exclusively small, and no non-state actor has succeeded in acquiring nuclear capability.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-218698\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/nuke-3.jpg\" alt=\"\" width=\"560\" height=\"308\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/nuke-3.jpg 2000w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/nuke-3-300x165.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/nuke-3-1024x563.jpg 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/nuke-3-768x422.jpg 768w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/nuke-3-1536x845.jpg 1536w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>In contrast, there are more than 70 nations operating earth-orbiting satellites today. Nano-satellites are launched by Universities and Corporations. A growing list of companies can launch and recover payloads on demand, meaning even small states can buy top-notch equipment \u201coff the shelf\u201d. As Christopher Zember put it, \u201c<em>Once the pinnacle of national achievement, space has become a trophy to be traded between two business owners<\/em>\u201d. These days, even a committed enthusiast can now feasibly do genetic engineering in their basement. Other examples of dual-purpose technologies include encryption, surveillance, drones, AI and genomics. With commercial availability, proliferation of these technologies becomes wider and faster, creating more peer competitors on the state level and among non-state actors, and making it harder to broker agreements to stop them falling into the wrong hands.<\/p>\n<p><strong>7. The grey zone<\/strong>. The democratisation of weaponisable technology empowers non-state actors and persons to create havoc on a massive scale. It also threatens stability by offering states more options in the form of \u201chybrid\u201d warfare and the use of proxies to create plausible deniability and strategic ambiguity. When it is technically difficult to attribute an attack \u2013 already true with cyber, and becoming an issue with autonomous drones \u2013 conflicts can become more prone to escalation and unintended consequences.<\/p>\n<p><strong>8. Pushing the moral boundaries<\/strong>. Institutions governing legal and moral restraints on the conduct of war or controlling proliferation date from an era when massively destructive technology was reserved to a small, distinct set of actors \u2013 mostly states or people acting under state sponsorship. The function of state-centric institutions is impaired by the fact that states\u2019 militaries are no longer necessarily at the cutting edge of technology: most of the talent driving research and development in today\u2019s transformative dual-use technologies is privately employed, in part because the private sector simply has access to more money. For example, the private sector has invested more in AI research and development in five years than governments have since AI research first started. Diminishing state control of talent is epitomised by Uber`s recruitment of a team of robotics researchers from Carnegie Mellon University in 2015, which decimated the research effort they had had been working on for the United States department of Defence.<\/p>\n<p>The fact that the trajectory of research \u2013 and much of the infrastructure critical to security \u2013 are in private hands need not be a problem if state actors were able to exercise oversight through traditional means such as norms development, regulation and law-making. However, the pace and intensity of innovation, and difficulty of predicting what new capabilities will be unleashed as new technologies intersect, makes it difficult for states to keep up. State-centric institutions for maintaining international security have failed to develop a systematic approach to address the possible long-term security implications of advances in areas as diverse as nanotechnology, synthetic biology, big data and machine learning. Nor have industry-led measures yet filled the gap.<\/p>\n<p><strong>9. Expanding domains of conflict.<\/strong> Domains of potential conflict such as outer space, the deep oceans, and the Arctic \u2013 all perceived as gateways to economic and strategic advantage \u2013 are expanding via new technologies and materials that can overcome inhospitable conditions. Like cyberspace, these are less well-governed than the familiar domains of land, sea and air: their lack of natural borders can make them difficult to reconcile with existing international legal frameworks, and technological development is both rapid and private sector-driven, which makes it hard for governance institutions to keep up.<\/p>\n<p>Those who secure \u201cfirst mover\u201d advantage may also seek to defend it against the establishment of regulation and governance in the common interest. Access to the technology needed to reach and exploit space, for example, allows belligerents to compromise the effectiveness of defensive measures that rely on satellites for communications, navigation, command and control technology. Even a very limited strike on a satellite would likely cause space debris, damaging systems used by the wider community. Despite a 1967 United Nations treaty calling for the peaceful use of Space, the United States Deputy Secretary of the Air Force recently warned that \u201c<em>there is not an agreed upon code of conduct<\/em>\u201d for space operations.<\/p>\n<p><strong>10. What is physically possible becomes likely<\/strong>. History suggests that any technology \u2013 even one that gives moral pause \u2013 will eventually be developed in order to be used as a weapon. As the political theorist Carl Schmitt explained, political conflict is the \u201c<em>realm of exception<\/em>\u201d in all sorts of ways that make the morally unthinkable not only possible, but more likely. Professor Ole W\u00e6ver and the Copenhagen School of International Relations developed the concept of \u201c<em>securitisation<\/em>\u201d to describe how a security actor invokes the principle of necessity as a way of getting around legal or moral restraints. Policy-makers can argue that because non-state actors, terrorist and criminal groups can access new technology, they are obliged to pursue weaponization, in order to prepare an adequate defence. Public disquiet can also be bypassed by conducting research in secret; we now know from de-classified accounts of Cold War studies that soldiers were used as guinea pigs to research the effects of new weapons, and military experiments may well be underway today in areas such as human enhancement. The tendency for the logic of conflict to drive the development of technology beyond what is considered acceptable by society under normal conditions is one more reason to pay closer attention to trends in this field.