The Frequency War

Electromagnetic Spectrum as Cognitive Terrain

The electromagnetic spectrum is not contested space. It is occupied territory, and the occupier does not wear a uniform.

On April 4, 2024, Lloyd’s List vessel-tracking data revealed something that should have alarmed every defense ministry in the West: 117 commercial ships appeared to be parked at Beirut’s Rafic Hariri International Airport. They were not on land, of course. Their navigation systems had been spoofed, their GPS positions falsified by Israeli electronic warfare systems designed to confuse inbound drones. The ships were at sea, sailing blind while their instruments insisted otherwise. That same week, analysis by Kuehne+Nagel confirmed 227 vessels in the Black Sea experienced the same displacement. By June 2025, Windward AI data compiled in a cumulative analysis by GPSPATRON documented more than 3,000 vessels spoofed in the Persian Gulf and Strait of Hormuz alone. These are not isolated incidents. They are the visible surface of an invisible war being waged across the entire electromagnetic spectrum, one that degrades not just navigation but the foundational trust that modern civilization places in its own infrastructure.

The Invisible Domain

The electromagnetic spectrum is the substrate on which modern society operates. Every GPS fix, every cellphone call, every stock trade timestamped to the microsecond, every synchrophasor measurement keeping a continental power grid synchronized: all of it rides on radio frequencies that can be jammed, spoofed, or denied with equipment that fits in a shoebox. A November 2025 analysis by RAND Europe described electromagnetic warfare as NATO’s most critical blind spot, documenting Russia’s deployment of over 400 radar sites and at least fourteen dedicated military electronic warfare units, with capabilities ranging from the mobile Krasukha-4 tactical system to the Murmansk-BN, a truck-mounted array capable of jamming high-frequency communications across a radius exceeding 5,000 kilometers. Russia’s doctrine treats the electromagnetic spectrum not as a support function but as a primary domain of combat, integrated at every echelon from platoon to theater command.

The convergence gap is this: Western institutions treat spectrum interference as a technical nuisance, a series of isolated incidents requiring engineering fixes. Russia, China, and their proxies treat the spectrum as cognitive terrain, a domain where degrading an adversary’s ability to navigate, communicate, and synchronize its own systems erodes trust in infrastructure that citizens and institutions take for granted. The attack is not on the signal. The attack is on the certainty that the signal can be trusted.

The Baltic Laboratory

The Baltic Sea has become the world’s most documented proving ground for spectrum warfare against civilian infrastructure. Since Russia’s full-scale invasion of Ukraine in February 2022, GPS jamming and spoofing in the region has become a near-daily occurrence, emanating primarily from electronic warfare installations in Russia’s Kaliningrad exclave and the St. Petersburg area. Polish researchers at Gdynia Maritime University triangulated the signal origins in spring 2025 to two coastal sites in Kaliningrad, both within a kilometer of known EW units and the Okunevo military antenna complex. The interference has shifted from crude jamming to sophisticated spoofing, falsifying coordinates to make ships appear at airports and aircraft report positions hundreds of kilometers from their actual location.

The scale is staggering. Between January and April 2025, a Baltic-Nordic ICAO submission documented over 122,000 flights disrupted by GNSS interference in the region. An EU Council document (ST-9188-2025-REV-1) recorded Poland logging 2,732 cases of GPS interference in January 2025 alone, with Lithuania reporting 1,185 cases the same month. Estonian authorities reported that 85 percent of the country’s flights were affected by navigation interference. Finland’s Finnair suspended flights to Tartu, Estonia in April 2024 after repeated signal disruptions made safe approach impossible.

In September 2025, the escalation reached its most visible inflection point. The plane carrying European Commission President Ursula von der Leyen experienced GPS jamming while approaching Plovdiv, Bulgaria, forcing pilots to navigate using analogue maps after the entire airport area’s GPS went dark. Kremlin spokesperson Dmitry Peskov denied Russian involvement, telling the Financial Times that the information was “incorrect.” But eight European countries, including the Baltic states, Finland, Poland, France, the Netherlands, and Ukraine, had already filed a formal complaint with the International Telecommunication Union in March 2025. The ITU’s Radio Regulatory Board, at its 98th meeting in March 2025, geolocated the interference sources to Russian territory. Russia did not respond.

