The Frequency War

Electromagnetic Spectrum as Cognitive Terrain

The electromagnetic spectrum is not contested space. It is occupied territory, and the occupier does not wear a uniform.

On April 4, 2024, Lloyd’s List vessel-tracking data revealed something that should have alarmed every defense ministry in the West: 117 commercial ships appeared to be parked at Beirut’s Rafic Hariri International Airport. They were not on land, of course. Their navigation systems had been spoofed, their GPS positions falsified by Israeli electronic warfare systems designed to confuse inbound drones. The ships were at sea, sailing blind while their instruments insisted otherwise. That same week, analysis by Kuehne+Nagel confirmed 227 vessels in the Black Sea experienced the same displacement. By June 2025, Windward AI data compiled in a cumulative analysis by GPSPATRON documented more than 3,000 vessels spoofed in the Persian Gulf and Strait of Hormuz alone. These are not isolated incidents. They are the visible surface of an invisible war being waged across the entire electromagnetic spectrum, one that degrades not just navigation but the foundational trust that modern civilization places in its own infrastructure.

The Invisible Domain

The electromagnetic spectrum is the substrate on which modern society operates. Every GPS fix, every cellphone call, every stock trade timestamped to the microsecond, every synchrophasor measurement keeping a continental power grid synchronized: all of it rides on radio frequencies that can be jammed, spoofed, or denied with equipment that fits in a shoebox. A November 2025 analysis by RAND Europe described electromagnetic warfare as NATO’s most critical blind spot, documenting Russia’s deployment of over 400 radar sites and at least fourteen dedicated military electronic warfare units, with capabilities ranging from the mobile Krasukha-4 tactical system to the Murmansk-BN, a truck-mounted array capable of jamming high-frequency communications across a radius exceeding 5,000 kilometers. Russia’s doctrine treats the electromagnetic spectrum not as a support function but as a primary domain of combat, integrated at every echelon from platoon to theater command.

The convergence gap is this: Western institutions treat spectrum interference as a technical nuisance, a series of isolated incidents requiring engineering fixes. Russia, China, and their proxies treat the spectrum as cognitive terrain, a domain where degrading an adversary’s ability to navigate, communicate, and synchronize its own systems erodes trust in infrastructure that citizens and institutions take for granted. The attack is not on the signal. The attack is on the certainty that the signal can be trusted.

The Baltic Laboratory

The Baltic Sea has become the world’s most documented proving ground for spectrum warfare against civilian infrastructure. Since Russia’s full-scale invasion of Ukraine in February 2022, GPS jamming and spoofing in the region has become a near-daily occurrence, emanating primarily from electronic warfare installations in Russia’s Kaliningrad exclave and the St. Petersburg area. Polish researchers at Gdynia Maritime University triangulated the signal origins in spring 2025 to two coastal sites in Kaliningrad, both within a kilometer of known EW units and the Okunevo military antenna complex. The interference has shifted from crude jamming to sophisticated spoofing, falsifying coordinates to make ships appear at airports and aircraft report positions hundreds of kilometers from their actual location.

The scale is staggering. Between January and April 2025, a Baltic-Nordic ICAO submission documented over 122,000 flights disrupted by GNSS interference in the region. An EU Council document (ST-9188-2025-REV-1) recorded Poland logging 2,732 cases of GPS interference in January 2025 alone, with Lithuania reporting 1,185 cases the same month. Estonian authorities reported that 85 percent of the country’s flights were affected by navigation interference. Finland’s Finnair suspended flights to Tartu, Estonia in April 2024 after repeated signal disruptions made safe approach impossible.

In September 2025, the escalation reached its most visible inflection point. The plane carrying European Commission President Ursula von der Leyen experienced GPS jamming while approaching Plovdiv, Bulgaria, forcing pilots to navigate using analogue maps after the entire airport area’s GPS went dark. Kremlin spokesperson Dmitry Peskov denied Russian involvement, telling the Financial Times that the information was “incorrect.” But eight European countries, including the Baltic states, Finland, Poland, France, the Netherlands, and Ukraine, had already filed a formal complaint with the International Telecommunication Union in March 2025. The ITU’s Radio Regulatory Board, at its 98th meeting in March 2025, geolocated the interference sources to Russian territory. Russia did not respond.

The Clock Inside Everything

Navigation denial is the visible layer. The deeper vulnerability is timing. GPS is not merely a positioning system: it is the Western world’s de facto master clock. Every sector of critical infrastructure, from financial markets to power grids to telecommunications networks, depends on GPS-derived timing signals that arrive from satellites 20,000 kilometers overhead with the signal strength of a flashlight seen from space.

In the financial sector, the dependency is existential. A NIST Technical Note (TN 2189) documented that GPS timing is embedded in the operating architecture of stock exchanges, banking transaction systems, and telecommunications networks across the United States and globally. The New York Stock Exchange relies on GNSS antennae at its New Jersey server farm to timestamp every trade to the microsecond, while the SEC’s Rule 613 requires all equity and options markets to synchronize clocks within 50 milliseconds of NIST atomic time. The EU’s MiFID II directive mandates equivalent synchronization for European trading venues, brokerage firms, and banks. The Depository Trust and Clearing Corporation settles approximately $24 quadrillion in transactions annually. All of it runs on GPS-synchronized timing. A spoofing attack that introduced even millisecond-level timing errors could, as University of Texas researchers demonstrated in published analysis, trigger crossed markets, spurious quote saturation, and conditions resembling the 2010 Flash Crash, when improperly time-stamped data caused cascading failures across multiple exchanges.

The power grid dependency is equally alarming. Approximately 2,000 phasor measurement units (PMUs) are deployed across key nodes of the North American power grid, providing the synchronized voltage and current measurements that enable real-time monitoring, fault detection, and stability control. Every PMU derives its timing reference from GPS. Researchers at the University of Texas Radionavigation Laboratory demonstrated that GPS spoofing attacks on PMUs could induce false phase-angle measurements large enough to trigger automatic generator trips. A single false trip, under the wrong grid conditions, could initiate cascading faults identical in mechanism to the 2003 Northeast Blackoutthat left 55 million people without power. The vulnerability is not theoretical: it is engineered into the system’s design. As NIST documented, GPS dependency was built into critical infrastructure timing specifications from the beginning because GPS could readily provide the required accuracy. The dependency was a feature. It is now an attack surface.

The Cognitive Dimension

This is where The Frequency War diverges from conventional analysis of electronic warfare. The standard framing treats GPS jamming as a technical degradation problem: signals go down, backup systems engage, engineers develop countermeasures. This framing misses the strategic intent.

When Russia jams GPS across the Baltic, the immediate effect is navigational disruption. The strategic effect is that European citizens, airlines, shipping companies, and governments must confront the realization that a system they assumed was as reliable as gravity can be switched off by a hostile actor at will. When ships appear at airports and planes circle cities because their instruments lie, what degrades is not just the signal but the cognitive framework that takes the signal for granted. This is the essence of gray zone warfare applied to the electromagnetic spectrum: attack the adversary’s trust in its own systems without crossing the threshold that triggers a military response.