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-218704\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-4.jpg\" alt=\"\" width=\"560\" height=\"336\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-4.jpg 1908w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-4-300x180.jpg 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-4-1024x615.jpg 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-4-768x461.jpg 768w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/solider-4-1536x923.jpg 1536w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p><strong>Institutional shifts<\/strong><\/p>\n<p>International Security is destabilised at the institutional level by the way the 4th Industrial Revolution is empowering the people through technology, and the way that blurs the lines between war and peace, military and civilian, domestic and foreign, public and private, and physical and digital. The democratisation of destruction has been mentioned above, but non-state groups\u2019 leveraging of global virtual communication networks \u2013 whether to gain support, undermine the morale of opponents, sow confusion, or provoke a response that will create an advantage \u2013 has increased the strategic importance of shaping perceptions and narratives about international security. ISIS\u2019s use of online videos provides an extreme example of a non-state actor using virtual communication networks to drive recruitment, while state security services in select countries employ online \u201ctrolls\u201d on a large scale. Consider the implications for democratic control over armed force when technologies like big data analytics, machine learning, behavioural science and chatbots are fully enlisted in the battle over perceptions and control of the narrative.<\/p>\n<p>The hacking attack suffered by Sony Pictures Entertainment in 2014, allegedly motivated by North Korea\u2019s political grievance, highlights these blurring lines \u2013 and the resulting difficulty of deciding who should be responsible for security in this new reality. If someone were so offended by a movie that they burned down the studio\u2019s warehouse, one would expect the police to step in. But is it ultimately the responsibility of the state or of corporations to prevent or deter the kind of attack experienced by Sony Pictures? What is the appropriate response? When does an attack on a private company constitute an act of war? As an increasing proportion of what we value gets uploaded onto a global infrastructure of information and communications technology, do we expect it to be protected by service providers like Apple, or by our state\u2019s security agencies?<\/p>\n<p>Little by little, the responsibility for defending citizens is effectively shifting away from the state and towards the private sector. It is, for example, your bank\u2019s security chief who bears responsibility for protecting your money from international cyber theft, whether it comes from straightforward criminal groups or those acting under the sponsorship of sovereign states. A report by Internet security company McAfee and the think-tank CSIS estimated the likely annual cost to the global economy from cybercrime at more than $400 billion \u2013 roughly equivalent to the combined defence spending of the European Union, or the Asia region.<\/p>\n<p>According to 17th century political theorist Thomas Hobbes, the citizen agrees to give up some freedom and render loyalty in exchange for protection and to escape the \u201c<em>natural condition<\/em>\u201d of life, which was otherwise \u201c<em>solitary, poor, nasty, brutish, and short<\/em>\u201d. In return, the state expects respect for its laws. But if citizens lose confidence in the state\u2019s capacity to guarantee their security, be it through military protection or domestic justice and policing or social safety nets, they may also feel less of an obligation to be loyal to the state in return. In effect, the unravelling of the Hobbesian \u201c<em>social contract<\/em>\u201d. This can undermine mechanisms for global governance, which consist of inter-state institutions that rely on state power for their effectiveness.<\/p>\n<p>Could the relative loss of state power fatally undermine the system of international security? Several well-known tech entrepreneurs have talked in ways that suggest they see national governments not as a leader in norms development, but as an unnecessary inconvenience. Genetics innovator Balaji Srinivasan has envisioned \u201c<em>Silicon Valley`s ultimate exit<\/em>\u201d from the USA. PayPal co-founder Peter Thiel has floated the idea of establishing a sea colony to literally offshore himself from government regulation. Elon Musk has talked about colonising Mars. There is serious interest in businesses formulating their own foreign policy. These are interesting ideas, but until there is a credible rival the state for the role of main international security actor to meet the challenges of the Fourth Industrial Revolution, the character of state action on security will need to adapt to the new environment, re-position itself to accommodate other actors, and renegotiate relations across a widespread network of partnerships.<\/p>\n<p><strong>What is to be done?<\/strong><\/p>\n<p>As attitudes adapt to the new distribution of security responsibility between people, companies and institutions of governance, there is a need for a new approach to international security. There is plenty of room for debate about how that approach should look, but the baseline can be drawn through three points: it will need to be able to think long-term, adapt rapidly to the implications of technological advances, and work in a spirit of partnership with a wide range of stakeholders.