Closure of the Strait of Hormuz: Is Alaska the Plan for a Bailout? 

By Lola McEwen – Rise to Peace Fellow 

This past year, President Donald Trump met with President Vladimir Putin at a summit at Joint Base Elmendorf-Richardson (JBER) in Anchorage, Alaska, primarily discussing the state of the war in Ukraine. This invitation marked a huge step Putin and the Kremlin likely did not believe would happen anywhere in the near future from the many nations who sided heavily with Ukraine after Russia’s 2022 invasion. Putin’s travel had been obviously limited to only countries that were in support of Russia, North Korea and Belarus. While many journalists were expecting a traditional press conference, it seemed the two leaders were simply there to make pre-planned statements, including Putin addressing Russia’s history with Alaska. While not much was said regarding the war in Ukraine, Putin did express his opinion that a ceasefire could not be negotiated until the “root causes” of the conflict could be resolved [5]. Trump only indirectly referenced Ukraine, stating that there needed to be an end to the bloodshed, saying that he and Putin had an “extremely productive meeting”, yet there did not seem to be any real steps to solving the conflict. The summit did seem to open up doors for future United States and Russia diplomatic relations, with Putin making a rare statement in English stating that they could meet, “Next time in Moscow”[5]. 

What Does This Mean for Diplomacy Between the Two Countries?

With the recent mending of ties between the United States and Russia, it makes us wonder just how open those doors are for future diplomacy between the two nations. According to American financier Gentry Beach, those doors have already been thrown wide open, with a deal being made between Beach and Russian natural gas company Novatek [3]. While Beach confirmed the relationship, amid failure to admit association with Beach by Novatek, Beach did admit that they still had several hurdles to overcome to be able to continue with the deal to liquefy natural gas in remote Alaska. Beach has long been associated with the Trump family, originally a college friend of Donald Trump Jr. (Soldatkin & Khalip, 2026). Beach even helped raise funds for Trump’s first election campaign in 2016. The deal was allegedly made between Beach and Leonid Mikhelson, Novatek’s chief executive, in Dubai and Europe last year [4]. Beach denied any role that the Trumps could have played in this deal, saying this had nothing to do with the U.S.-Russia peace talks, but that Washington and Moscow alike were both very well informed about the negotiations at hand [4]. While Beach and Novatek claim to not tie this deal explicitly to their respective governments, it does bring multiple questions of what sanction laws are in play for these dealings, and what future economic deals between the two countries can come of this, even with the war in Ukraine continuing. 

What Sanctions Are in Place? 

While Russia originally had many sanctions put on them starting in 2014 for undermining Ukraine such as EO 13660 and EO 13662, additional sanctions were placed in 2022 following the war in Ukraine specifically the ban on Russian oil importing EO 14066, and a ban on new investment and services to Russia EO 14071. The latter are most likely in play with Beach’s deal in Alaska for the LNG Project, with TotalEnergies, a french company, at the head. TotalEnergies had a previous relationship with Novatek, including holding a major stake in Novatek which they have reported an inability to be able to sell the rest of their stake due to previous agreements. However, it is starting to look like TotalEnergies will not have to worry about selling the rest of their stake as they may be back in business with Novatek once again, the question is, how can Novatek legally work on the Alaska LNG Project with the amount of sanctions that are working against them? 

What Do Alaskans Think? 

Alaskans have responded against the news of Novatek’s involvement, with Anchorage Daily News stating their own opinion that, “Alaska energy projects should benefit Alaskans, not Russians.” The article makes it clear that the Russian sanctions were put into place because of Russia’s international law violations, human rights offenses, election interference and hostile cyberattacks [2]. The article also states, “What do we stand for if we drop sanctions when an opportunity rises?” With the current sanctions in place, it seems that Novatek and Beach would need approval from both Putin and Trump, which they seem to have, without the knowledge of the Alaskan people which this deal disrupts the most. The article also claims that there have been confusing statements made, including Novatek stating that U.S. made equipment will be used, when Beach claimed that Novatek already has partially built one of the units. The article also brings up how this would affect the villages, including tankers, who will have to stay several miles offshore considering the North Slope has an extremely shallow shoreline, and how whale hunting will significantly decrease due to tanker traffic. It is simply not plausible to consider an option without a pipeline, especially considering that the Alaskan people have been promised for years that the LNG pipeline project from the North Slope to Nikiski, Alaska, will be implemented, meaning affordable natural gas for several communities. The authors also make the point that Alaska is a resource-based economy, meaning this pipeline could support several of the next generations of Alaskans to live off of and to work for. This can also reduce the risk of pollution in the Kuskokwim River which is currently the route that diesel tankers take to supply gas to villages [2]. 

How Does the Conflict in the Middle East Affect the LNG Project? 

With the developing Iranian-Israel and U.S. conflict in the middle east, Russia has offered to supply Europe with oil that has been depleted by the closing of the Strait of Hormuz, with Europe declining help from Russia and steadfastness on their sanctions from the start of the Ukraine war. However, Asian countries have been affected the worst from the conflict, leading to the acceptance of Russia’s offer boosting their economy for the first time since Russia invaded Ukraine. With the recent updates on the LNG project after years of halt, especially with the advancement being at the hands of a Russia-U.S. agreement on lowering sanctions, it does make one wonder whether the United States considered Russia’s oil supply when making the decision to enter a conflict with Iran, knowing the risk to the Strait of Hormuz, and could Alaska have played a major role in this decision without the public knowing? 

What Is Left for the Project to Get the Go-Ahead? 

According to Reuters, Glenfarne, the company that owns 75% of the project, says that the war in the middle east has sparked Asia’s interest in the project, especially since the Alaska LNG project does not have any “choke points” according to Brendan Duval, Glenfarne’s CEO [1]. The open waters that surround Alaska is a significant selling point, in contrast to the Strait of Hormuz that can be and is currently significantly impacted by war and territory control. While the LNG project is still delayed because of the failure to meet the target of signing binding offtake deals for 80% of the planned export capacity of 20 million metric tons a year of liquefied natural gas, the project is already at an agreed upon 13 million, meaning they only need a signed 3 million more, which may very well be met with credits to the conflicts in the middle east. Duval claims that Thailand, Taiwan, Japan, and Korea have all signed on the deal, most importantly because of the positioning of Alaska [1]. Japan’s two biggest LNG importers, JERA and Tokyo Gas, have already reportedly agreed to deals to buy 2 million metric tons a year from the Alaska LNG project. Duval also stated that a Greek firm Danaos aims to deliver LNG carriers around the time the project is expected to begin, which Duval states is 2031. Duval also claims that another bonus to the Alaska LNG project is that the ice flows allow regular LNG carriers, allowing any LNG carrier globally to come and go [1].

Was This a Strategic Move Made Several Months Ahead? 

While Europe may continue to ice out Putin, President Trump may have been looking several steps ahead when meeting with Putin last summer in Alaska. While Europe continues to condemn the United States move to decrease sanctions on Russia, the United States economy may remain significantly more stable than European countries following the Iranian conflict with this seemingly new deal with Russia, beginning with the Alaska LNG project. This move may also strengthen ties between the United States and Asian countries, with Asia looking for a bail out after the unexpected closing of the Strait of Hormuz, causing disaster for all oil companies not only exporting from the middle east, but for countries that imported from them. The International Energy Agency may also feel relief if the United States is able to help supply not only themselves, but also several other countries with the Alaska LNG project, even though it comes with the cost of supporting Russia’s economy. 