The Finland-based Hybrid Centre of Excellence concluded that the Baltic jamming is likely spillover from Russian drone defense operations rather than deliberately targeted at civilians. But as analysts quoted by PBS noted, Russian authorities have come to appreciate the “second order of effect”: even spillover creates disruption and disquiet among neighboring nations. The distinction between incidental and intentional collapses when the perpetrator sees the collateral damage as a strategic benefit and makes no effort to prevent it. Russia’s deployment of Tobol systems in Kaliningrad, its shifting from jamming to more sophisticated spoofing in 2025, and the geographic reach of interference extending from Finland to Bulgaria all indicate a deliberate expansion of capability, not merely defensive spillover.

The Institutional Response, and Its Limits

The international community has responded with unprecedented condemnation and almost no enforcement. On October 3, 2025, the ICAO Assembly at its 42nd triennial session in Montreal formally condemned Russia and North Korea for recurring GNSS interference, declaring the actions infractions of the 1944 Chicago Convention. Six EU member states, Estonia, Finland, Latvia, Lithuania, Poland, and Sweden, presented evidence of near-daily disruptions. The EU Transport Commission welcomed the condemnation as “unequivocal.” The ITU geolocated the interference to Russian territory. In June 2025, thirteen EU member states formally requested the European Commission develop alternative navigation systems and accelerate interference-resistant GNSS services.

ICAO has no enforcement mechanism. Its condemnation carries diplomatic weight but no operational consequence. Russia lost its seat on ICAO’s 36-member governing council after the 2022 invasion and has shown no inclination to recover it. The ICAO Council sent Russia a formal letter in July 2025 with a 30-day response window. Russia did not reply. The pattern is instructive: the international architecture for managing the electromagnetic spectrum was built for a world in which states cooperated on signal integrity because disruption was mutual. That assumption no longer holds when one state treats disruption as doctrine.

On the technical front, the most promising countermeasure is the R-Mode terrestrial navigation system developed by the German Aerospace Center (DLR) and European partners. R-Mode uses existing medium-wave and VHF maritime radio infrastructure to provide satellite-independent positioning with accuracy of approximately 10 meters. Eight transmitters now span an 800-kilometer corridor from Heligoland to Stockholm. The ORMOBASS project is extending coverage to Finland and Estonia, precisely the region most affected by Russian interference. IALA Guideline 1187, published in early 2025, standardizes the signal format. DLR researchers presented the system at the 39th Chaos Communication Congress in December 2025, targeting full operational capability by the end of 2026. The system is real, it works, and it is years late for a threat that has been documented daily since 2022.

Five Pillars: Toward Spectrum Sovereignty

Pillar One: Reclassify Spectrum Interference as Critical Infrastructure Attack. GPS jamming and spoofing that affects civilian aviation, maritime navigation, financial timing, or power grid synchronization should be classified under NATO and EU frameworks as an attack on critical infrastructure, not an aviation safety incident. The current classification fragments the response across ICAO, ITU, IMO, and national regulators. A unified classification triggers unified response authorities.

Pillar Two: Mandate GPS-Independent Timing for Critical Infrastructure. Financial exchanges, power grid operators, and telecommunications networks should be required to maintain independent timing sources, atomic clocks or terrestrial alternatives, capable of sustaining operations for a minimum of 30 days without GPS. The technology exists. The London Stock Exchange has already partnered with Hoptroff for terrestrial precision timing services. The U.S. National Timing, Resilience and Security Act of 2018 required the Department of Transportation to establish a national terrestrial timing signal. As of 2025, the deadline has been missed. Mandate it again with enforcement.

Pillar Three: Accelerate R-Mode and Terrestrial Navigation to Operational Status. The R-Mode project demonstrates that satellite-independent maritime navigation is technically feasible and cost-effective. Expand funding to achieve operational coverage across the entire Baltic and North Sea by 2027, with Mediterranean and Atlantic coverage following. Integrate R-Mode receivers into Type Approval requirements for commercial vessels. For aviation, accelerate EASA-certified alternative navigation approaches for airports in documented interference zones.

Pillar Four: Establish Spectrum Interference Attribution as a Standing Intelligence Function. The ITU’s geolocation of interference sources to Russian territory and the Polish researchers’ triangulation to specific Kaliningrad installations demonstrate that attribution is technically achievable. Make it continuous, automated, and publicly reported. A persistent, open-source spectrum monitoring network across NATO’s eastern flank, combining government sensors, academic research stations, and commercial satellite data, would eliminate the plausible deniability that sustains gray zone operations.

Pillar Five: Integrate Electromagnetic Domain Awareness into Civilian Decision-Making. RAND’s assessment that electromagnetic warfare is NATO’s blind spot applies equally to civilian governance. European heads of government fly through jammed airspace because no one in the decision chain treats spectrum integrity as a threat variable. Financial regulators approve trading systems that depend entirely on GPS timing because no one in the approval chain asks what happens if the timing disappears. Embed electromagnetic domain awareness into civilian risk frameworks the way cybersecurity has been embedded over the past decade. The spectrum is the substrate. If the substrate is contested, everything built on it is provisional.

War Over Invisible Air

The frequency war is already underway. It is not a future scenario but a present condition, documented daily across the Baltic, the Black Sea, the Persian Gulf, and the airspace of a dozen European countries. The West’s critical infrastructure, its financial markets, power grids, telecommunications networks, and transportation systems, was designed around the assumption that GPS signals would always be available and always be trustworthy. That assumption is now a vulnerability measured in ships that appear at airports, planes that navigate by paper maps, and a $24-quadrillion financial system synchronized to signals that a $29 jammer can erase.

The spectrum does not belong to anyone. That is both its genius and its weakness. The nations that build their civilization on invisible signals without defending those signals have built on sand, and the tide is already coming in.

RESONANCE

Defense News. (2025). Researchers Home in on Origins of Russia’s Baltic GPS Jamming. Defense News. https://www.defensenews.com/global/europe/2025/07/02/researchers-home-in-on-origins-of-russias-baltic-gps-jamming/Summary: Polish researchers at Gdynia Maritime University triangulated Baltic GPS interference to two Kaliningrad coastal sites near known EW installations and the Okunevo antenna complex.

Euronews. (2025). What Can Europe Do to Better Defend Against GPS Interference from Russia? Euronews. https://www.euronews.com/my-europe/2025/09/02/what-can-europe-do-to-better-defend-against-gps-interference-from-russiaSummary: Reports that Poland logged 2,732 GPS interference cases in January 2025, Estonia saw 85 percent of flights affected, and Lithuania recorded 22-fold year-over-year increases.

GPS World. (2025). 13 EU Member States Demand Action on GNSS Interference. GPS World. https://www.gpsworld.com/13-eu-member-states-demand-action-on-gnss-interference/Summary: Thirteen EU member states formally requested the European Commission develop alternative navigation systems and counter increasing GNSS interference, citing EU Council document ST-9188-2025-REV-1.

GPSPATRON. (2025). Maritime GNSS Interference Worldwide: A Cumulative Analysis 2025. GPSPATRON. https://gpspatron.com/maritime-gnss-interference-worldwide-a-cumulative-analysis-2025/Summary:Cumulative analysis documenting over 3,000 vessels spoofed in the Persian Gulf and Strait of Hormuz by June 2025, with global GNSS interference tracking data.