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-218692\" src=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/AI-weapons-5.png\" alt=\"\" width=\"560\" height=\"336\" srcset=\"https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/AI-weapons-5.png 1140w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/AI-weapons-5-300x180.png 300w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/AI-weapons-5-1024x614.png 1024w, https:\/\/yogaesoteric.net\/wp-content\/uploads\/2025\/12\/AI-weapons-5-768x461.png 768w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>Institutional barriers between civilian and military spheres are being torn down. Outreach to Silicon Valley is a feature of current US Defence policy, for example, as are invitations to hackers to help the Department of Defence to maintain its advantage in the digital domain. The \u201c<em>third offset strategy<\/em>\u201d promoted by US Defence Secretary Ashton Carter is based on a recognition that private sector innovation has outstripped that of military institutions in the post-Cold War era, and a more open relationship with business as well as with academic and science institutions could prove vital to maintaining the dominance of US military capabilities.<\/p>\n<p>Such is the speed, complexity and ubiquity of innovation today, we need a regulation process that looks ahead to how emerging technologies could conceivably be weaponized, without holding back the development of those technologies for beneficial ends. \u201c<em>Hard governance<\/em>\u201d of laws and regulations remain necessary, but we will also need to make more use of faster-moving \u201c<em>soft governance<\/em>\u201d mechanisms such as laboratory standards, testing and certification regimes, insurance policies and mechanisms like those set up by academics to make potentially dangerous research subject to approval and oversight. This will need to proactively anticipate and adapt to not only technological changes, but also macro-cultural ones, which are a lot harder to predict.<\/p>\n<p>States and other security actors need to start exploring with each other some of the concepts and modes of operation that would make such a networked approach sustainable, legitimate and fit for the ultimate purpose of maintaining stability and promoting peaceful coexistence in the emerging international security landscape.<\/p>\n<p>Instead of meeting each other in court, as the FBI met the Apple Corporation to settle their dispute about encryption, security providers could meet across a table, under new forms of public oversight and agile governance, as partners in a common endeavour. Instead of struggling along in denial, or wasting energy trying to fight the inevitable, stakeholders who have been working in parallel siloes can learn to collaborate for a safer world. What cast of actors populate this wider security ecosystem? What are shared priorities in terms of risks? What are some of the potential models for peer to peer security? How can the 4th Industrial Revolution be used to give citizens a stronger sense of control over choices of governance, or to deny space to criminal organizations and corrupt practices? Can smart contracts using block chain technology be applied to build confidence in financial transactions and peace agreements? Can defensive alliances be expanded to include or even consist entirely of non-state actors? Should international law extend the right to use proportionate force in self-defence in cyber conflict to commercial actors? What aspects of these challenges are a matter for legal instruments and regulation, and what aspects will require a new approach?<\/p>\n<p>The future of national security may lie in models of self-defence that are decentralised and networked. As Jean-Marie Gu\u00e9henno, CEO of the International Crisis Group, wrote: \u201c<em>distribution of security measures among a multiplicity of actors \u2013 neighbourhoods, cities, private stakeholders \u2013 will make society more resilient. And over time, smaller but well-connected communities may be more effective at preventing and identifying terrorist threats among their members<\/em>.\u201d Several of the critical ingredients of such a de-centralized model are becoming available: more security responsibility is being taken up by city mayors and even civil society groups. So far, however, this has been a haphazard phenomenon and its impact is diminished by a lack of coordination.<\/p>\n<p>The answers that may emerge to these questions are unpredictable \u2013 but what is clear is the need to have a conversation that reaches across generations and across disciplines. International security is threatened by a loss of trust, in particular between those who drew power from the last industrial revolution and those whose power is rising within a fluid and complex environment. The conversation needs to foster mutual understanding, dispel unjustified fears, and revive public confidence in new forms of responsive leadership that manifestly serve the common good.<\/p>\n<p><em>Author: Brandon Campbell<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><strong>yogaesoteric<br \/>\nDecember 12, 2025<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stories about killer robots, machine-augmented mercenaries, laser weapons and battles in space \u2013 outer or cyber \u2013 have always been good for filling cinema seats, but now they have started to liven up sober academic journals and government white papers. However, war is about much more than combat or how we fight. Is the sensationalism [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[1182],"tags":[1516],"class_list":["post-218691","post","type-post","status-publish","format-standard","hentry","category-state-sponsored-terror-in-the-world-3480-en","tag-article_of_the_week"],"_links":{"self":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/218691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/comments?post=218691"}],"version-history":[{"count":1,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/218691\/revisions"}],"predecessor-version":[{"id":218707,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/posts\/218691\/revisions\/218707"}],"wp:attachment":[{"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/media?parent=218691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/categories?post=218691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yogaesoteric.net\/en\/wp-json\/wp\/v2\/tags?post=218691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}