The Clock Inside Everything

Navigation denial is the visible layer. The deeper vulnerability is timing. GPS is not merely a positioning system: it is the Western world’s de facto master clock. Every sector of critical infrastructure, from financial markets to power grids to telecommunications networks, depends on GPS-derived timing signals that arrive from satellites 20,000 kilometers overhead with the signal strength of a flashlight seen from space.

In the financial sector, the dependency is existential. A NIST Technical Note (TN 2189) documented that GPS timing is embedded in the operating architecture of stock exchanges, banking transaction systems, and telecommunications networks across the United States and globally. The New York Stock Exchange relies on GNSS antennae at its New Jersey server farm to timestamp every trade to the microsecond, while the SEC’s Rule 613 requires all equity and options markets to synchronize clocks within 50 milliseconds of NIST atomic time. The EU’s MiFID II directive mandates equivalent synchronization for European trading venues, brokerage firms, and banks. The Depository Trust and Clearing Corporation settles approximately $24 quadrillion in transactions annually. All of it runs on GPS-synchronized timing. A spoofing attack that introduced even millisecond-level timing errors could, as University of Texas researchers demonstrated in published analysis, trigger crossed markets, spurious quote saturation, and conditions resembling the 2010 Flash Crash, when improperly time-stamped data caused cascading failures across multiple exchanges.

The power grid dependency is equally alarming. Approximately 2,000 phasor measurement units (PMUs) are deployed across key nodes of the North American power grid, providing the synchronized voltage and current measurements that enable real-time monitoring, fault detection, and stability control. Every PMU derives its timing reference from GPS. Researchers at the University of Texas Radionavigation Laboratory demonstrated that GPS spoofing attacks on PMUs could induce false phase-angle measurements large enough to trigger automatic generator trips. A single false trip, under the wrong grid conditions, could initiate cascading faults identical in mechanism to the 2003 Northeast Blackoutthat left 55 million people without power. The vulnerability is not theoretical: it is engineered into the system’s design. As NIST documented, GPS dependency was built into critical infrastructure timing specifications from the beginning because GPS could readily provide the required accuracy. The dependency was a feature. It is now an attack surface.

The Cognitive Dimension

This is where The Frequency War diverges from conventional analysis of electronic warfare. The standard framing treats GPS jamming as a technical degradation problem: signals go down, backup systems engage, engineers develop countermeasures. This framing misses the strategic intent.

When Russia jams GPS across the Baltic, the immediate effect is navigational disruption. The strategic effect is that European citizens, airlines, shipping companies, and governments must confront the realization that a system they assumed was as reliable as gravity can be switched off by a hostile actor at will. When ships appear at airports and planes circle cities because their instruments lie, what degrades is not just the signal but the cognitive framework that takes the signal for granted. This is the essence of gray zone warfare applied to the electromagnetic spectrum: attack the adversary’s trust in its own systems without crossing the threshold that triggers a military response.

The Finland-based Hybrid Centre of Excellence concluded that the Baltic jamming is likely spillover from Russian drone defense operations rather than deliberately targeted at civilians. But as analysts quoted by PBS noted, Russian authorities have come to appreciate the “second order of effect”: even spillover creates disruption and disquiet among neighboring nations. The distinction between incidental and intentional collapses when the perpetrator sees the collateral damage as a strategic benefit and makes no effort to prevent it. Russia’s deployment of Tobol systems in Kaliningrad, its shifting from jamming to more sophisticated spoofing in 2025, and the geographic reach of interference extending from Finland to Bulgaria all indicate a deliberate expansion of capability, not merely defensive spillover.

The Institutional Response, and Its Limits

The international community has responded with unprecedented condemnation and almost no enforcement. On October 3, 2025, the ICAO Assembly at its 42nd triennial session in Montreal formally condemned Russia and North Korea for recurring GNSS interference, declaring the actions infractions of the 1944 Chicago Convention. Six EU member states, Estonia, Finland, Latvia, Lithuania, Poland, and Sweden, presented evidence of near-daily disruptions. The EU Transport Commission welcomed the condemnation as “unequivocal.” The ITU geolocated the interference to Russian territory. In June 2025, thirteen EU member states formally requested the European Commission develop alternative navigation systems and accelerate interference-resistant GNSS services.