Humphreys T (2012). GPS Spoofing and the Financial Sector. University of Texas Radionavigation Laboratory. https://radionavlab.ae.utexas.edu/images/stories/files/papers/summary_financial_sector_implications.pdf.Summary: Analysis demonstrating that GPS spoofing of financial exchange timestamps could trigger crossed markets, quote saturation, and conditions resembling the 2010 Flash Crash.

Humphreys T, Shepard D, Fansler A (2012). Evaluation of the Vulnerability of Phasor Measurement Units to GPS Spoofing Attacks. International Journal of Critical Infrastructure Protectionhttps://www.sciencedirect.com/science/article/abs/pii/S1874548212000480Summary: Demonstrated that GPS spoofing of power grid PMUs could induce false generator trips and cascading faults resembling the 2003 Northeast Blackout.

ICAO. (2025). ICAO Assembly Condemns GNSS Radio Frequency Interference Originating from the DPRK and the Russian Federation. ICAO. https://www.icao.int/news/icao-assembly-condemns-gnss-radio-frequency-interference-originating-dprk-and-russianSummary: ICAO 42nd Assembly condemned Russia and North Korea for recurring GNSS interference constituting infractions of the 1944 Chicago Convention, based on evidence from six EU member states.

ICAO. (2025). Assembly 42nd Session Executive Committee Working Paper 553. ICAO. https://www.icao.int/sites/default/files/Meetings/a42/Documents/WP/wp_553_en.pdfSummary: Documents that ITU geolocated GNSS interference sources to Russian territory in March 2025, and that Russia failed to respond to the ICAO Council’s formal 30-day letter.

Inside GNSS. (2018). Financial Networks Shifting to GPS-Stamped Precise Time. Inside GNSS. https://insidegnss.com/financial-networks-shifting-to-gps-stamped-precise-time/Summary: Details EU MiFID II directive requiring all trading venues and institutions to synchronize clocks, driving universal GPS timing dependency in global financial markets.

Kuehne+Nagel. (2024). GPS Jamming Shows Ships in Impossible Locations. myKN/Kuehne+Nagel. https://mykn.kuehne-nagel.com/news/article/gps-jamming-shows-ships-in-impossible-locatio-09-Apr-2024.Summary: Confirmed 227 vessels spoofed in the Black Sea during the same week 117 ships appeared at Beirut Airport, linking the events to Israeli GPS countermeasures.

Le Gargasson C, Black J (2025). Electromagnetic Warfare: NATO’s Blind Spot Could Decide the Next Conflict. RAND Europe. https://www.rand.org/pubs/commentary/2025/11/electromagnetic-warfare-natos-blind-spot-could-decide.htmlSummary: Documents Russia’s 400+ radar sites, 14 military EW units, and deeply integrated electronic warfare doctrine, identifying NATO’s electromagnetic domain as its most critical capability gap.

Lloyd’s List. (2024). War-Zone GPS Jamming Sees More Ships Show Up at Airports. Lloyd’s Listhttps://www.lloydslist.com/LL1148748/War-zone-GPS-jamming-sees-more-ships-show-up-at-airports.Summary: Vessel-tracking data showing 117 commercial ships falsely positioned at Beirut Airport on April 4, 2024, due to Israeli GPS spoofing as drone defense.

Lombardi M (2016). Accurate, Traceable, and Verifiable Time Synchronization for World Financial Markets. Journal of Research of the National Institute of Standards and Technologyhttps://tf.nist.gov/general/pdf/2868.pdf.Summary: NIST documentation of GPS-based precision timing infrastructure serving stock exchanges in the United States, Europe, and Asia, with DTCC settling approximately $24 quadrillion annually.

Lombardi M (2021). An Evaluation of Dependencies of Critical Infrastructure Timing Systems on the Global Positioning System (GPS). NIST Technical Note 2189. https://www.gps.gov/sites/default/files/2025-07/NIST.TN_.2189.pdfSummary: Comprehensive evaluation of GPS timing dependencies in U.S. stock exchanges, power grid synchrophasor systems, and telecommunications, documenting that GPS dependency was engineered into infrastructure from inception.

DLR. (2025). Towards Standardisation: Satellite-Independent Navigation in the Baltic Sea. German Aerospace Center. https://www.dlr.de/en/latest/news/2025/towards-standardisationsatellite-independent-navigation-in-the-baltic-seaSummary: Documents R-Mode terrestrial navigation system with eight transmitters across 800 km, IALA Guideline 1187 standardization, and ORMOBASS project expansion targeting operational capability by end of 2026.

European Commission. (2025). EU Welcomes UN Aviation Agency’s Condemnation of Russia for Undermining Global Aviation Safety. European Commission. https://transport.ec.europa.eu/news-events/news/eu-welcomes-un-aviation-agencys-condemnation-russia-undermining-global-aviation-safety-2025-10-03_enSummary: EU Transport Commission statement welcoming ICAO’s condemnation as unequivocal recognition that GNSS interference violates the Chicago Convention.

GPS World. (2015). Going Up Against Time: The Power Grid’s Vulnerability to GPS Spoofing Attacks. GPS World. https://www.gpsworld.com/wirelessinfrastructuregoing-against-time-13278/Summary: University of Texas Radionavigation Laboratory experiments demonstrating successful GPS spoofing of phasor measurement units, with phase-angle errors sufficient to trigger automatic control actions in power grid systems.

GPS World. (2025). Hoptroff to Deliver Resilient Precision Timing to Financial Markets Through LSEG’s Platform. GPS World. https://www.gpsworld.com/hoptroff-to-deliver-resilient-precision-timing-to-financial-markets-through-lsegs-platform/Summary: London Stock Exchange partnership with Hoptroff for terrestrial precision timing, reflecting the financial sector’s recognition that GPS-dependent timing infrastructure requires resilient alternatives.

Heise Online. (2025). 39C3: Navigation System R-Mode Against the Baltic Jammer. Heise Online. https://www.heise.de/en/news/39C3-Navigation-system-R-Mode-against-the-Baltic-Jammer-11125406.html.Summary: DLR researchers presented R-Mode at 39C3, reporting 10-meter accuracy in testing, rubidium atomic clock synchronization, and a 300-kilometer range covering the entire Baltic Sea.

Newsweek. (2025). Russia Responds to GPS Jamming Accusations After EU Chief’s Plane Targeted. Newsweek. https://www.newsweek.com/russia-responds-gps-jamming-accusations-after-eu-chiefs-plane-targeted-2122612.Summary: Kremlin spokesperson Peskov denied Russian involvement in the von der Leyen GPS jamming incident, while multiple European officials characterized the interference as deliberate hybrid warfare.

PBS News. (2025). What to Know About Russia’s GPS Jamming of a European Official’s Plane. PBS. https://www.pbs.org/newshour/world/what-to-know-about-russias-gps-jamming-of-a-european-officials-plane.Summary: Analysis noting that Russian authorities appreciate the second-order effect of GPS disruption in creating strategic disquiet among neighboring nations, even if the primary intent is drone defense.

Spire Global. (2025). GNSS Interference Report: Russia 2024/2025, Part 1 of 4: Kaliningrad and the Baltic Sea. Spire Global. https://spire.com/blog/space-reconnaissance/gnss-interference-report-russia/Summary: Satellite-based monitoring confirming maritime GPS jamming from Kaliningrad strong enough to affect flight navigation, with Tobol system deployments and 84 hours of interference detected in six months of 2024 monitoring.