References 

[1] Golubkova, K., Obayashi, Y., & Reuters. (2026, March 15). Spurred by Gulf War, Alaska LNG aims for go-ahead decisions in 2026-27 and exports in 2031. Reuters

https://www.reuters.com/business/energy/spurred-by-gulf-war-alaska-lng-ai ms-go-ahead-decisions-2026-27-exports-2031-2026-03-16/ 

[2] James, M., & James, D. (2026, March 5). Opinion: Alaska needs a gas pipeline, not a North Slope export shortcut. Anchorage Daily News.

https://www.adn.com/opinions/2026/03/05/opinion-alaska-needs-a-gas-pip eline-not-a-north-slope-export-shortcut/ 

[3] Soldatkin, V., & Khalip, A. (2026, February 20). Trump ally ties up with Russia’s Novatek on natural gas in Alaska, NYT reports. Reuters. Retrieved March 2, 2026, from 

https://www.reuters.com/business/energy/trump-ally-ties-up-with-russias-n ovatek-natural-gas-alaska-nyt-reports-2026-02-20/ 

[4] Troianovski, A. (2026, February 19). With ‘Tremendous’ Deals at Stake, Trump Is Bringing Russia in From the Cold. The New York Times. Retrieved March 2, 2026, from 

https://www.nytimes.com/2026/02/19/us/politics/trump-russia-deals-novate k.html 

[5] Trump and Putin Alaska summit: Five takeaways from the meeting. (2025, August 15). BBC. Retrieved March 1, 2026, from 

https://www.bbc.com/news/articles/c4gj9er0x0zo

Biometrics, Surveillance & Rights: The DHS Vision vs. Civil Liberties

By Mildred Miranda – Rise to Peace Fellow

The expansion of biometric integration across the Department of Homeland Security in 2026 represents a pivotal transformation in American security governance. The proposal to unify facial recognition, fingerprint databases, and interoperable identity systems across agencies signals a decisive shift toward centralized technological coordination. The justification for this integration rests on counterterrorism efficiency, border security enhancement, and investigative speed. The modernization effort reflects the belief that fragmented databases create operational blind spots exploitable by transnational extremist networks. The consolidation of biometric architecture promises streamlined identification processes and reduced interagency lag. The national debate emerging around this initiative demonstrates that technological capacity now intersects directly with constitutional interpretation. The broader implications of this development extend beyond administrative efficiency and into foundational questions about surveillance, democratic accountability, and civil liberties protection.

Historical Context: The Post-9/11 Security Evolution

The evolution of biometric systems in the United States traces back to the security recalibrations following the September 11 attacks. The institutional emphasis on identity verification became central to homeland security doctrine, particularly in immigration screening and counterterrorism intelligence. The early adoption of fingerprint databases and traveler screening programs gradually expanded into facial recognition technologies deployed at airports and border crossings. The incremental development of interoperable data platforms reflected a belief that identity certainty enhances national resilience. The maturation of algorithmic recognition systems improved speed and analytical accuracy, encouraging broader operational reliance. The current integration initiative builds upon this two-decade trajectory of technological adoption. The institutional memory of past security failures reinforces the perception that information silos pose unacceptable risk in an era defined by fluid and adaptive extremist threats.

Strategic Rationale: Identity Certainty and Extremism Prevention

The strategic rationale behind unified biometric search architecture emphasizes identity certainty as a cornerstone of extremism prevention. The capacity to cross-reference multiple databases simultaneously reduces the likelihood that individuals operating under aliases evade detection. The integration of biometric identifiers strengthens verification processes at ports of entry and within investigative contexts. The operational appeal lies in speed, as automated matching can replace time-consuming manual coordination. The prevention narrative surrounding this initiative suggests that seamless identification deters exploitation of bureaucratic fragmentation. The assumption underlying this framework is that extremist actors rely upon identity manipulation to facilitate mobility and concealment. The consolidation of systems therefore appears as a rational modernization measure within counterterrorism strategy. The operational benefits, however, must be assessed alongside broader governance consequences that extend beyond tactical efficiency.

The Limits of Technology: Radicalization Beyond Borders

The preventive utility of biometric systems must be examined within the contemporary landscape of radicalization. The emergence of decentralized online extremism complicates the assumption that identity verification alone disrupts threat pathways. The increasing prevalence of lone-actor mobilization rooted in digital ecosystems shifts attention toward behavioral indicators rather than border infiltration. The biometric architecture primarily addresses authentication rather than ideological transformation. The distinction between detection and prevention becomes critical in policy evaluation. The technological capacity to confirm identity does not equate to the ability to intervene in early-stage radicalization processes. The security discourse sometimes conflates these dimensions, overstating the preventive reach of identification systems. The strategic effectiveness of biometric integration must therefore be contextualized within a broader ecosystem of community engagement, behavioral assessment, and digital literacy initiatives.

Constitutional Framework: The Fourth Amendment Challenge

The constitutional debate surrounding biometric expansion centers upon the Fourth Amendment’s protection against unreasonable searches and seizures. The doctrinal question of reasonable expectation of privacy becomes complex when applied to facial recognition technologies. The visibility of a person’s face in public does not necessarily imply consent to perpetual automated tracking. The aggregation of movement data across time transforms isolated observations into comprehensive behavioral mapping. The jurisprudential tension arises from the distinction between human observation and algorithmic surveillance at scale. The centralized integration of biometric systems magnifies this concern by enabling retrospective identification across multiple datasets. The constitutional inquiry therefore extends beyond the act of data collection to the cumulative analytical capacity of interconnected platforms. The democratic legitimacy of such surveillance depends upon carefully calibrated legal boundaries.

Civil Liberties Risks: Due Process and Equal Protection

The civil liberties implications extend beyond search doctrine into questions of due process and equal protection. The integration of biometric databases often interfaces with federal watchlists that carry significant consequences for affected individuals. The risk of misidentification, particularly in systems exhibiting demographic bias, raises concerns about discriminatory impact. The historical evidence of algorithmic disparities in facial recognition accuracy underscores the potential for unequal burden. The permanence of biometric identifiers amplifies harm because errors cannot be corrected through simple credential replacement. The reputational and legal consequences of false positives can include detention, travel restrictions, and investigative scrutiny. The structural challenge lies in ensuring that technological efficiency does not eclipse procedural fairness. The durability of democratic trust depends upon transparent safeguards and accessible mechanisms for redress.

Cybersecurity and Data Protection Concerns

The cybersecurity dimension of centralized biometric integration introduces additional complexity. The concentration of sensitive identifiers within interoperable platforms increases their attractiveness as targets for malicious actors. The irreversibility of biometric compromise distinguishes these data from conventional passwords or identification numbers. The breach of fingerprint or facial recognition databases would produce enduring vulnerability for affected individuals. The strategic calculus of integration must therefore weigh operational gains against systemic exposure. The architecture of storage, encryption, and segmentation becomes a central policy concern rather than a peripheral technical detail. The resilience of the system depends upon investment in cybersecurity infrastructure commensurate with its sensitivity. The governance framework must incorporate breach notification protocols and accountability mechanisms to maintain public confidence.

Function Creep and Expanding Surveillance Mandates

The phenomenon of function creep represents one of the most persistent risks in surveillance policy. The gradual expansion of system use beyond its original mandate often occurs incrementally and without comprehensive legislative review. The initial justification of biometric integration for counterterrorism may evolve into routine application for minor offenses or administrative enforcement. The normalization of expanded access can erode previously accepted boundaries. The absence of explicit statutory constraints accelerates this trajectory. The comparative historical experience of other surveillance tools demonstrates that scope expansion is common when guardrails are ambiguous. The preservation of democratic norms requires anticipatory regulation that anticipates and limits repurposing. The policy architecture must therefore articulate narrow purpose definitions to prevent gradual dilution of civil liberties protections.

Governance Safeguards and Institutional Oversight

The governance of biometric integration depends upon robust oversight and transparency structures. The statutory authorization should define permissible uses with clarity and precision. The involvement of independent auditing bodies can provide continuous evaluation of algorithmic accuracy and compliance. The publication of aggregate usage statistics strengthens democratic accountability without compromising operational secrecy. The establishment of clear data retention limits reduces unnecessary exposure and mitigates privacy risk. The creation of accessible correction procedures ensures that individuals have meaningful avenues to challenge inaccuracies. The embedding of sunset provisions within authorizing legislation compels periodic reassessment of effectiveness and proportionality. The credibility of biometric modernization rests upon institutional willingness to subject technological power to constitutional discipline.

Comparative Perspective: European Union Data Governance

The comparative perspective offered by European Union data governance frameworks illuminates alternative regulatory pathways. The classification of biometric data as sensitive under the General Data Protection Regulation reflects a normative commitment to privacy as a fundamental right. The proportionality principle embedded within European jurisprudence requires that surveillance measures demonstrate necessity relative to legitimate objectives. The European Artificial Intelligence regulatory approach further introduces risk-based oversight of high-impact systems. The restrictions on real-time remote biometric identification illustrate a cautious stance toward expansive monitoring. The emphasis on data subject rights provides individuals with enforceable mechanisms of access and correction. The transatlantic contrast highlights divergent philosophical foundations regarding state surveillance. The American debate may benefit from examining how modernization can coexist with codified privacy safeguards.

Balancing Security and Democratic Tradition

The policy challenge confronting the United States lies in reconciling security imperatives with constitutional tradition. The extremism threat environment remains adaptive and technologically sophisticated. The demand for efficient investigative tools reflects legitimate concern about national resilience. The expansion of biometric integration cannot be evaluated solely through a lens of fear or optimism. The democratic system requires structured deliberation that weighs empirical evidence against normative commitments. The durability of public trust depends upon visible adherence to rule of law principles. The technological momentum driving integration must be matched by legal clarity and oversight capacity. The success of the initiative ultimately hinges not on algorithmic speed but on governance design that preserves legitimacy.