ICAO has no enforcement mechanism. Its condemnation carries diplomatic weight but no operational consequence. Russia lost its seat on ICAO’s 36-member governing council after the 2022 invasion and has shown no inclination to recover it. The ICAO Council sent Russia a formal letter in July 2025 with a 30-day response window. Russia did not reply. The pattern is instructive: the international architecture for managing the electromagnetic spectrum was built for a world in which states cooperated on signal integrity because disruption was mutual. That assumption no longer holds when one state treats disruption as doctrine.

On the technical front, the most promising countermeasure is the R-Mode terrestrial navigation system developed by the German Aerospace Center (DLR) and European partners. R-Mode uses existing medium-wave and VHF maritime radio infrastructure to provide satellite-independent positioning with accuracy of approximately 10 meters. Eight transmitters now span an 800-kilometer corridor from Heligoland to Stockholm. The ORMOBASS project is extending coverage to Finland and Estonia, precisely the region most affected by Russian interference. IALA Guideline 1187, published in early 2025, standardizes the signal format. DLR researchers presented the system at the 39th Chaos Communication Congress in December 2025, targeting full operational capability by the end of 2026. The system is real, it works, and it is years late for a threat that has been documented daily since 2022.

Five Pillars: Toward Spectrum Sovereignty

Pillar One: Reclassify Spectrum Interference as Critical Infrastructure Attack. GPS jamming and spoofing that affects civilian aviation, maritime navigation, financial timing, or power grid synchronization should be classified under NATO and EU frameworks as an attack on critical infrastructure, not an aviation safety incident. The current classification fragments the response across ICAO, ITU, IMO, and national regulators. A unified classification triggers unified response authorities.

Pillar Two: Mandate GPS-Independent Timing for Critical Infrastructure. Financial exchanges, power grid operators, and telecommunications networks should be required to maintain independent timing sources, atomic clocks or terrestrial alternatives, capable of sustaining operations for a minimum of 30 days without GPS. The technology exists. The London Stock Exchange has already partnered with Hoptroff for terrestrial precision timing services. The U.S. National Timing, Resilience and Security Act of 2018 required the Department of Transportation to establish a national terrestrial timing signal. As of 2025, the deadline has been missed. Mandate it again with enforcement.

Pillar Three: Accelerate R-Mode and Terrestrial Navigation to Operational Status. The R-Mode project demonstrates that satellite-independent maritime navigation is technically feasible and cost-effective. Expand funding to achieve operational coverage across the entire Baltic and North Sea by 2027, with Mediterranean and Atlantic coverage following. Integrate R-Mode receivers into Type Approval requirements for commercial vessels. For aviation, accelerate EASA-certified alternative navigation approaches for airports in documented interference zones.

Pillar Four: Establish Spectrum Interference Attribution as a Standing Intelligence Function. The ITU’s geolocation of interference sources to Russian territory and the Polish researchers’ triangulation to specific Kaliningrad installations demonstrate that attribution is technically achievable. Make it continuous, automated, and publicly reported. A persistent, open-source spectrum monitoring network across NATO’s eastern flank, combining government sensors, academic research stations, and commercial satellite data, would eliminate the plausible deniability that sustains gray zone operations.

Pillar Five: Integrate Electromagnetic Domain Awareness into Civilian Decision-Making. RAND’s assessment that electromagnetic warfare is NATO’s blind spot applies equally to civilian governance. European heads of government fly through jammed airspace because no one in the decision chain treats spectrum integrity as a threat variable. Financial regulators approve trading systems that depend entirely on GPS timing because no one in the approval chain asks what happens if the timing disappears. Embed electromagnetic domain awareness into civilian risk frameworks the way cybersecurity has been embedded over the past decade. The spectrum is the substrate. If the substrate is contested, everything built on it is provisional.

War Over Invisible Air

The frequency war is already underway. It is not a future scenario but a present condition, documented daily across the Baltic, the Black Sea, the Persian Gulf, and the airspace of a dozen European countries. The West’s critical infrastructure, its financial markets, power grids, telecommunications networks, and transportation systems, was designed around the assumption that GPS signals would always be available and always be trustworthy. That assumption is now a vulnerability measured in ships that appear at airports, planes that navigate by paper maps, and a $24-quadrillion financial system synchronized to signals that a $29 jammer can erase.