American Banker. (2020). The Cybersecurity Threat Lurking in the GPS Systems Banks Count On. American Bankerhttps://www.americanbanker.com/news/the-cybersecurity-threat-lurking-in-the-gps-systems-banks-count-on.Summary: Reports that SEC Rule 613 mandates 50ms clock synchronization for U.S. equity and options markets, with tens of millions of ATM and point-of-sale nodes dependent on GPS timing and lacking standardized backup architecture.

The Thirst Doctrine

The dam is the delivery mechanism. The headwater is the weapon.

The Fallacy: Water as a Climate Problem

Water scarcity is framed as a climate change consequence requiring humanitarian intervention and development policy. This framing is the fallacy. Upstream dam construction, reservoir manipulation, and transboundary water control are not development projects. They are weapon systems. And the states deploying them understand exactly what they are doing.

China controls the headwaters of rivers serving approximately 1.5 billion people across South and Southeast Asia, according to the National Bureau of Asian Research. The Mekong, the Brahmaputra, the Indus, the Salween, the Irrawaddy: all originate on the Tibetan Plateau, in Chinese-controlled territory. Turkey’s Southeastern Anatolia Project controls the Tigris and Euphrates headwaters that feed Iraq and Syria, where Carnegie Endowment research documentsa projected twenty-three percent decline in Euphrates flow by mid-century. Ethiopia’s Grand Renaissance Dam on the Blue Nile threatens Egypt’s existential water supply, where the basin population is projected to exceed one billion by 2050. These are not infrastructure investments. They are gray zone weapon systems that create coercive leverage over downstream states without kinetic action.

The Center of Gravity: The Headwater

The center of gravity is not the dam. It is the headwater. Whoever controls the origin point of a transboundary river controls every downstream state’s agricultural productivity, urban water supply, hydroelectric capacity, and ultimately political stability. The dam is the delivery mechanism. The headwater is the weapon.

China’s position is unique in the history of hydraulic power. No state has ever controlled the headwaters of so many rivers serving so many countries. On the Mekong alone, China now operates twelve mainstream dams with a combined storage capacity exceeding fifty billion cubic meters of water and generating over 22,000 megawatts, as the Stimson Center’s Mekong mainstream dam analysis documents. In 2019, while China’s upper Mekong received above-normal precipitation and snowmelt, its dams restricted more water than ever, contributing to an unprecedented drought that left Cambodian fishing communities reporting catches eighty to ninety percent below normal and forced Thailand to mobilize its military for drought relief. China’s Foreign Minister declared that lack of rain was the cause. Satellite data from Eyes on Earth proved otherwise.

And the Mekong is only one river. In July 2025, China began construction of the Yarlung Zangbo megadam on the Brahmaputra, a project three times larger than the Three Gorges Dam, which India and Bangladesh strongly oppose. China considers water management data to be a state secret. It has never signed a binding water-sharing agreement with any downstream nation. It does not recognize the authority of any international body to regulate its use of transboundary water. The infrastructure that regulates these rivers was built over decades, presented as domestic energy development, and never subjected to the irregular warfare analysis it demands.

The Evidence: Day Zero

Iran’s Day Zero crisis in late 2025 and early 2026 demonstrated the political consequence of water scarcity at national scale. Tehran’s reservoirs dropped to approximately eleven percent of capacity. The Atlantic Council reported that Iran is approaching what its own meteorological authorities describe as water bankruptcy, a condition in which damage becomes effectively irreversible on human timescales. When taps stopped running in southern Tehran during the winter of 2025, the legitimacy crisis was immediate. Protests that began over currency collapse and economic hardship spread to more than twenty provinces, with water scarcity emerging as a core driver of unrest, as Euronews documented.

The war has compounded the crisis. Bloomberg and Military.com reported in March 2026 that airstrikes on oil depots near Tehran contaminated water canals, and Carbon Brief confirmed that strikes on desalination plants in Iran and Bahrain are driving wider questions about water infrastructure as a military target. Iran’s Day Zero was treated as a domestic political crisis. It is a preview of what hydraulic coercion produces at scale: social destabilization triggered not by military action but by the upstream manipulation of a resource that no population can survive without.

A 2025 study in Nature Communications projects that nearly forty percent of global transboundary river basins could face water scarcity-induced conflict by 2050, with hotspots in Africa, southern and central Asia, the Middle East, and North America. The timeline is optimistic. The conflicts are already underway. They are simply not recognized as conflicts because they do not involve armies. They involve dam operators, reservoir managers, and upstream bureaucrats who understand that water released is leverage surrendered.

The Convergence Gap

Climate scientists see warming trends and precipitation changes. Humanitarian organizations see water access crises. Development economists see infrastructure investment opportunities. Hydrologists see river flow data. The Department of Defense sees force projection requirements. The IW community sees gray zone competition tools.

Nobody has converged the climate-conflict data, the dam-as-weapon literature, the IW gray zone framework, and the Day Zero crisis into a single operational concept. The ICRC addresses water access in armed conflict. The IW community models gray zone tools. The climate community projects future scarcity. No institution bridges the three. The World Bank acknowledges that more than half of the world’s 310 international river basins lack intergovernmental cooperative agreements. The architecture of institutional response is designed for the problem the way it was framed thirty years ago: water as a humanitarian concern. The weapon has evolved. The institutions have not.

Naming the Weapon: The Thirst Doctrine

I propose the term The Thirst Doctrine to describe the deliberate use of upstream water control as a gray zone coercion mechanism against downstream states. Hydraulic coercion is the application of water leverage, through dam operation, reservoir manipulation, and transboundary flow regulation, to achieve strategic objectives without crossing a kinetic threshold.

The Thirst Doctrine operates below the threshold of armed conflict. It creates dependency, produces compliance, and punishes resistance, all through infrastructure that looks like development and operates like a weapon. The 2019 Mekong drought proved the mechanism. Iran’s Day Zero proved the political consequence. The Brahmaputra megadam will prove the strategic intent.

The Doctrine: Five Pillars of Hydraulic Sovereignty

First Pillar: The Hydraulic Coercion Index. A standardized metric quantifying downstream dependency as strategic vulnerability. Measured by percentage of national water supply originating in foreign-controlled territory, upstream dam capacity relative to downstream demand, historical patterns of flow manipulation, and the existence or absence of binding water-sharing agreements. Updated quarterly. Briefed alongside force readiness assessments.

Second Pillar: Water as a Title 10 Concern. Doctrinal recognition that allied water infrastructure in transboundary basins falls within DoD responsibility for critical resource protection. Water security is not a humanitarian concern. It is a defense requirement. Where a NATO ally or Indo-Pacific partner depends on water controlled by a strategic competitor, that dependency is a force readiness vulnerability.

Third Pillar: The Upstream Deterrent. A deterrence framework specifically designed for hydraulic coercion, establishing that deliberate manipulation of transboundary water flows for strategic leverage will be treated as a hostile act requiring coordinated allied response across diplomatic, economic, and security channels.