Technology Within a Broader Counter-Extremism Strategy

The intersection of technology and extremism prevention underscores the importance of strategic balance. The detection of identity fraud and cross-border movement can contribute meaningfully to threat disruption. The prevention of radicalization, however, requires complementary investment in community-based programming and digital resilience. The exclusive reliance on surveillance tools risk narrowing the policy imagination. The broader counter-extremism architecture must integrate education, mental health resources, and local partnership frameworks. The emphasis on biometric certainty should not overshadow the human dimensions of prevention. The legitimacy of security institutions is reinforced when communities perceive them as partners rather than monitors. The cultivation of trust therefore constitutes an indispensable component of national security strategy.

Democratic Culture in the Digital Age

The public discourse surrounding biometric integration reflects deeper anxieties about democratic erosion in the digital age. The normalization of continuous surveillance may gradually reshape expectations of privacy. The constitutional system depends upon vigilance in moments of technological transition. The historical pattern demonstrates that emergency powers can become permanent fixtures, absent deliberate constraint. The present debate offers an opportunity to articulate principles that govern future innovation. The embedding of accountability mechanisms at the outset can prevent later retrenchment crises. The societal response to this initiative will signal the resilience of democratic culture. The maintenance of freedom within a technologically advanced security state demands sustained civic engagement.

Economic and Procurement Considerations

The economic dimension of biometric expansion also warrants consideration. The procurement of advanced recognition systems and database infrastructure involves significant public expenditure. The allocation of resources toward surveillance capacity must be evaluated against alternative prevention investments. The cost-effectiveness of integration depends upon demonstrable improvements in threat disruption outcomes. The potential for private sector contractors to influence system design raises additional oversight questions. The transparency of procurement processes contributes to accountability and public trust. The financial sustainability of centralized architecture requires ongoing maintenance and cybersecurity funding. The strategic planning of budgetary priorities should incorporate holistic assessment rather than narrow technological enthusiasm.

International Norms and Diplomatic Implications

The international implications of American biometric policy extend beyond domestic governance. The global diffusion of surveillance technologies often follows precedents set by major powers. The normative stance adopted by the United States may influence emerging regulatory standards in allied democracies. The demonstration of rights-protective safeguards can reinforce international credibility in human rights advocacy. The absence of such safeguards may invite criticism and reduce moral authority. The transnational nature of extremist networks necessitates cross-border cooperation, yet collaboration must respect shared democratic values. The articulation of principled biometric governance can strengthen alliances rooted in rule of law commitments. The strategic narrative accompanying integration therefore carries diplomatic as well as domestic significance.

Ethical Dimensions of Biometric Governance

The ethical dimension of biometric integration encompasses questions of autonomy and dignity. The involuntary capture and analysis of immutable identifiers implicate fundamental aspects of personhood. The philosophical debate concerns whether technological capability justifies comprehensive deployment. The precautionary principle suggests restraint when irreversible consequences are possible. The ethical evaluation must consider both collective security benefits and individual vulnerability. The moral legitimacy of surveillance depends upon proportionality and transparency. The democratic framework requires that citizens understand and consent to the structures shaping their freedoms. The conversation about biometrics thus transcends administrative efficiency and enters the realm of civic identity.

Empirical Evaluation and Algorithmic Accountability

The empirical assessment of biometric effectiveness remains essential to informed policymaking. The measurement of false positive and false negative rates determines practical utility. The evaluation of demographic performance disparities informs equity considerations. The long-term study of deterrence impact requires careful methodological design. The absence of rigorous independent research risks reliance on vendor claims rather than objective evidence. The policy community must insist upon data-driven evaluation prior to expansive deployment. The credibility of integration depends upon demonstrable contribution to public safety outcomes. The scientific transparency surrounding algorithmic performance strengthens both effectiveness and accountability.

Constitutional Governance in the Digital Century

The integration initiative ultimately symbolizes a broader transformation in governance under conditions of digital interdependence. The convergence of data analytics, artificial intelligence, and security policy challenges inherited legal categories. The adaptability of constitutional interpretation will shape the trajectory of technological deployment. The resilience of democratic institutions depends upon their capacity to evolve without abandoning core commitments. The present debate over biometric integration represents a defining test of that adaptability. The balance struck between extremism prevention and civil liberties will influence public trust for generations. The safeguarding of freedom in an era of rapid innovation demands deliberate restraint as well as strategic foresight. The choices made in this policy moment will echo throughout the architecture of twenty-first century security governance.

Sources

American Civil Liberties Union. (2023). The dawn of robot surveillance: AI, video analytics, and privacy threats in U.S. policing. Retrieved from https://www.aclu.org/report/dawn-robot-surveillance 

Cameron, D. (2026). DHS Wants a Single Search Engine to Flag Faces and Fingerprints Across Agencies. WIRED. Retrieved from https://www.wired.com/story/dhs-wants-a-single-search-engine-to-flag-faces-and-fingerprints-across-agencies/

Class action challenges DHS’ use of facial recognition against protesters. (2026). Biometric Update. Retrieved from https://www.biometricupdate.com/202602/class-action-challenges-dhs-use-of-facial-recognition-against-protesters

Department of Homeland Security intensifies surveillance in immigration raids, sweeping in citizens. (2026). PBS NewsHour. Retrieved from https://www.pbs.org/newshour/politics/department-of-homeland-security-intensifies-surveillance-in-immigration-raids-sweeping-in-citizens

ICE use of commercial phone tracking tool draws congressional scrutiny. (2026). Biometric Update. Retrieved from https://www.biometricupdate.com/202602/ice-use-of-commercial-phone-tracking-tool-draws-congressional-scrutiny

Markey, J., Jayapal, P., Merkley, J., & Wyden, R. (2026, February 5). Markey, Jayapal, Merkley, Wyden Introduce Bill to Ban ICE and CBP Use of Facial Recognition Technology Amid Trump’s Rapidly Growing Surveillance State. Retrieved from https://jayapal.house.gov/2026/02/05/markey-jayapal-merkley-wyden-introduce-bill-to-ban-ice-and-cbp-use-of-facial-recognition-technology-amid-trumps-rapidly-growing-surveillance-state/

Oregon Senators Introduce Bill to Ban ICE From Using Facial Recognition. (2026, February). National Today. Retrieved from https://nationaltoday.com/us/dc/washington/news/2026/02/06/oregon-senators-introduce-bill-to-ban-ice-from-using-facial-recognition/ 

Police are finding suspects based on their online searches as courts weigh privacy concerns. (2026, February). AP News. Retrieved from https://apnews.com/article/google-reverse-keyword-search-privacy-c5a0bc6f3790213f92e78aae720d2379

United States Government Accountability Office. (2023). Facial recognition technology: Federal law enforcement agencies should better assess privacy and accuracy risks (GAO-23-105607). Retrieved from https://www.gao.gov/products/gao-21-518

U.S. lawmaker unveils plan for sweeping overhaul of Privacy Act. (2026). Biometric Update. Retrieved from https://www.biometricupdate.com/202602/us-lawmaker-unveils-plan-for-sweeping-overhaul-of-privacy-act

The OAS’s Role in Current Geopolitical Tensions in the Americas

By Lola McEwen – Rise to Peace Fellow

The United States of America carried out a mission in Venezuela on
January 3, 2026, that resulted in the capture of then Venezuelan president
Nicolás Maduro and his wife, Cilia Flores, to face charges of drug trafficking
.
Maduro has been on the United States radar for several years, beginning in 2020
during President Donald Trump’s first term where Maduro was indicted by the
United States Justice Department for narco-terrorism and cocaine-trafficking
conspiracy. Since then, Maduro has been the face of many scandals and
backlash in Venezuela, including being accused of committing fraud to win the
2024 presidential election against Edmundo González, who was forced to flee to
Spain following the aftermath of Maduro’s reelection
. In a show of bi-partisan
agreement, the Biden Administration recognized González as the true winner of
the 2024 Venezuelan presidential election, further complicating Venezuela’s
reputation to outsiders
. While many countries have expressed their negative
opinions on Maduro and his legitimacy as the true leader of Venezuela, prior to
his extradition to the United States, it brings up many troubling questions about
U.S. power against other nations. Should United States law apply in this
scenario, or international law? It also brings up the question, how exactly did the United States build up its credibility to be able to complete a mission such as this without extreme backlash?