The spectrum does not belong to anyone. That is both its genius and its weakness. The nations that build their civilization on invisible signals without defending those signals have built on sand, and the tide is already coming in.

RESONANCE

Defense News. (2025). Researchers Home in on Origins of Russia’s Baltic GPS Jamming. Defense News. https://www.defensenews.com/global/europe/2025/07/02/researchers-home-in-on-origins-of-russias-baltic-gps-jamming/Summary: Polish researchers at Gdynia Maritime University triangulated Baltic GPS interference to two Kaliningrad coastal sites near known EW installations and the Okunevo antenna complex.

Euronews. (2025). What Can Europe Do to Better Defend Against GPS Interference from Russia? Euronews. https://www.euronews.com/my-europe/2025/09/02/what-can-europe-do-to-better-defend-against-gps-interference-from-russiaSummary: Reports that Poland logged 2,732 GPS interference cases in January 2025, Estonia saw 85 percent of flights affected, and Lithuania recorded 22-fold year-over-year increases.

GPS World. (2025). 13 EU Member States Demand Action on GNSS Interference. GPS World. https://www.gpsworld.com/13-eu-member-states-demand-action-on-gnss-interference/Summary: Thirteen EU member states formally requested the European Commission develop alternative navigation systems and counter increasing GNSS interference, citing EU Council document ST-9188-2025-REV-1.

GPSPATRON. (2025). Maritime GNSS Interference Worldwide: A Cumulative Analysis 2025. GPSPATRON. https://gpspatron.com/maritime-gnss-interference-worldwide-a-cumulative-analysis-2025/Summary:Cumulative analysis documenting over 3,000 vessels spoofed in the Persian Gulf and Strait of Hormuz by June 2025, with global GNSS interference tracking data.

Humphreys T (2012). GPS Spoofing and the Financial Sector. University of Texas Radionavigation Laboratory. https://radionavlab.ae.utexas.edu/images/stories/files/papers/summary_financial_sector_implications.pdf.Summary: Analysis demonstrating that GPS spoofing of financial exchange timestamps could trigger crossed markets, quote saturation, and conditions resembling the 2010 Flash Crash.

Humphreys T, Shepard D, Fansler A (2012). Evaluation of the Vulnerability of Phasor Measurement Units to GPS Spoofing Attacks. International Journal of Critical Infrastructure Protectionhttps://www.sciencedirect.com/science/article/abs/pii/S1874548212000480Summary: Demonstrated that GPS spoofing of power grid PMUs could induce false generator trips and cascading faults resembling the 2003 Northeast Blackout.

ICAO. (2025). ICAO Assembly Condemns GNSS Radio Frequency Interference Originating from the DPRK and the Russian Federation. ICAO. https://www.icao.int/news/icao-assembly-condemns-gnss-radio-frequency-interference-originating-dprk-and-russianSummary: ICAO 42nd Assembly condemned Russia and North Korea for recurring GNSS interference constituting infractions of the 1944 Chicago Convention, based on evidence from six EU member states.

ICAO. (2025). Assembly 42nd Session Executive Committee Working Paper 553. ICAO. https://www.icao.int/sites/default/files/Meetings/a42/Documents/WP/wp_553_en.pdfSummary: Documents that ITU geolocated GNSS interference sources to Russian territory in March 2025, and that Russia failed to respond to the ICAO Council’s formal 30-day letter.

Inside GNSS. (2018). Financial Networks Shifting to GPS-Stamped Precise Time. Inside GNSS. https://insidegnss.com/financial-networks-shifting-to-gps-stamped-precise-time/Summary: Details EU MiFID II directive requiring all trading venues and institutions to synchronize clocks, driving universal GPS timing dependency in global financial markets.

Kuehne+Nagel. (2024). GPS Jamming Shows Ships in Impossible Locations. myKN/Kuehne+Nagel. https://mykn.kuehne-nagel.com/news/article/gps-jamming-shows-ships-in-impossible-locatio-09-Apr-2024.Summary: Confirmed 227 vessels spoofed in the Black Sea during the same week 117 ships appeared at Beirut Airport, linking the events to Israeli GPS countermeasures.