Fourth Pillar: Hydrological Intelligence Preparation of the Battlespace. Integration of real-time hydrological monitoring, satellite imagery, flow sensors, and reservoir level tracking into intelligence preparation of the battlespace for every theater where transboundary water is a factor. The Stimson Center’s Mekong Dam Monitor provides a proof of concept. The capability must be scaled and institutionalized.

Fifth Pillar: Transboundary Water Security Agreements. Enforceable international agreements with monitoring mechanisms, dispute resolution authority, and deterrent consequences for violation. Not aspirational frameworks. Binding commitments with teeth. The fact that China has never signed a binding water-sharing agreement with any downstream nation is not a gap in international law. It is the strategic intent that the doctrine must name and counter.

The Dirty Water

One and a half billion people drink from rivers that originate in territory controlled by a single state. That state has built twelve dams on the upper Mekong, begun a megadam on the Brahmaputra three times the size of Three Gorges, considers water data a state secret, and has never signed a binding water-sharing agreement with any downstream nation. Meanwhile, Iran is approaching Day Zero under the combined weight of drought, mismanagement, and war, while its water canals burn and its desalination plants take fire from airstrikes.

The water is already weaponized. The doctrine is already being applied. The security community that is supposed to identify gray zone threats has never placed this in an IW framework. This article does.

RESONANCE

Atlantic Council (2026). How Iran’s Water Bankruptcy Seeped into the Protest Movement. https://www.atlanticcouncil.org/blogs/menasource/how-irans-water-bankruptcy-seeped-into-the-protest-movement/Summary: Reports that Iran is approaching water bankruptcy, with Day Zero conditions in Tehran and water system failure serving as a leading indicator of protest escalation and regime instability.

Carnegie Endowment for International Peace (2024). Troubled Waters in Conflict and a Changing Climate: Transboundary Basins Across the Middle East and North Africa. https://carnegieendowment.org/research/2024/02/troubled-waters-in-conflict-and-a-changing-climate-transboundary-basins-across-the-middle-east-and-north-africa?lang=enSummary: Documents a projected twenty-three percent decline in Euphrates water levels due to climate change and upstream Turkish dam construction, threatening Syrian and Iraqi water security.

Carbon Brief (2026). How Climate Change and War Threaten Iran’s Water Supplies. https://www.carbonbrief.org/qa-how-climate-change-and-war-threaten-irans-water-supplies/Summary: Reports that airstrikes on desalination plants in Iran and Bahrain are compounding an existing water crisis, with Iran in its sixth consecutive drought year and sixty-seven percent of national dam capacity empty.

Euronews (2026). Water Shortages, Blackouts and Air Pollution: How Environmental Damage Fuelled Iran’s Protests. https://www.euronews.com/green/2026/01/15/water-shortages-blackouts-and-air-pollution-how-environmental-damage-fuelled-irans-protestSummary: Documents how Iran’s 2026 protests erupted from a convergence of planned water and electricity cuts, deadly air pollution, and economic collapse, with land subsidence reaching forty times the global average.

Eyler B (2020). Science Shows Chinese Dams Are Devastating the Mekong. Foreign Policy. https://foreignpolicy.com/2020/04/22/science-shows-chinese-dams-devastating-mekong-river/Summary: Presents satellite-verified evidence that China’s upstream dams restricted water during the 2019 monsoon season despite above-normal precipitation, contributing to unprecedented downstream drought.

Military.com / Bloomberg (2026). War Is Pushing Iran’s Water Supply to the Brink of Collapse. https://www.military.com/daily-news/2026/03/12/war-pushing-irans-water-supply-brink-of-collapse.htmlSummary: Reports that Tehran was approaching Day Zero before the war began, with reservoirs at record lows, and that airstrikes on oil depots have contaminated water canals, compounding a decades-long water crisis.

National Bureau of Asian Research (2014). China’s Upstream Advantage in the Great Himalayan Watershed. https://www.nbr.org/publication/chinas-upstream-advantage-in-the-great-himalayan-watershed/Summary: Establishes that rivers originating on the Tibetan Plateau provide water to 1.5 billion people and that China, as the upstream power, has the ability to control the quality and flow of water reaching downstream neighbors.

Stimson Center (2024). Mekong Mainstream Dams. https://www.stimson.org/2020/mekong-mainstream-dams/Summary: Maps the status of all mainstream Mekong dams, documenting twelve operational Chinese dams with combined storage exceeding fifty billion cubic meters and generating 22,710 megawatts.

Stimson Center (2020). New Evidence: How China Turned Off the Tap on the Mekong River. https://www.stimson.org/2020/new-evidence-how-china-turned-off-the-mekong-tap/Summary: Presents Eyes on Earth satellite data proving that Chinese dams restricted water during the 2019 monsoon season despite above-normal precipitation, while China publicly blamed drought on lack of rainfall.

Works in Progress (2025). Rivers Are Now Battlefields. https://worksinprogress.co/issue/rivers-are-now-battlefields/Summary: Reports that China began construction of the Yarlung Zangbo megadam on the Brahmaputra in July 2025, a project three times larger than Three Gorges, which India and Bangladesh strongly oppose.

World Bank (2024). Water Knows No Borders: Transboundary Cooperation Is Key to Water Security and Avoiding Conflict. https://blogs.worldbank.org/en/water/water-knows-no-borders-transboundary-cooperation-key-water-security-and-avoiding-conflictSummary: Acknowledges that more than half of the world’s 310 international river basins lack intergovernmental cooperative agreements, with the population in water-stressed transboundary basins projected to double by 2050.

Zhao G, et al. (2025). Transboundary Conflict from Surface Water Scarcity Under Climate Change. Nature Communications. https://www.nature.com/articles/s41467-025-63568-ySummary: Projects that nearly forty percent of global transboundary river basins could face water scarcity-induced conflict by 2050, with hotspots in Africa, Asia, the Middle East, and North America.

The Orphan Protocol

How Killing Tehran’s Leadership Activated What Command Can No Longer Restrain

The Fallacy

Western counterterrorism doctrine operates on a foundational assumption: destroying an adversary’s command structure degrades its entire operational network. From conventional military forces to proxy militias to covert operatives abroad, the logic runs in one direction—decapitation weakens capability across all echelons. For state-directed conventional forces, this assumption generally holds. Armies that lose their generals fight badly. Air defenses that lose their command nodes stop coordinating. Naval vessels that lose contact with fleet command become individual targets rather than an integrated force. But this assumption collapses catastrophically when applied to a specific category of threat: pre-positioned covert networks designed to activate on condition rather than on command.

The United States and Israel killed Iran’s Supreme Leader Ayatollah Ali Khamenei on February 28, 2026, in a joint strike that also destroyed significant portions of Iran’s military infrastructure, nuclear facilities, and command apparatus. Within the conventional threat calculus, this was a strategic success. Within the covert operations calculus, it may prove to be a strategic accelerant. This is The Decapitation Fallacy: the belief that destroying an adversary’s leadership degrades its most dangerous capability, when in fact it eliminates the only mechanism that could have prevented that capability’s use.