Future of South American Farmers a Cause for Concern

With South America already in turmoil, this mission was the tipping point of
the modern war on drugs, increasing tensions between many South American
countries governments and cartels running in their own countries, with their
citizens in the crossfire. With Colombian President Gustavo Petro at the head of
U.S. diplomatic relations in South America after a recent meeting with President
Donald Trump, succeeding to Trump’s wishes to reduce cocaine trafficking into
the United States, South America has become an extremely dangerous
geopolitical field. Not only Colombian and Venezuelan citizens have been
affected by these actions, but also Bolivian citizens, with the World Health
Organization (WHO) agreeing with the Trump Administration’s beliefs on the
negative impacts of cocaine, while the Bolivian people have used the coca plant
for centuries as a significant part of their culture
. Bolivian natives are now
concerned that the plant their ancestors have used for generations without issues
will be destroyed, in addition to their farmers already being forced into an illegal
cocaine market to simply provide for their families
. This calls for concern that
international organizations may be conducting policies in line with the United
States without considering the consequences for the rest of the countries in north
and South America.

Controversy for the OAS

Not only has the United States taken significant action against drug
trafficking on the sea, but also on land, with President Petro of Colombia
agreeing to revive the mission to eradicate the coca plant by spraying it with
glyphosate, a chemical linked to cancer in humans. With diplomatic odds
worsening in South America, the public discrediting of the Organization of
American States (OAS) has only soured the state of the Americas. Since its
establishment in Bogotá in 1948, OAS has not been known to do what it pledged
to upon its inception, to promote peace and security in the continent, in fact, they
have been a part of some recent scandals that suggest quite the opposite.
During the 2019 Bolivian presidential election, OAS accused President Evo
Morales of committing voter fraud, who also happened to previously be a coca
farmer before his presidenc
y. This resulted in outrage against OAS, which has
been called out for seemingly backing U.S. policy over all other matters. Morales
was a significant known supporter of coca production, including being a former
union leader of coca farmers in Bolivia
. Morales passed multiple bills
encouraging farmers to continue and even expand their cultivation of coca plants,
going against the United Nation’s (UN) wishes and even going as far as to ask
the UN to make it legal again back in 2017
.


OAS has been called out for seemingly right-winged ideologies when the
organization is supposed to judge fairly and objectively. While OAS came out and
said that they found no evidence of fraud following the election, this action still
resulted in a coup d’état causing President Morales to resign after violent
protests in Bolivia over the claims of election fraud. OAS claimed to audit the
election results in which they found evidence of “a massive and unexplainable
surge in the final 5 percent of the vote count”
. OAS Secretary General Luis
Almagro even went as far as supporting the Bolivian army in their decision to
recommend Morales and his staff to resign in order to put a stop to the protests.
A research study by David Rosnick of the Center for Economic and Policy
Research (CEPR) showed that the OAS had made several errors in their data
collection of the alleged voter fraud, including incorrectly sorting time stamps and
neglecting that the jump in votes towards Morales was simply a matter of
geographical area being counted all at once, in which that area favored
Morales
. In even more shocking evidence against OAS, Bolivia is not an
isolated event, simply the most recent. OAS’s claims for voter fraud in
presidential elections originally begin back in 2000 in Haiti also causing much
hardship, leading up to Juan Gabriel Valdés, the former head of the UN in Haiti,
claiming that the OAS’s decision to intervene in the 2010 Haiti election, claiming
faulty statistical methods, caused “the origin of the present tragedy” in the
country.


The OAS was regarded as no longer a credible observer of democracy in
the Americas under the leadership of Luis Almagro. The Guardian stated that
three capacities are needed from the OAS, or a potential new organization, to
bridge the gap between countries. First, the organization would need to organize
delegations where democratic institutions are clearly under threat
. Second,
and most relevant, would be to launch investigations into unlawful interventions
of the democratic process. The weaponization of the judicial system to intimidate,
exclude, and incarcerate political opponents has been a main focus of this article,
and a main issue in South America. Lastly, communication is key, especially with
rising technological advances spreading bias wide and quickly.

OAS Under New Leadership

Almagro left office on May 26th of 2025, being replaced by current
Secretary General of OAS Albert Ramdin, a Surinamese diplomat and foreign
minister who speaks English and Spanish in addition to his native language
Dutch
. Not only does Ramdin have extensive background in diplomacy, he
has previously worked for OAS in supporting democracy, peace, and
development in Haiti. As previously stated in this article, Haiti was joined by
Bolivia in allegations of voter fraud, causing much turmoil within these states,
directly linked to the OAS. Ramdin became the sole candidate to replace
Almagro after Bolivia, Brazil, Chile, Colombia and Uruguay pledged support to
him, being closely followed by the support of Costa Rica, The Dominican
Republic, and Ecuado
r. His original opponent in the race, Foreign Minister
Rubén Dario Ramírez Lezcano of Paraguay was not supported by any, however
he was viewed as an ally for the United States
.

Ramdin initially faced accusations that China would take a role in the OAS
with Suriname having a history of connections with the country. However, special
envoy to Latin America Mauricio Claver-Carone from the United States supported
Ramdin and Suriname calling Suriname a “pro-american country…”
. On
January 6th of 2026, Ramdin made a speech following the events in Venezuela
reminding member states what their obligation is, reaffirming unity within the
region while also acknowledging that diversity of opinions exists, and that they
can co-exist while sharing the responsibility to preserve peace and stability in the
Hemisphere
. Ramdin clearly expresses his opinions that he wants to lead the
OAS to neutrality among states, “…fully respecting the principles of sovereignty,

non-intervention, and constitutional order.” These beliefs are a main factor in why
Ramdin was chosen by several member states to represent the OAS, with the
many voter fraud allegations against the OAS in the past further charging
tensions with member states. Ramdin demanded the continuation of states to
express their opinions and a continued willingness to engage in topics of
conversations with fellow members even though they may not always agree
.
While tensions in Venezuela from the recent United States mission to extradite
Maduro have resulted in distrust between many countries and the United States,
Ramdin expressed the importance to focus on the Venezuelan people, and the
humanitarian crisis there, as well as upholding principles of international law
.

What International Laws Come Into Play?

Venezuela has been a hot topic in international law following the
extradition of Maduro to the United States of America. Specifically under Article
2(4) of the UN Charter which states that, “All Members shall refrain in their
international relations from the threat or use of force against the territorial
integrity or political independence of any state, or in any other manner
inconsistent with the Purposes of the United Nations”
. The OAS also under
rule of law for member states in Article 21 of the OAS Charter says, “The territory
of a State is inviolable; it may not be the object, even temporarily, of military
occupation or of other measures of force taken by another State, directly or
indirectly, on any grounds whatsoever. No territorial acquisitions or special
advantages obtained either by force or by other means of coercion shall be
recognized”
. While arguments continue whether the United States violated the
laws, evidence pointing towards the affirmative, further issues arise not simply
involving abiding by international law for the U.S., but also what this means for
other countries and whether they will be encouraged to test the waters to see
how much rule-breaking they can get away with. We have already seen countries
push the limits including the Russia-Ukraine war, it is only a matter of time before
we see another violation of international law, eyes currently on China and
Taiwan.

Where Does This Lead Us?

With Ramdin as the new head of the OAS, with experience in dealing with
China as previously stated from Suriname’s connection, there is cause for hope
that the OAS can rebuild its reputation and prevent further violations of
international law through what the organization was made for, diplomacy. While
the OAS faces many scandals to rebuild from, under new leadership I do not find
it entirely unreasonable to believe that the hemisphere can recover from recent
events and reestablish law and security norms in the region. With recent United
States domination over the OAS, Ramdin’s leadership style uniting many other
countries in the OAS may prove beneficial for the return of stability and neutrality
to the OAS. While Venezuela’s unstable future is still cause for much concern,
the OAS’s new leadership may lead to stronger support for Venezuelan citizens
in these uncertain times and return the country to democratic normality. It is
important to note that Venezuelan citizens have gone through much turmoil with
the previous administration, however it still did not constitute the United States
mission under international law.

While the mission from the United States had positives, this still brings to attention the alleged overreach of the United States in many previous instances including allegations that the OAS previously acted to
appease the United States policies. Maduro’s removal may have been ultimately
necessary for peace in the region. It is still yet to be seen as we watch Ramdin in
his new leadership of the OAS, and if this polarized geopolitical tension between
member states can be resolved through diplomacy.