Le Gargasson C, Black J (2025). Electromagnetic Warfare: NATO’s Blind Spot Could Decide the Next Conflict. RAND Europe. https://www.rand.org/pubs/commentary/2025/11/electromagnetic-warfare-natos-blind-spot-could-decide.htmlSummary: Documents Russia’s 400+ radar sites, 14 military EW units, and deeply integrated electronic warfare doctrine, identifying NATO’s electromagnetic domain as its most critical capability gap.

Lloyd’s List. (2024). War-Zone GPS Jamming Sees More Ships Show Up at Airports. Lloyd’s Listhttps://www.lloydslist.com/LL1148748/War-zone-GPS-jamming-sees-more-ships-show-up-at-airports.Summary: Vessel-tracking data showing 117 commercial ships falsely positioned at Beirut Airport on April 4, 2024, due to Israeli GPS spoofing as drone defense.

Lombardi M (2016). Accurate, Traceable, and Verifiable Time Synchronization for World Financial Markets. Journal of Research of the National Institute of Standards and Technologyhttps://tf.nist.gov/general/pdf/2868.pdf.Summary: NIST documentation of GPS-based precision timing infrastructure serving stock exchanges in the United States, Europe, and Asia, with DTCC settling approximately $24 quadrillion annually.

Lombardi M (2021). An Evaluation of Dependencies of Critical Infrastructure Timing Systems on the Global Positioning System (GPS). NIST Technical Note 2189. https://www.gps.gov/sites/default/files/2025-07/NIST.TN_.2189.pdfSummary: Comprehensive evaluation of GPS timing dependencies in U.S. stock exchanges, power grid synchrophasor systems, and telecommunications, documenting that GPS dependency was engineered into infrastructure from inception.

DLR. (2025). Towards Standardisation: Satellite-Independent Navigation in the Baltic Sea. German Aerospace Center. https://www.dlr.de/en/latest/news/2025/towards-standardisationsatellite-independent-navigation-in-the-baltic-seaSummary: Documents R-Mode terrestrial navigation system with eight transmitters across 800 km, IALA Guideline 1187 standardization, and ORMOBASS project expansion targeting operational capability by end of 2026.

European Commission. (2025). EU Welcomes UN Aviation Agency’s Condemnation of Russia for Undermining Global Aviation Safety. European Commission. https://transport.ec.europa.eu/news-events/news/eu-welcomes-un-aviation-agencys-condemnation-russia-undermining-global-aviation-safety-2025-10-03_enSummary: EU Transport Commission statement welcoming ICAO’s condemnation as unequivocal recognition that GNSS interference violates the Chicago Convention.

GPS World. (2015). Going Up Against Time: The Power Grid’s Vulnerability to GPS Spoofing Attacks. GPS World. https://www.gpsworld.com/wirelessinfrastructuregoing-against-time-13278/Summary: University of Texas Radionavigation Laboratory experiments demonstrating successful GPS spoofing of phasor measurement units, with phase-angle errors sufficient to trigger automatic control actions in power grid systems.

GPS World. (2025). Hoptroff to Deliver Resilient Precision Timing to Financial Markets Through LSEG’s Platform. GPS World. https://www.gpsworld.com/hoptroff-to-deliver-resilient-precision-timing-to-financial-markets-through-lsegs-platform/Summary: London Stock Exchange partnership with Hoptroff for terrestrial precision timing, reflecting the financial sector’s recognition that GPS-dependent timing infrastructure requires resilient alternatives.

Heise Online. (2025). 39C3: Navigation System R-Mode Against the Baltic Jammer. Heise Online. https://www.heise.de/en/news/39C3-Navigation-system-R-Mode-against-the-Baltic-Jammer-11125406.html.Summary: DLR researchers presented R-Mode at 39C3, reporting 10-meter accuracy in testing, rubidium atomic clock synchronization, and a 300-kilometer range covering the entire Baltic Sea.

Newsweek. (2025). Russia Responds to GPS Jamming Accusations After EU Chief’s Plane Targeted. Newsweek. https://www.newsweek.com/russia-responds-gps-jamming-accusations-after-eu-chiefs-plane-targeted-2122612.Summary: Kremlin spokesperson Peskov denied Russian involvement in the von der Leyen GPS jamming incident, while multiple European officials characterized the interference as deliberate hybrid warfare.