The evidence for this fallacy sits in the federal court record. In 2017, the FBI arrested Ali Kourani in the Bronx—a naturalized U.S. citizen, trained by Hezbollah’s Islamic Jihad Organization, who had spent years conducting surveillance of federal buildings, military installations, airports, and daycare centers across New York City. During debriefings, Kourani did not describe an operative waiting for a phone call. He described a system. He told agents he was part of a “sleeper cell,” and that “there would be certain scenarios that would require action or conduct by those who belonged to the cell.” According to a detailed analysis by the Washington Institute’s Matthew Levitt, Kourani specified that if the United States and Iran went to war, the sleeper cell would expect to be called upon to act. If the United States targeted Hezbollah’s leadership or Iranian interests, those scenarios would also trigger the cell into action. The U.S. Department of Justice convicted Kourani on all eight counts and sentenced him to forty years in federal prison—the first Islamic Jihad Organization operative convicted for crimes against the United States.

Every activation condition Kourani described has now been simultaneously satisfied. The United States is at war with Iran. Khamenei is dead. Hezbollah’s patron state is under sustained bombardment. The intelligence architecture designed to detect the signal—the phone call, the coded email, the encrypted message activating dormant cells—is searching for a transmission that was never designed to occur. The signal is CNN. The signal is the explosion over Tehran. The decision to activate was made at the moment of recruitment, embedded in human memory, and distributed across an unknown number of operatives who have been living ordinary American lives while carrying categorical instructions that now apply.

The Center of Gravity

The center of gravity is not the cells themselves. It is not Tehran. It is not Hezbollah’s battered command structure in Beirut. The center of gravity is the pre-programmed activation architecture—the decision made years ago, encoded into the operational DNA of every pre-positioned operative, and now beyond the reach of any authority that might recall it.

This architecture was built methodically over decades by the IRGC-Quds Force and Hezbollah’s external operations arm, variously designated as the Islamic Jihad Organization, Unit 910, or the External Security Organization. The investment was not abstract. Kourani surveilled JFK International Airport, FBI field offices, Secret Service facilities, and a U.S. Army armory in New York. His co-defendant Samer el-Debek conducted missions in Panama to assess vulnerabilities of the Panama Canal and locate the U.S. and Israeli embassies. A third operative, Alexei Saab, was later indicted for nearly two decades of pre-operational surveillance on U.S. soil, confirming that all three captured operatives had acquired U.S. citizenship before their handlers tasked them with target surveillance—Hezbollah’s standard operating procedure for embedding agents through legal immigration channels.

Documented pre-positioning extends well beyond New York. Reporting compiled from federal investigations and open-source intelligence identifies historically documented Hezbollah and Iranian network activity in New York City, Detroit and Dearborn, Houston, Los Angeles, Boston, and less obvious locations including Portland, Oregon, and Louisville, Kentucky—where operatives were deliberately placed to blend in and form dormant cells. In Houston, a Hezbollah operative stockpiled over three hundred pounds of ammonium nitrate, the same precursor compound used in the 1995 Oklahoma City bombing. The geography is not random. It is target-adjacent, logistics-conscious, and designed for activation without the need for cross-border movement or conspicuous procurement.

The architecture’s power is its distribution. No single node holds the activation key. No communication must travel from point A to point B. Each operative carries the trigger criteria and the target knowledge within their own memory. The system was engineered to survive precisely what happened on February 28: the obliteration of its central command.

The Orphan Paradox

Conventional analysis holds that proxy networks degrade when their state sponsor is weakened. In the kinetic domain, this is partially true. Hezbollah’s conventional military capacity was severely diminished during the 2024 war with Israel, which killed Secretary-General Hassan Nasrallah and most of the group’s senior military leadership. The November 2024 ceasefire left Hezbollah operationally constrained, and Israel has continued near-daily strikes into Lebanon for over a year since. When Hezbollah reactivated on March 2 in response to Khamenei’s killing, it demonstrated capability but not the force it once commanded. CNN assessed that the group is “a shadow of the force it once was,” and it remains unclear whether Hezbollah can meaningfully alter the regional balance of power through conventional military action.

This assessment is accurate for Hezbollah’s conventional arm. It is dangerously wrong for its covert one. Condition-triggered cells become more lethal, not less, when their parent command structure is destroyed. Three mechanisms drive this paradox.

First, the restraint channel is severed. The only authority capable of issuing a stand-down order to pre-positioned operatives—the supreme leader, the Quds Force command chain, the IJO hierarchy—has been decapitated, degraded, or operationally disrupted. Iran’s internet has been largely shut down since the strikes began. The communication infrastructure that might theoretically transmit a recall signal barely exists. Even if a surviving Iranian authority wanted to prevent activation, the message would have to travel through a shattered command network to reach operatives who were specifically designed to function without it.

Second, the emotional trigger is amplified. Khamenei was not merely a political leader. Hezbollah’s Secretary-General Naim Qassem described Khamenei as the representative of the Imam Mahdi, stating that tens of millions of followers share a deep ideological and religious bond with his leadership, and that threats against him constitute threats against their own community. For operatives who swore allegiance to this figure—who were recruited, in many cases, from families with generational loyalty to Hezbollah—the killing is not merely an activation condition. It is a personal catalyst that transforms categorical instructions into moral imperative.

Third, the operational window is perceived as closing. Operatives who have lived quietly for years or decades understand that the war has now drawn maximum attention to Iranian networks inside the United States. FBI Director Kash Patel placed counterterrorism teams on high alert. The NYPD surged patrols at sensitive locations. Every dormant operative knows that the window between the current moment and the moment of their own detection is narrowing. For those with pre-loaded instructions and the will to execute, the calculus favors action now—not because an order arrived, but because waiting means the opportunity expires.

Historical precedent confirms the model. The 1983 Beirut barracks bombing that killed 241 U.S. Marines, the 1994 AMIA bombing in Buenos Aires that killed 85 people, and the 2012 Burgas attack in Bulgaria were all executed by pre-positioned operatives with minimal real-time command dependency. Hezbollah’s external operations wing has proven repeatedly that it can deliver mass-casualty attacks through distributed cells operating on prior instruction. What has changed is not the method but the scale of pre-positioning—and the simultaneous satisfaction of every trigger condition ever briefed to operatives on American soil.

The Convergence Gap

The domestic threat from orphaned, condition-triggered cells does not exist in isolation. It converges with a simultaneous degradation of the American defensive architecture that was built to detect exactly this kind of threat.

The Cybersecurity and Infrastructure Security Agency, the federal body responsible for protecting critical infrastructure from both physical and cyber attack, is operating at approximately 38 percent staffing due to a partial government shutdown. Most of the agency’s operating division leaders and regional office heads have departed under the current administration’s government-downsizing campaign. The agency’s temporary director was reassigned to another division of the Department of Homeland Security the same week the strikes began. This is the agency tasked with alerting the public and coordinating federal response to cyberattacks on water systems, electrical grids, hospitals, financial networks, and transportation infrastructure—all documented targets of Iranian reconnaissance. It is running below half capacity during the most acute Iranian cyber threat escalation in American history.