References

[1] BBC News. (2017, March 9). Bolivia’s Morales boosts legal coca production. BBC News.
https://www.bbc.com/news/world-latin-america-39214085
[2] Center for Economic and Policy Research, Rodríguez, F. R., & Johnston, J. (2022, August
23). OAS Continues to Dodge Accountability for Actions in the 2019 Bolivian Election.
https://cepr.net/publications/oas-continues-to-dodge-accountability-for-actions-in-the-201
9-bolivian-election/
[3] CHARTER OF THE ORGANIZATION OF AMERICAN STATES. (n.d.). Charter of the OAS.
Retrieved February 21, 2026, from
https://www.cidh.oas.org/basicos/english/basic22.charter%20oas.htm
[4] CNN & Brocchetto, M. (2012, March 13). Bolivia’s Morales to UN: Legalize coca-leaf
chewing. CNN. https://www.cnn.com/2012/03/13/world/americas/bolivia-morales-coca
[5] Farthing, L. (2026, February 10). ‘Coca leaf is life itself’: Andean growers’ hopes fade as
WHO upholds global curb. The Guardian. Retrieved February 17, 2026, from https://www.theguardian.com/global-development/2026/feb/10/coca-leaf-cocaine-bolivia-colombia-sacred-indigenous-un-ban-us

[6] Glatsky, G. (2026, January 7). A Timeline of Tension Between the U.S. and Venezuela. The
New York Times. Retrieved February 17, 2026, from
https://www.nytimes.com/2026/01/03/world/americas/us-venezuela-tensions-timeline.htm
l

[7] The Guardian, Adler, D., & Long, G. (2021, November 15). We need a new observatory of
democracy in the Americas. The Guardian.
https://www.theguardian.com/commentisfree/2021/nov/15/organization-of-american-state
s-democracy-observatory
[8] OAS. (2026, January 6). “Speech by OAS Secretary General, Albert R. Ramdin, during the
Special Meeting of the Permanent Council to consider recent events in the Bolivarian
Republic of Venezuela”.
https://www.oas.org/en/media_center/press_release.asp?sCodigo=E-0002/26
[9] Robertson, K. (2025, March 11). A New Leader at the Organization of American States:
Suriname’s Albert Ramdin. AS/COA.
https://www.as-coa.org/articles/new-leader-organization-american-states-surinames-albe
rt-ramdin
[10] United Nations Charter (full text) | United Nations. (n.d.). the United Nations. Retrieved
February 20, 2026, from https://www.un.org/en/about-us/un-charter/full-text

Weaponizing Winter: Energy Infrastructure in Russia’s Invasion of Ukraine

By Kie Jacobson – Rise to Peace Fellow

Russian attacks on Ukrainian energy infrastructure provide a stark image not only of how critical these systems are but also of their vulnerability. Strikes against Ukraine’s energy infrastructure are not new, but the intensity of the assault during this winter combined with the severity of the season itself provide a grim view of Russian strategy. From power plants to transmission networks, every aspect of Ukraine’s energy infrastructure has been subject to large-scale missile and drone attacks, leaving millions of Ukrainians without electricity, heating, or reliable access to water during a season when temperatures reached subzero levels. 

Particularly as climate change exacerbates seasonal extremes, the role of energy infrastructure in modern society becomes increasingly central. Electricity powers homes, hospitals, water systems, communications networks, and transportation systems. When energy grids are damaged or disrupted, the consequences cascade across multiple sectors simultaneously, especially across critical areas of civilian life. In Ukraine, where winter temperatures frequently fall below freezing, access to electricity and heating is essential for civilian survival. As a result, attacks on energy infrastructure have far-reaching effects beyond the immediate destruction of physical facilities. 

The consistent targeting of Ukraine’s energy system displays how infrastructure is being used as a mechanism of civilian pressure in contemporary warfare. While infrastructure may be framed as a legitimate military objective, especially in relation to defense production or communication networks, its destruction produces widespread and predictable hardship among civilian populations. In practice, attacks on infrastructure then function as a form of indirect civilian targeting, where the systems that sustain civilian life are attacked in order to exert pressure on society as a whole.

Understanding Energy Infrastructure 

Ukraine’s energy infrastructure is made up of a mix of nuclear, gas, coal, and renewable energy sources such as hydroelectric power. Prior to the full-scale invasion, slightly over half of its electricity was generated by nuclear plants, with the Zaporizhzhia plant as a primary component of the system. In addition, Ukraine’s energy system is highly centralized, contrasting with the decentralized grid structures more common across Europe. In practice, this has made Ukraine’s power grid particularly sensitive to disruption and damage. 

Prior to 2022, important progress had been made towards reducing reliance on Russian energy. Since 2017, Ukraine has been focused on aligning its energy infrastructure with the rest of continental Europe, breaking its previous integration with Russian and Belarusian systems. Moscow’s willingness to exploit Ukraine’s vulnerability to energy disruptions had already been exposed in prior disputes. During the Donbas War, the Luhansk thermal power plant was shelled by Russian forces in 2015. Earlier gas disputes also indicated Moscow’s willingness to utilize energy dependence for political leverage. Despite maintaining that its decision stemmed from pricing issues, Moscow paused natural gas shipments to Ukraine during the winters of 2006 and 2010. Given Russia’s familiarity with the Soviet energy model inherited by Ukraine, it is unlikely that Russian leaders were unaware that Ukraine’s system is susceptible to disruption. 

Environmental Harm in Infrastructure Damage 

Attacks on energy infrastructure produce costs that extend beyond the loss of electricity. In Ukraine, the lack of caution Russia has shown in targeting Ukrainian infrastructure has raised concerns about long-term environmental damage. Strikes on power plants and industrial facilities risk fires, fuel leaks, and chemical contamination. Moreover, damage to thermal power plants can release pollutants into surrounding ecosystems, while damaged energy facilities may contaminate soil and water sources. In conflict zones, the risk of environmental harm is often compounded by the difficulty of conducting rapid repairs or environmental monitoring. 

However, the greatest threat is posed by attacks on nuclear plants. Ukraine’s three other nuclear plants, Rivne, Khmelnytskyi, and South Ukraine, remain operational and are located away from the frontline but still subject to heavy drone and missile bombardment. The Zaporizhzhia nuclear plant, one of the world’s largest and biggest in Europe, represents a particularly grave concern when considering humanitarian consequences and environmental harm. Even though the plant has been under Russian control since 2022, the International Atomic Energy Agency has repeatedly warned that the ongoing conflict could lead to a radiation leak, sparking fears of nuclear catastrophe. Although the reactors are shut down, the state of the Zaporizhzhia plant has declined over the course of the war, especially with the destruction of the Kakhovka dam endangering the plant’s cooling systems.

In 2023, the collapse of the Kakhova dam caused mass flooding while draining the Kakhova reservoir. In addition to a humanitarian crisis affecting drinking water and food supplies, the loss of the dam also marks an environmental catastrophe. Floodwaters carried decades-worth of industrial and agricultural waste that had previously been contained in sediment at the bottom reservoir throughout the affected region. This was in addition to machine oil spills that occurred during the flooding, and later reached the Black Sea. While devastating in the short term, the long-term consequences of the dam’s collapse have yet to become apparent, not just for the environment but for the residents of the region. Such events are also an additional strain on Ukraine’s already stretched resources, as humanitarian relief must be organized alongside infrastructural repairs and environmental mitigation. 

Strategic Escalation 

Targeting Ukraine’s energy infrastructure carries several significant risks, both immediate and long-term, for civilian populations and for the country’s ability to function. The centralized system is characterized by large generation facilities, with long transmission lines supplying the rest of the country. This means that for everything from arms production to basic heating, much of the country is dependent on a limited number of energy nodes. This reality is not lost on Russia. The Zaporizhzhia power plant has not been operational since Russian forces captured the site in 2022, increasing reliance on the three remaining nuclear plants under Ukrainian control. The Kakhovka hydroelectric plant was destroyed, and all of Ukraine’s thermal plants have been subject to damage or destruction

Infrastructure has long played a strategic role in armed conflict. The logic underlying strategic bombing during the Second World War is based on the idea that industrial facilities, transportation networks, and energy systems support both military operations and civilian economies. Disrupting these systems can weaken an opponent’s logistical capacity, reduce industrial production, and complicate the functioning of government institutions. The destruction of infrastructure also imposes significant economic costs in terms of resources lost and resources re-allocated for recovery. Although strategic bombing was shown not to be a decisive factor in war, it is for the aforementioned reasons that infrastructure often becomes a target during periods of escalation in war. In Ukraine, the systematic targeting of energy infrastructure reflects this logic. 