PBS News. (2025). What to Know About Russia’s GPS Jamming of a European Official’s Plane. PBS. https://www.pbs.org/newshour/world/what-to-know-about-russias-gps-jamming-of-a-european-officials-plane.Summary: Analysis noting that Russian authorities appreciate the second-order effect of GPS disruption in creating strategic disquiet among neighboring nations, even if the primary intent is drone defense.

Spire Global. (2025). GNSS Interference Report: Russia 2024/2025, Part 1 of 4: Kaliningrad and the Baltic Sea. Spire Global. https://spire.com/blog/space-reconnaissance/gnss-interference-report-russia/Summary: Satellite-based monitoring confirming maritime GPS jamming from Kaliningrad strong enough to affect flight navigation, with Tobol system deployments and 84 hours of interference detected in six months of 2024 monitoring.

American Banker. (2020). The Cybersecurity Threat Lurking in the GPS Systems Banks Count On. American Bankerhttps://www.americanbanker.com/news/the-cybersecurity-threat-lurking-in-the-gps-systems-banks-count-on.Summary: Reports that SEC Rule 613 mandates 50ms clock synchronization for U.S. equity and options markets, with tens of millions of ATM and point-of-sale nodes dependent on GPS timing and lacking standardized backup architecture.

The Thirst Doctrine

The dam is the delivery mechanism. The headwater is the weapon.

The Fallacy: Water as a Climate Problem

Water scarcity is framed as a climate change consequence requiring humanitarian intervention and development policy. This framing is the fallacy. Upstream dam construction, reservoir manipulation, and transboundary water control are not development projects. They are weapon systems. And the states deploying them understand exactly what they are doing.

China controls the headwaters of rivers serving approximately 1.5 billion people across South and Southeast Asia, according to the National Bureau of Asian Research. The Mekong, the Brahmaputra, the Indus, the Salween, the Irrawaddy: all originate on the Tibetan Plateau, in Chinese-controlled territory. Turkey’s Southeastern Anatolia Project controls the Tigris and Euphrates headwaters that feed Iraq and Syria, where Carnegie Endowment research documentsa projected twenty-three percent decline in Euphrates flow by mid-century. Ethiopia’s Grand Renaissance Dam on the Blue Nile threatens Egypt’s existential water supply, where the basin population is projected to exceed one billion by 2050. These are not infrastructure investments. They are gray zone weapon systems that create coercive leverage over downstream states without kinetic action.

The Center of Gravity: The Headwater

The center of gravity is not the dam. It is the headwater. Whoever controls the origin point of a transboundary river controls every downstream state’s agricultural productivity, urban water supply, hydroelectric capacity, and ultimately political stability. The dam is the delivery mechanism. The headwater is the weapon.

China’s position is unique in the history of hydraulic power. No state has ever controlled the headwaters of so many rivers serving so many countries. On the Mekong alone, China now operates twelve mainstream dams with a combined storage capacity exceeding fifty billion cubic meters of water and generating over 22,000 megawatts, as the Stimson Center’s Mekong mainstream dam analysis documents. In 2019, while China’s upper Mekong received above-normal precipitation and snowmelt, its dams restricted more water than ever, contributing to an unprecedented drought that left Cambodian fishing communities reporting catches eighty to ninety percent below normal and forced Thailand to mobilize its military for drought relief. China’s Foreign Minister declared that lack of rain was the cause. Satellite data from Eyes on Earth proved otherwise.

And the Mekong is only one river. In July 2025, China began construction of the Yarlung Zangbo megadam on the Brahmaputra, a project three times larger than the Three Gorges Dam, which India and Bangladesh strongly oppose. China considers water management data to be a state secret. It has never signed a binding water-sharing agreement with any downstream nation. It does not recognize the authority of any international body to regulate its use of transboundary water. The infrastructure that regulates these rivers was built over decades, presented as domestic energy development, and never subjected to the irregular warfare analysis it demands.

The Evidence: Day Zero

Iran’s Day Zero crisis in late 2025 and early 2026 demonstrated the political consequence of water scarcity at national scale. Tehran’s reservoirs dropped to approximately eleven percent of capacity. The Atlantic Council reported that Iran is approaching what its own meteorological authorities describe as water bankruptcy, a condition in which damage becomes effectively irreversible on human timescales. When taps stopped running in southern Tehran during the winter of 2025, the legitimacy crisis was immediate. Protests that began over currency collapse and economic hardship spread to more than twenty provinces, with water scarcity emerging as a core driver of unrest, as Euronews documented.