The FBI’s counterterrorism assets are stretched across an expanding threat matrix that includes the investigation of the Austin, Texas, mass shooting on March 1—where a gunman opened fire at a bar on West Sixth Street, killing two and wounding fourteen, and where authorities found an Iranian flag, photos of Iranian leaders, and a shirt reading “Property of Allah” on the suspect, a naturalized U.S. citizen from Senegal. The FBI’s Joint Terrorism Task Force is investigating the terrorism nexus. This is not ambiguity. This is a condition-triggered event—a signal before the pattern becomes visible to institutions still searching for the command they will never intercept. Simultaneously, the Bureau is managing enhanced surveillance of known Hezbollah-linked networks in multiple American cities, coordination with local law enforcement agencies conducting surge patrols, and intelligence sharing across the entire federal counterterrorism apparatus.

The intelligence community’s analytical bandwidth is consumed by the kinetic war itself: the Iran strike campaign, the Strait of Hormuz closure that has effectively halted shipping and disrupted roughly 20 percent of global oil supply, the Hezbollah-Israel front now active across southern Lebanon and Beirut, and the expanding retaliatory strikes on U.S. bases across the Gulf. The volume of high-priority intelligence traffic is enormous. The domestic covert threat—the silent one, the one that generates no signals intelligence—competes for attention against targets that are loud, kinetic, and immediately visible.

This is not three separate problems. It is one convergence: the defensive architecture built to detect condition-triggered activation is running below design capacity at the precise moment all activation conditions have been met. The threat and the vulnerability arrived simultaneously. And the cyber dimension compounds both. Multiple Iranian state-aligned hacktivist groups and the newly established “Electronic Operations Room,” formed the same day the strikes began, are conducting DDoS attacks, phishing campaigns, and reconnaissance against surveillance systems, financial networks, and energy infrastructure. CrowdStrike observed Iran-aligned groups initiating reconnaissance and DDoS activity that “often precedes more aggressive operations,” targeting energy, critical infrastructure, finance, telecommunications, and healthcare. A coordinated physical attack by dormant cells, combined with cyber disruption of emergency response and communications, would constitute a combined-arms asymmetric strike that no single agency is currently postured to address.

Naming the Weapon

The Orphan Protocol is a pre-positioned covert operations architecture designed to activate on condition rather than command, whose lethality increases when its parent command structure is destroyed—because the activation criteria have been met while the restraint mechanism has been eliminated.

This is not an edge case in Iranian doctrine. It is the mature expression of four decades of IRGC-Quds Force external operations investment. The pre-positioning of operatives in the Americas and Europe, the recruitment of agents with activation conditions embedded at induction, the years of surveillance and logistics preparation—this is the system performing exactly as it was designed to perform. The architects in Tehran planned for a war with the United States. They planned for the possibility that such a war would destroy their command structure. They built an activation architecture that does not require their survival. The architecture is now active—not because someone pushed a button, but because the conditions the button was designed to represent have all materialized in the physical world.

The U.S. counterterrorism framework was built for command-triggered threats. It assumes that between the decision to attack and the attack itself, there will be detectable activity: communications, logistics, procurement, movement. The Orphan Protocol eliminates that gap. The decision was made years ago. The logistics were completed at pre-positioning. The weapons may already be cached. The targets were surveilled and recorded in human memory, not in databases that can be intercepted. The attack, if it comes, emerges from silence—and silence is the one signal the system cannot detect.

The Doctrine

First Pillar — Condition Mapping. Systematically catalog every known and inferred condition-based trigger briefed to pre-positioned operatives, drawing from federal prosecution records, intelligence debriefings, and allied partner holdings. Cross-reference these conditions against current geopolitical events to maintain a real-time activation probability matrix. This does not require new collection. It requires re-interrogation of existing intelligence holdings with a new analytical lens: not “who are the operatives” but “what conditions were they told would activate them.” The Kourani debriefings alone contain activation criteria that have never been systematically mapped against live scenarios.

Second Pillar — Restraint Channel Assessment. When adversary command structures are targeted for decapitation, the targeting calculus must include an assessment of which proxy and covert networks were restrained by that command—and what happens when the restraint is removed. This is not currently part of the targeting process. Strike planning evaluates degradation of enemy capability. It does not evaluate the release of enemy capability that was held in check by the very authority being destroyed. Every future decapitation operation must include an orphan-network consequence assessment as a mandatory element of the targeting package.

Third Pillar — Silent Activation Detection. Develop behavioral indicators of condition-triggered activation that do not depend on communications intercepts. Financial pattern shifts—sudden cash withdrawals, closure of accounts, transfer of assets to family members. Digital behavior changes—deletion of social media presence, change in device usage patterns, increased consumption of encrypted platforms. Physical indicators—departure from daily routines, visits to previously surveilled target locations, acquisition of materiel consistent with attack preparation. These indicators exist in the data. They are not being aggregated across the relevant analytical frameworks because the frameworks are designed to detect command-and-control signals, not the absence of them.

Fourth Pillar — Domestic Readiness Floor. Establish a statutory minimum operational capacity for counterterrorism, cybersecurity, and critical infrastructure protection that cannot be breached by budget disputes, government shutdowns, or administrative restructuring during periods of active conflict with state sponsors of terrorism. The current model—where a continuing resolution dispute can reduce CISA to 38 percent staffing while the United States is at war with Iran and Iranian cyber assets are actively probing American infrastructure—is not a policy disagreement. It is an architectural failure. The readiness floor must be legislated, not negotiated, and it must activate automatically when the National Command Authority commits U.S. forces to combat operations against any nation-state designated as a sponsor of terrorism. No appropriations debate should be capable of degrading the homeland’s cyber and counterterrorism posture during active hostilities. Period.

Fifth Pillar — Combined-Arms Asymmetric Response. Pre-position joint federal, state, and local response frameworks for simultaneous physical attack and cyber disruption. The scenario—dormant cell activation coordinated with DDoS attacks on 911 dispatch systems, ransomware on hospital networks, disruption of traffic management and power distribution—is not hypothetical. It is the logical combined-arms expression of Iranian multi-domain doctrine, validated by the concurrent kinetic and cyber operations already underway against regional targets. No integrated federal response plan for this specific scenario appears to exist at the interagency level. Building one after the first combined-arms strike is not planning. It is triage.

The Walk

Somewhere in the United States, right now, a person is living a quiet life. They hold a job. They pay rent. They may have children in American schools. They carry no weapon. They receive no communication from Tehran. They do not need to.

They watched the news on February 28. They saw Tehran burning. They saw the supreme leader—the man they were told represented divine authority on earth—confirmed dead. They recognized, without being told, that every condition briefed to them years ago in a basement in southern Lebanon has now been met. No phone rang. No email arrived. No coded message crossed any network that the NSA monitors.

The signal was the event itself. And the only authority that could tell them to stand down is buried in the rubble of a compound that no longer exists.

This is the Orphan Protocol. It was activated not by command, but by consequence. The entire American intelligence apparatus is postured to intercept an order that was given a decade ago, embedded in memory, and sealed with an oath that outlived the man who administered it.

The pattern will become visible only after the first strike. The signal has been visible since the first bomb fell on Tehran.

We are not waiting for the signal. We are waiting for the institutions to recognize that they already missed it.

RESONANCE

Al Jazeera (2026, March 3). Shutdown of Hormuz Strait Raises Fears of Soaring Oil Prices. Al Jazeera.https://www.aljazeera.com/economy/2026/3/3/shutdown-of-hormuz-strait-raises-fears-of-soaring-oil-prices. Summary: Reports the IRGC commander’s declaration that the Strait of Hormuz was closed, with at least five tankers damaged, two crew members killed, approximately 150 ships stranded, and shipping ground to a near halt—disrupting one-fifth of globally consumed oil and significant LNG volumes.