2025 marked a turning point in Russian attacks on energy infrastructure. Not only was it the first time Russia attacked Ukrainian domestic gas production, but over half of production was reportedly destroyed. Given that the majority of Ukrainians rely on a centralized gas supply, this destruction carries significant consequences for civilians. The scale and timing of these attacks, during winter months, indicate that the civilian effects of infrastructure disruption are involved in this strategy.

Infrastructure as a Tool for Civilian Coercion 

Beyond physical hardship, infrastructure attacks add an additional psychological pressure across society. Continuous blackouts and uncertainty about the stability of essential services can undermine the sense of security that civilians depend upon in everyday life. Families must adjust their daily routines around the availability of electricity, plan for storing water and preparing for extended outages. Businesses must adapt to unpredictable operating conditions, while public institutions must continuously manage emergency contingencies. 

The unfortunate reality is that Ukraine’s capacity for repair is exceedingly strained. Four years of repeated strikes on energy infrastructure have taken a toll. Ensuring quick repair capabilities has been discussed as potentially being more cost-effective than heavy investment in protective measures, but Russia’s intensifying attacks have pushed repair capabilities to the limit. The specialized skills and manpower needed for these types of repairs is low, compounded by dangerous working conditions that further slow repairs. Equipment shortages pose an additional obstacle. Ukraine’s power grid transmits electricity at higher voltages than most of Europe, where this type of equipment is only in use by the US, Russia, and South Korea. As a result, procurement of second-hand compatible equipment is increasingly hard. Manufacturing the equipment suitable for Ukraine’s needs takes longer to produce than its lower voltage counterparts, placing further strain on a system already under significant pressure

Outlining these pressures illustrates how infrastructure attacks function as a form of indirect civilian targeting. Belligerents target the systems that sustain civilian life, with the resulting disruptions imposing collective hardship across the entire population. 

From a strategic perspective, this approach can serve several purposes. Widespread infrastructure disruption can strain government resources, disrupt economic activity, and weaken societal morale. Even if civilian suffering does not immediately alter political decision-making, it still represents a long-term pressure that may influence the broader trajectory of a conflict. 

The Ukrainian case demonstrates how the targeting of critical infrastructure can serve as a tool to pressure a broader population. Energy infrastructure becomes not only a logistical target but also a mechanism for imposing hardship on civilian populations. As modern societies become increasingly dependent on interconnected technological systems, the potential for infrastructure attacks to generate widespread civilian harm is likely to grow. 

Conclusion 

The attacks on Ukraine’s energy infrastructure demonstrate how modern warfare can target civilian societies through the systems that sustain them. By disrupting electricity networks, belligerents can impose widespread hardship across entire populations without directly targeting

civilians themselves. This strategy echoes earlier wartime practices, particularly the strategic bombing campaigns of the twentieth century, which sought to weaken enemy resilience by destroying industrial and urban infrastructure. 

Yet the humanitarian consequences of infrastructure warfare are increasingly difficult to ignore. As societies become more dependent on complex technological systems, attacks on energy infrastructure produce effects that disrupt essential services, weaken economic stability, and threaten civilian well-being. Protecting civilians in modern conflicts therefore requires greater attention to the systems that support everyday life. 

However, Ukraine’s experience is also demonstrating evolution and response. Repeated attacks on its centralized energy facilities have accelerated efforts to decentralize and increase resilience within its power system. Measures such as the diversification of energy sources, with the inclusion of renewable energy in planning, and dual-fuel technology mark efforts to shift away from a highly centralized system that is vulnerable to targeting. In doing so, the objective is to minimize the cascading effects of disruptions in energy infrastructure. 

Ukraine’s experience highlights the evolving nature of civilian vulnerability in contemporary warfare. Ensuring meaningful protection for civilian populations will increasingly depend on safeguarding the infrastructure that sustains them.

Al-Qaeda vs. the Islamic State: Evolving Media Strategies of Terrorist Organizations

By James Calderon – Rise to Peace Contributor

Abstract: This paper analyzes the evolution of jihadist media strategies through a comparative analysis of al-Qaeda and the Islamic State of Iraq and Syria (ISIS). While al-Qaeda relied on centralized, ideologically driven messaging, ISIS transformed extremist communication by exploiting social media, high-quality visuals, and decentralized online networks. These shifts reflect how terrorist organizations adapt to technological change and generational trends. The study also examines the emerging role of artificial intelligence (AI) as both a tool and a threat by enabling extremist groups to produce propaganda and disinformation while also providing counterterrorism agencies new capabilities for detection and prevention. The paper concludes that terrorism’s future battles will be fought increasingly in digital spaces, requiring adaptive and tech-driven counterstrategies.

James Calderon is a graduate student at Columbia University, where he is pursuing a Master of International Affairs with a concentration in international security and diplomacy. His work explores authoritarianism, terrorism, and security dynamics in the Middle East. Professionally, he brings extensive experience in research and writing, having held diverse internships and roles in the U.S. Department of State, the Department of Veterans Affairs, the House of Representatives, and several research institutions. He earned his Bachelor of Arts in Political Science and Global Studies, with a minor in Public Relations, from Marist University, where his undergraduate thesis analyzed radicalization in French and Italian Muslim communities.

I. Historical Context and Introduction  

In 1998, Osama Bin Laden established al-Qaeda out of a network of veterans from the American-backed Afghan insurgency against the Soviet Union.[1] At this time, the main objective of al-Qaeda was to support Islamist causes in conflicts throughout the world. Following the 1991 Gulf War, due to the Saudi decision to host American troops, the United States was made al-Qaeda’s number one target.[2] Shortly later, Osama Bin Laden would leave his native Saudi Arabia to Sudan and then to Afghanistan where Taliban leadership offered refuge. Prior to September 11, al-Qaeda carried out the 1998 bombings of U.S. embassies in Kenya and Tanzania, and the 2000 attack on the USS Cole. In 1999, the American government designated al-Qaeda as a foreign terrorist organization.3

In response to the 2003 American invasion of Iraq, Jordanian national Abu Musab al-Zarqawi founded Tawhid wal Jihad (which translates to “Monotheism and Holy War”).[3] Zarqawi later pledged allegiance to al-Qaeda and renamed his organization to al-Qaeda in Iraq.[4] Zarqawi wished to establish a civil war between Sunni Muslims and Shia Muslims, and ultimately establish a caliphate.[5] Al-Qaeda is Sunni however considers Shia Muslims to be “associates”. In contrast, Zarqawi was much more extreme in his views and called for the killing of Shias. In fact, al-Qaeda considered Zarqawi to be too radical and as such, their relations would be strained. 

In 2006, Zarqawi was killed in a U.S. airstrike. Abu Ayyub al-Masri would take over and rename the organization the Islamic State of Iraq. Seven years later, in 2013, Abu Bakr al-Baghdadi expanded operations into Syria and the organization adopted its current name of the Islamic State of Iraq and Syria, ISIS.[6] 

Jihadist groups have long used media as a tool of asymmetric warfare in order to project power, spread ideology, and influence global audiences without conventional military strength. For groups like Al-Qaeda and ISIS, media plays a key role in recruitment, legitimizing actions, deterring enemies, and controlling the narrative. While both organizations share ideological roots, their media strategies differ sharply. These differences reveal contrasting goals, structures, and generational outlooks. ISIS’s media model, in particular, marks a major shift where digital propaganda is turned into a core weapon.       

II. Al-Qaeda’s Media Strategy

Ayman al-Zawahari, Osama Bin Laden’s successor, once stated that, “We [al-Qaeda] are in a battle, and more than half of this battle is taking place in the battlefield of the media. And that we are in a media battle in a race for the hearts and minds of our people”.[7]  However, Al-Qaeda’s media strategy was not existent at the time of the organization’s creation. Once such a strategy became implemented, the focus was on long form and ideologically dense messaging. In the first phase (1988-2000) of al-Qaeda’s media strategy, the organization was not overtly active in distributing literature. Instead, the majority of efforts were centered around the personality-cult of Osama Bin Laden and little was done in order to reach out to new members.[8] As such, predominantly those who already sympathized with the organization’s cause viewed their material. It was not until Bin Laden realized the value in international television interviews that he was able to further promote himself and the organization’s ideals.