The war has compounded the crisis. Bloomberg and Military.com reported in March 2026 that airstrikes on oil depots near Tehran contaminated water canals, and Carbon Brief confirmed that strikes on desalination plants in Iran and Bahrain are driving wider questions about water infrastructure as a military target. Iran’s Day Zero was treated as a domestic political crisis. It is a preview of what hydraulic coercion produces at scale: social destabilization triggered not by military action but by the upstream manipulation of a resource that no population can survive without.

A 2025 study in Nature Communications projects that nearly forty percent of global transboundary river basins could face water scarcity-induced conflict by 2050, with hotspots in Africa, southern and central Asia, the Middle East, and North America. The timeline is optimistic. The conflicts are already underway. They are simply not recognized as conflicts because they do not involve armies. They involve dam operators, reservoir managers, and upstream bureaucrats who understand that water released is leverage surrendered.

The Convergence Gap

Climate scientists see warming trends and precipitation changes. Humanitarian organizations see water access crises. Development economists see infrastructure investment opportunities. Hydrologists see river flow data. The Department of Defense sees force projection requirements. The IW community sees gray zone competition tools.

Nobody has converged the climate-conflict data, the dam-as-weapon literature, the IW gray zone framework, and the Day Zero crisis into a single operational concept. The ICRC addresses water access in armed conflict. The IW community models gray zone tools. The climate community projects future scarcity. No institution bridges the three. The World Bank acknowledges that more than half of the world’s 310 international river basins lack intergovernmental cooperative agreements. The architecture of institutional response is designed for the problem the way it was framed thirty years ago: water as a humanitarian concern. The weapon has evolved. The institutions have not.

Naming the Weapon: The Thirst Doctrine

I propose the term The Thirst Doctrine to describe the deliberate use of upstream water control as a gray zone coercion mechanism against downstream states. Hydraulic coercion is the application of water leverage, through dam operation, reservoir manipulation, and transboundary flow regulation, to achieve strategic objectives without crossing a kinetic threshold.

The Thirst Doctrine operates below the threshold of armed conflict. It creates dependency, produces compliance, and punishes resistance, all through infrastructure that looks like development and operates like a weapon. The 2019 Mekong drought proved the mechanism. Iran’s Day Zero proved the political consequence. The Brahmaputra megadam will prove the strategic intent.

The Doctrine: Five Pillars of Hydraulic Sovereignty

First Pillar: The Hydraulic Coercion Index. A standardized metric quantifying downstream dependency as strategic vulnerability. Measured by percentage of national water supply originating in foreign-controlled territory, upstream dam capacity relative to downstream demand, historical patterns of flow manipulation, and the existence or absence of binding water-sharing agreements. Updated quarterly. Briefed alongside force readiness assessments.

Second Pillar: Water as a Title 10 Concern. Doctrinal recognition that allied water infrastructure in transboundary basins falls within DoD responsibility for critical resource protection. Water security is not a humanitarian concern. It is a defense requirement. Where a NATO ally or Indo-Pacific partner depends on water controlled by a strategic competitor, that dependency is a force readiness vulnerability.

Third Pillar: The Upstream Deterrent. A deterrence framework specifically designed for hydraulic coercion, establishing that deliberate manipulation of transboundary water flows for strategic leverage will be treated as a hostile act requiring coordinated allied response across diplomatic, economic, and security channels.

Fourth Pillar: Hydrological Intelligence Preparation of the Battlespace. Integration of real-time hydrological monitoring, satellite imagery, flow sensors, and reservoir level tracking into intelligence preparation of the battlespace for every theater where transboundary water is a factor. The Stimson Center’s Mekong Dam Monitor provides a proof of concept. The capability must be scaled and institutionalized.

Fifth Pillar: Transboundary Water Security Agreements. Enforceable international agreements with monitoring mechanisms, dispute resolution authority, and deterrent consequences for violation. Not aspirational frameworks. Binding commitments with teeth. The fact that China has never signed a binding water-sharing agreement with any downstream nation is not a gap in international law. It is the strategic intent that the doctrine must name and counter.