Critical Threats Project (2026, February 23). Iran Update, February 23, 2026. Institute for the Study of War / Critical Threats Project. https://www.criticalthreats.org/analysis/iran-update-february-23-2026Summary: Documents Iranian Foreign Minister Araghchi’s January 2026 trip to Beirut to ensure Hezbollah would intervene in a new conflict, reports that IRGC officers had effectively “taken over” Hezbollah to rebuild military capabilities, and confirms Iran and Lebanon were rapidly reconstituting Hezbollah’s drone stockpile—establishing the pre-conflict command integration that the Orphan Protocol’s condition-based activation model supplants once that command structure is destroyed.

CrowdStrike (2026, March 1). Iran-Aligned Threat Groups Conducting Reconnaissance and DDoS Activity. Cybersecurity Divehttps://www.cybersecuritydive.com/news/iran-hackers-threat-level-us-allies/813494/. Summary: CrowdStrike’s head of counter-adversary operations warned that Iran-backed groups had begun reconnaissance and DDoS attacks against energy, finance, telecommunications, healthcare, and critical infrastructure targets—behaviors that historically precede more aggressive operations.

Foundation for Defense of Democracies (2019, September 25). New Indictment Adds to Evidence of Hezbollah Terrorist Activities in the U.S. FDD. https://www.fdd.org/analysis/2019/09/25/new-indictment-adds-to-evidence-of-hezbollah-terrorist-activities-in-the-us/Summary: Analysis of the Alexei Saab indictment confirming Hezbollah’s modus operandi of embedding operatives who acquire U.S. citizenship before being tasked with surveillance of potential targets, establishing a pattern across at least three captured External Security Organization agents.

Iran International (2026, March 1). Iran Sleeper Cell Fears Rise After Austin Shooting. Iran Internationalhttps://www.iranintl.com/en/202603016611Summary: Reports discovery of an Iranian flag and regime leader photographs in the apartment of the Austin mass shooting suspect, alongside a parallel gun attack on an Iranian dissident’s gym in Canada, raising concerns about condition-triggered activation following Khamenei’s death.

Levitt M (2019, June). Hezbollah Isn’t Just in Beirut. It’s in New York, Too. The Washington Institute for Near East Policy. https://www.washingtoninstitute.org/policy-analysis/hezbollah-isnt-just-beirut-its-new-york-too. Summary: Detailed analysis of the Kourani conviction revealing that the National Counterterrorism Center revised its longstanding assessment of Hezbollah’s homeland threat, concluding the group is “determined to give itself a potential homeland option as a critical component of its terrorism playbook.”

Levitt M (2019). Inside Hezbollah’s American Sleeper Cells: Waiting for Iran’s Signal to Strike U.S. and Israeli Targets. The Washington Institute for Near East Policy. https://www.washingtoninstitute.org/policy-analysis/inside-hezbollahs-american-sleeper-cells-waiting-irans-signal-strike-us-and-israeliSummary: The foundational analysis of Hezbollah’s Unit 910 operational doctrine on U.S. soil, including Kourani’s self-identification as a sleeper cell member and his disclosure that condition-based triggers—war with Iran, targeting of Iranian interests—would activate dormant cells without requiring real-time command.

Lucas R (2026, March 2). U.S. States Take Steps to Guard Against Any Potential Threat from Iran. NPR.https://www.npr.org/2026/03/02/nx-s1-5732326/u-s-states-take-steps-to-guard-against-any-potential-threat-from-iranSummary: Confirms FBI Director Kash Patel placed counterterrorism teams on high alert and that the U.S. has historically been a difficult operating environment for Iranian intelligence, with the regime resorting to hiring criminals for murder-for-hire plots rather than relying on diaspora recruitment.

Lynnwood Times (2026, March 2). US Gearing Up for Possible Terror Sleeper Cell Attacks on US Soil. Lynnwood Timeshttps://lynnwoodtimes.com/2026/03/02/sleeper-cell/Summary: Compilation of historically documented cities and regions for Hezbollah and Iranian network activity, including the National Counterterrorism Center’s identification of approximately 18,000 known and suspected terrorists with ties to jihadist groups who entered the United States under prior border policies.

NBC News (2019, December 3). Hezbollah ‘Sleeper’ Agent in New York Gets 40-Year Prison Sentence. NBC Newshttps://www.nbcnews.com/politics/national-security/prosecutors-ask-life-term-new-york-man-who-wanted-die-n1091421Summary: Reporting on Kourani’s sentencing, including his description of his family as the “bin Ladens of Lebanon” and his first Hezbollah weapons training at age 16—establishing the depth of generational recruitment that produces operatives willing to spend decades in dormancy.

Palmer M (2026, March 3). The Lead U.S. Cyber Agency Is Stretched Thin as Iran Hacking Threat Escalates. CNBC.https://www.cnbc.com/2026/03/03/iran-cisa-cybersecurity-war-threat.htmlSummary: Reports that CISA is operating at approximately 38 percent staffing due to a partial government shutdown, with its temporary director reassigned, at the precise moment Iranian cyber threats against U.S. critical infrastructure are escalating to historic levels.

Schanzer J (2026, March 4). Iran’s Pro-Regime Hackers Cannot Back Up Their Claims of Successful Cyber Attacks. Foundation for Defense of Democracies. https://www.fdd.org/analysis/2026/03/04/irans-pro-regime-hackers-cannot-back-up-their-claims-of-successful-cyber-attacks/Summary: Assessment that while Iranian hacktivist groups are inflating claims of successful attacks, the Cyber Isnaad Front and affiliated proxies have declared intent to target U.S. and Israeli critical infrastructure, and the fog of war in cyberspace favors the attacker’s psychological objectives regardless of technical success.

Symantec Threat Hunter Team (2026, March). Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company. Security.comhttps://www.security.com/threat-intelligence/iran-cyber-threat-activity-usSummary: Documents Iranian state-sponsored APT Seedworm’s presence on networks of a U.S. bank, a regional airport, and a software company, establishing that pre-positioned cyber access parallels pre-positioned human operatives in the Orphan Protocol model.

Unit 42, Palo Alto Networks (2026, March 2). Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran. Palo Alto Networkshttps://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/Summary: Identifies the “Electronic Operations Room” established on February 28, 2026, and catalogs multiple Iranian state-aligned personas conducting data exfiltration, DDoS, and cyber operations against Israeli and regional targets, with assessed escalation risk to U.S. critical infrastructure.

U.S. Department of Justice (2019, May 17). Ali Kourani Convicted in Manhattan Federal Court for Covert Terrorist Activities on Behalf of Hizballah’s Islamic Jihad Organization. DOJ. https://www.justice.gov/archives/opa/pr/ali-kourani-convicted-manhattan-federal-court-covert-terrorist-activities-behalf-hizballah-sSummary: Official Department of Justice press release documenting Kourani’s conviction on all eight counts of terrorism, sanctions, and immigration offenses—the first IJO operative convicted for crimes against the United States—including details of weapons training, surveillance operations, and coded communications with his Hezbollah handler.