In the second phase (September 11, 2001 to mid 2000s), al-Qaeda was able to capitalize on media exposure from the September 11 attacks and international search for Bin Laden to promote their cause. Moreover, the group gained popularity and search topics on the internet increased. This could be indicative of radicalization as Inspire, an al-Qaeda affiliated magazine, gained traction online as well.[9] This period was also marked by growing decentralization where propaganda began to feature senior members from all over the world in order to maintain high interest and international al-Qaeda cells as well as individual militants were highlighted.  Finally, in the third phase (late 2000s to present), the organization has begun to rely more exclusively on the internet and social media in order to distribute propaganda with the intention to mobilize Western Muslims against their governments.[10] Due to a greater amount of media being released by all jihadist groups, al-Qaeda began to receive less media attention. In order to counteract this trend, the organization has relied on tech savvy young adults to disperse propaganda. This has resulted in al-Qaeda affiliated media to become more influential in the eyes of a youth.[11]

Yet despite efforts to modernize, al-Qaeda’s communication strategy remained rooted in ideological depth rather than visual immediacy. Its top-down structure and reliance on traditional formats limited its ability to compete in an increasingly intense digital environment. It was in this evolving media landscape that ISIS emerged, an organization that would not only inherit al-Qaeda’s ideological framework but also revolutionize how terrorism communicates and recruits through the power of social media and cinematic production.

III. The Islamic State of Iraq and Syria’s Media Strategy

Building upon, but ultimately surpassing, al-Qaeda’s early propaganda model, ISIS developed a media machine unlike any previous terrorist organization. For instance, the organization operates two divisions that are dedicated to propaganda: Al Hayat Media, focused on recruiting and painting an idyllic future, and Mu’assassat al-Furqan which focuses on spreading fear.[12] ISIS places special emphasis on its propaganda workers which is reflected in their monthly income being higher than those of a traditional soldier.[13]

Additionally, several Westerners rank towards the top of ISIS’s propaganda machine. Investigations indicate that an American and a German have played key roles in Al-Hayat Media.15 With this foreign talent, ISIS has much more media capability than al-Qaeda as they distribute high-quality and length propaganda movies. 

There are three major areas of innovation regarding ISIS’s media strategy: global dissemination of threat, decentralized messaging, and the development of new software.[14]  Social media allows sympathizers to disseminate their propaganda much more efficiently. At al-Qaeda’s peak, their videos could only air through Al-Jazeera or very specific websites. Today, ISIS sympathizers utilize social media where, for example, they can take over threads on unrelated topics. A strong case study can be seen in the 2014 World Cup where ISIS users tagged their tweets with “#brazil_2014” which gave them access to a network of users that were only browsing for soccer updates. 

With their decentralized structure and many sympathizers living in the West, there are as many as 3,000 users that can produce nearly 100,000 tweets each day.17 Due to this volume, it is incredibly difficult for governments to keep up. This approach differs from terror groups of the past who needed to rely on rigid structures to distribute propaganda. In contrast, due to technological advancement, ISIS is able to create a flexible system that is consistently being updated. 

Regarding software, ISIS developed an app called “Dawn of Glad Tidings” which allows users to post tweets without any manual input. Propaganda officials design the tweets and the app coordinates them based on a timing mechanism in order to avoid detection by algorithms.[15] Experts state that this app was responsible for up to almost 40,000 tweets in one day as ISIS fought in Mosul.[16] With the creation of this app, ISIS continued to produce content online even while sympathizers were away from their phones.

IV. Comparative Analysis

The evolution from al-Qaeda’s media strategy to that of the Islamic State marks a significant transformation in jihadist communication. Both organizations recognize media as an indispensable weapon of war, yet they deploy it in fundamentally different ways. As stated before, al-Qaeda’s media operations emerged in an earlier era defined by limited access to mass communication, where propaganda was largely ideologically dense and leader-centric.

Al-Qaeda’s strategy centered on persuasion through authority. Its messaging relied on theological legitimacy, charismatic leadership, and appeals to collective grievance. 

ISIS, by contrast, was born into a fully globalized, networked environment and therefore treated media not as a supporting instrument but as its own battlefield. Prioritizing accessibility and emotional immediacy over ideological depth, ISIS used high-definition video, social media platforms, and interactive apps in order to invite participation and immersion. This allows sympathizers to become both consumers and ultimately producers of propaganda.

The generational divide between the two organizations is equally significant. Al-Qaeda’s content reflected a 20th-century communication style through lengthy lectures, manifestos, and statements designed for an audience of already committed followers. ISIS, however, tailored its messaging to a younger, tech savvy demographic already accustomed to visual media and instant engagement. The result was a form of propaganda that resembled entertainment as much as extremist ideology. This shift in communication and media indicates a turning point in jihadist media strategy, demonstrating how applying technological advancement to propaganda can turn a message into a broader movement.

V. From Digital Propaganda to Artificial Intelligence

As illustrated, al-Qaeda and ISIS’s media strategy differ as ISIS was able to capitalize on the technological advancement of the time. ISIS’s success online exposes serious challenges in countering extremist propaganda. Decentralized content moves much faster than traditional information operations can keep up, making disruption difficult. The group’s digital strategy shows how insurgents can dominate the narrative without necessarily holding any physical territory. This adaptability underscores how effectively extremist groups leverage emerging technologies to advance their agendas. 

As the digital landscape continues to evolve, artificial intelligence (AI) has emerged as the next frontier, with terrorist organizations increasingly seeking to exploit its growing capabilities for propaganda, recruitment, and influence operations. As generative AI has been making tremendous progress, terrorist organizations are increasingly interested in exploiting and using it to their advantage.

Specifically, generative AI uses machine learning in order to generate new content, text, images, audio, and multifunctional simulations.[17] The difference between generative AI and other forms of AI is that the former is able to develop new outputs instead of just predicting and categorizing.[18] Examples of generative AI can be seen in ChatGPT, Google Gemini, Bing Image Creator, Microsoft VALL-E, and various other programs.

The use of artificial intelligence in radicalization and extremism is already taking place as groups such as al-Qaeda, Hamas, Hezbollah, and ISIS are already employing these tools. In the United Kingdom, a nineteen year old was arrested as he plotted to assassinate Queen Elizabeth II. Investigations later found that he exchanged approximately 5,000 messages with an AI chatbot during his radicalization.[19] 

In an article published by the Combating Terrorism Center at West Point, potential uses of AI by terrorist organizations include propaganda, interactive recruitment, automated attacks, social media exploitation, and cyber attacks.[20] Furthermore, the use of such tools by terrorist organizations fall into five categories:

  1. Polarizing or emotional content
  2. Disinformation or misinformation 
  3. Recruitment 
  4. Tactical learning 
  5. Attack planning.24

Real world examples can be seen through ISIS and Hamas. Firstly, ISIS has applied generative AI to translating propaganda messaging into languages such as Arabic, English, and Indonesian.[21]

Regarding Hamas, the terrorist organization has used generative AI in order to leak altered images with hopes of instigating more violence and spreading misinformation about what is happening in Gaza. Reports indicate that Hamas has manipulated already tragic images of injured young people and babies in order to create more chaos and disturbing content.[22]

Additionally, generative AI has been used in order to spread images and videos of Israeli soldiers wearing diapers with the aim of undermining the Israel Defense Forces, IDF, and spreading misinformation.[23]

However, artificial intelligence also provides new interesting methods in counterterrorism. Firstly, it could be used to counter propaganda and in deradicalization. AI tools could automatically detect and remove extremist content from social platforms thus curbing the spread of terrorist propaganda. AI could also support deradicalization programs by identifying at-risk individuals and analyzing their online behavior. 

Furthermore, through predictive analytics- analyzing patterns in historical data, social media presences, and other intelligence sources- AI may possess the capability to predict potential terrorist attacks.[24] 

VI.  The Reconfiguration of Counterterrorism in Digital Spaces

In today’s world, as extremist propaganda has migrated onto digital platforms, the responsibility for counterterrorism has increasingly become shared between governments and private enterprises. This shift has elevated technology companies into necessary security actors, while states are compelled to adapt to a fragmented and contested digital environment.

Platforms such as Meta, Google, and X (formerly Twitter) now function as intermediaries in contemporary counterterrorism and counterradicalization efforts. By hosting, amplifying, or suppressing content, they shape the informational conditions under which radicalization and mobilization occur. Content moderation on these platforms relies primarily on automated governance tools, including hashtag technologies, image recognition, and natural language processing models designed to detect extremist material.[25] Compared to earlier approaches, these systems are significantly more proactive and have reduced large-scale dissemination. However, in doing so, platforms have increasingly assumed the role of de facto security providers, concentrating substantial counterterrorism responsibility within non-governmental entities.             

Governments, in turn, have responded by integrating digital tools into their counterterrorism practices. Open-source intelligence (OSINT) methods, such as social media analysis, now complement more traditional intelligence practices, enabling extremist networks and potential radicalization to be monitored more accurately and in real time. At the same time, states have expanded strategic communication efforts aimed at challenging extremist narratives.

Strategically, counter-messaging encompasses a spectrum of approaches, ranging from disruption-oriented efforts that seek to delegitimize extremist claims to persuasion-oriented initiatives that promote alternative identities and social pathways. The latter frequently relies on non-state messengers, such as former extremists or community leaders, to enhance credibility and reach.

Despite these efforts, counter-narratives face significant structural constraints. Extremist propaganda often gains traction through emotional intensity, while state-produced messaging frequently lacks credibility in contexts marked by institutional distrust. As a result, counter-messaging remains disadvantaged within digital attention economies where emotional affect is often valued more highly than factual accuracy.

Taken together, these dynamics suggest that it is unrealistic for digital counterterrorism to eliminate extremist content entirely. Instead, its primary function is to contest the visibility, legitimacy, and narrative power of such content. Authority in the digital space is fragmented among social media platforms, states, and non-state actors, resulting in the emergence of a decentralized model of security governance.

VII. Conclusion

The progression from al-Qaeda’s traditional propaganda to ISIS’s digital media empire highlights how extremist groups rapidly adapt to technological change. While al-Qaeda relied on centralized, ideologically dense messaging, ISIS transformed media into a decentralized, participatory battlefield that redefined online radicalization.

As artificial intelligence becomes the newest technological frontier, terrorist organizations are already beginning to exploit its capabilities for propaganda, recruitment, and disinformation. Yet, AI also offers valuable tools for counterterrorism such as enabling faster detection, deradicalization efforts, and predictive analysis.

The evolution from al-Qaeda to ISIS to AI-driven extremism underscores that future conflicts will be fought not only on physical ground but also across digital and algorithmic spaces. Counterterrorism strategies must evolve accordingly to meet the speed and complexity of this new information war.

Bibliography

Earnhardt, Rebecca L. “Al-Qaeda’s Media Strategy: Internet Self- Radicalization and

Counter-Radicalization Policies.” Virginia Commonwealth University, 2014.

https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1001&context=wilder_pubs

.

Gerstel, Dylan. “Isis and Innovative Propaganda.” Swarthmore College. Accessed July 17, 2025.

https://works.swarthmore.edu/cgi/viewcontent.cgi?article=1004&context=swarthmoreirjo urnal.

Gongane, Vaishali U, Mousami  V Munot, and Alwin  D Anuse. “Detection and Moderation of Detrimental Content on Social Media Platforms: Current Status and Future Directions.” Soc Netw Anal Min, 2022. 

Hassan, Hassan. “The True Origins of Isis.” The Atlantic, January 7, 2019.

https://www.theatlantic.com/ideas/archive/2018/11/isis-origins-anbari-zarqawi/577030/.

Jetter, Michael. “The Inadvertent Consequences of Al-Qaeda News Coverage.” European

Economic Review, August 16, 2019. https://www.sciencedirect.com/science/article/abs/pii/S0014292119301448.

Mathur, Priyank, Clara Broekaert, and Colin P. Clarke. “The Radicalization (and Counter-Radicalization) Potential of Artificial Intelligence.” ICCT, May 1, 2024.

https://icct.nl/publication/radicalization-and-counter-radicalization-potential-artificial-inte lligence. 

Nelu, Clarisa. “Exploitation of Generative AI by Terrorist Groups.” ICCT, June 10, 2024. https://icct.nl/publication/exploitation-generative-ai-terrorist-groups. 

Saltman, Erin Marie, and Charlie Winter. “Islamic State: The Changing Face of Modern

Jihadism,” 2014.

Siegel, Daniel. “AI Jihad: Deciphering Hamas, al-Qaeda and Islamic State’s Generative AI

Digital Arsenal.” GNET, November 14, 2024. https://gnet-research.org/2024/02/19/ai-jihad-deciphering-hamas-al-qaeda-and-islamic-sta tes-generative-ai-digital-arsenal/. 

Thomas, Clayton. “Al Qaeda: Background, Current Status, and U.S. Policy .” Congressional

Research Service, May 6, 2024. https://www.congress.gov/crs-product/IF11854.

Weimann, Gabriel, Alexander T. Pack, Rachel Sulciner, Joelle Scheinin, Gal Rapaport, and David Diaz. “Generating Terror: The Risks of Generative AI Exploitation.” Combating

Terrorism Center at West Point, January 19, 2024. https://ctc.westpoint.edu/generating-terror-the-risks-of-generative-ai-exploitation/. 

Weinman, Edward. “Inside Isis.” Connecticut College. Accessed July 16, 2025.

https://www.conncoll.edu/news/cc-magazine/past-issues/2016-issues/fall-2016/inside-isis

/. 


[1] Clayton Thomas, “Al Qaeda: Background, Current Status, and U.S. Policy ,” Congressional Research Service, May 6, 2024, https://www.congress.gov/crs-product/IF11854.

[2] Ibid. 3 Ibid.

[3] Edward Weinman, “Inside Isis,” Connecticut College, accessed July 16, 2025, https://www.conncoll.edu/news/cc-magazine/past-issues/2016-issues/fall-2016/inside-isis/.

[4] Ibid.

[5] Hassan Hassan, “The True Origins of Isis,” The Atlantic, January 7, 2019, https://www.theatlantic.com/ideas/archive/2018/11/isis-origins-anbari-zarqawi/577030/.

[6] Edward Weinman, “Inside Isis,” Connecticut College, accessed July 16, 2025, https://www.conncoll.edu/news/cc-magazine/past-issues/2016-issues/fall-2016/inside-isis/.

[7] Rebecca L Earnhardt, “Al-Qaeda’s Media Strategy: Internet Self- Radicalization and Counter-Radicalization Policies,” Virginia Commonwealth University, 2014, https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1001&context=wilder_pubs.

[8] Ibid.

[9] Michael Jetter, “The Inadvertent Consequences of Al-Qaeda News Coverage,” European Economic Review, August 16, 2019, https://www.sciencedirect.com/science/article/abs/pii/S0014292119301448.

[10] Rebecca L Earnhardt, “Al-Qaeda’s Media Strategy: Internet Self- Radicalization and Counter-Radicalization Policies,” Virginia Commonwealth University, 2014, https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1001&context=wilder_pubs.

[11] Ibid.

[12] Dylan Gerstel, “Isis and Innovative Propaganda,” Swarthmore College, accessed July 17, 2025, https://works.swarthmore.edu/cgi/viewcontent.cgi?article=1004&context=swarthmoreirjournal.

[13] Ibid. 15 Ibid.

[14] Erin Marie Saltman and Charlie Winter, “Islamic State: The Changing Face of Modern Jihadism,” 2014. 17 Dylan Gerstel, “Isis and Innovative Propaganda,” Swarthmore College, accessed July 17, 2025, https://works.swarthmore.edu/cgi/viewcontent.cgi?article=1004&context=swarthmoreirjournal.

[15] Ibid.

[16] Ibid.

[17] Clarisa Nelu, “Exploitation of Generative AI by Terrorist Groups,” ICCT, June 10, 2024, https://icct.nl/publication/exploitation-generative-ai-terrorist-groups.

[18] Ibid.

[19] Priyank Mathur, Clara Broekaert, and Colin P. Clarke, “The Radicalization (and Counter-Radicalization) Potential of Artificial Intelligence,” ICCT, May 1, 2024, https://icct.nl/publication/radicalization-and-counter-radicalization-potential-artificial-intelligence.

[20] Gabriel Weimann et al., “Generating Terror: The Risks of Generative AI Exploitation,” Combating Terrorism Center at West Point, January 19, 2024, https://ctc.westpoint.edu/generating-terror-the-risks-of-generative-ai-exploitation/. 24 Ibid.

[21] Clarisa Nelu, “Exploitation of Generative AI by Terrorist Groups,” ICCT, June 10, 2024, https://icct.nl/publication/exploitation-generative-ai-terrorist-groups.

[22] Daniel Siegel, “AI Jihad: Deciphering Hamas, al-Qaeda and Islamic State’s Generative AI Digital Arsenal,” GNET, November 14, 2024, https://gnet-research.org/2024/02/19/ai-jihad-deciphering-hamas-al-qaeda-and-islamic-states-generative-ai-digital-arsenal/.

[23] Ibid.

[24] Clarisa Nelu, “Exploitation of Generative AI by Terrorist Groups,” ICCT, June 10, 2024, https://icct.nl/publication/exploitation-generative-ai-terrorist-groups.

[25] Vaishali U Gongane, Mousami  V Munot, and Alwin  D Anuse, “Detection and Moderation of Detrimental Content on Social Media Platforms: Current Status and Future Directions,” Soc Netw Anal Min, 2022.