The Dirty Water

One and a half billion people drink from rivers that originate in territory controlled by a single state. That state has built twelve dams on the upper Mekong, begun a megadam on the Brahmaputra three times the size of Three Gorges, considers water data a state secret, and has never signed a binding water-sharing agreement with any downstream nation. Meanwhile, Iran is approaching Day Zero under the combined weight of drought, mismanagement, and war, while its water canals burn and its desalination plants take fire from airstrikes.

The water is already weaponized. The doctrine is already being applied. The security community that is supposed to identify gray zone threats has never placed this in an IW framework. This article does.

RESONANCE

Atlantic Council (2026). How Iran’s Water Bankruptcy Seeped into the Protest Movement. https://www.atlanticcouncil.org/blogs/menasource/how-irans-water-bankruptcy-seeped-into-the-protest-movement/Summary: Reports that Iran is approaching water bankruptcy, with Day Zero conditions in Tehran and water system failure serving as a leading indicator of protest escalation and regime instability.

Carnegie Endowment for International Peace (2024). Troubled Waters in Conflict and a Changing Climate: Transboundary Basins Across the Middle East and North Africa. https://carnegieendowment.org/research/2024/02/troubled-waters-in-conflict-and-a-changing-climate-transboundary-basins-across-the-middle-east-and-north-africa?lang=enSummary: Documents a projected twenty-three percent decline in Euphrates water levels due to climate change and upstream Turkish dam construction, threatening Syrian and Iraqi water security.

Carbon Brief (2026). How Climate Change and War Threaten Iran’s Water Supplies. https://www.carbonbrief.org/qa-how-climate-change-and-war-threaten-irans-water-supplies/Summary: Reports that airstrikes on desalination plants in Iran and Bahrain are compounding an existing water crisis, with Iran in its sixth consecutive drought year and sixty-seven percent of national dam capacity empty.

Euronews (2026). Water Shortages, Blackouts and Air Pollution: How Environmental Damage Fuelled Iran’s Protests. https://www.euronews.com/green/2026/01/15/water-shortages-blackouts-and-air-pollution-how-environmental-damage-fuelled-irans-protestSummary: Documents how Iran’s 2026 protests erupted from a convergence of planned water and electricity cuts, deadly air pollution, and economic collapse, with land subsidence reaching forty times the global average.

Eyler B (2020). Science Shows Chinese Dams Are Devastating the Mekong. Foreign Policy. https://foreignpolicy.com/2020/04/22/science-shows-chinese-dams-devastating-mekong-river/Summary: Presents satellite-verified evidence that China’s upstream dams restricted water during the 2019 monsoon season despite above-normal precipitation, contributing to unprecedented downstream drought.

Military.com / Bloomberg (2026). War Is Pushing Iran’s Water Supply to the Brink of Collapse. https://www.military.com/daily-news/2026/03/12/war-pushing-irans-water-supply-brink-of-collapse.htmlSummary: Reports that Tehran was approaching Day Zero before the war began, with reservoirs at record lows, and that airstrikes on oil depots have contaminated water canals, compounding a decades-long water crisis.

National Bureau of Asian Research (2014). China’s Upstream Advantage in the Great Himalayan Watershed. https://www.nbr.org/publication/chinas-upstream-advantage-in-the-great-himalayan-watershed/Summary: Establishes that rivers originating on the Tibetan Plateau provide water to 1.5 billion people and that China, as the upstream power, has the ability to control the quality and flow of water reaching downstream neighbors.

Stimson Center (2024). Mekong Mainstream Dams. https://www.stimson.org/2020/mekong-mainstream-dams/Summary: Maps the status of all mainstream Mekong dams, documenting twelve operational Chinese dams with combined storage exceeding fifty billion cubic meters and generating 22,710 megawatts.

Stimson Center (2020). New Evidence: How China Turned Off the Tap on the Mekong River. https://www.stimson.org/2020/new-evidence-how-china-turned-off-the-mekong-tap/Summary: Presents Eyes on Earth satellite data proving that Chinese dams restricted water during the 2019 monsoon season despite above-normal precipitation, while China publicly blamed drought on lack of rainfall.

Works in Progress (2025). Rivers Are Now Battlefields. https://worksinprogress.co/issue/rivers-are-now-battlefields/Summary: Reports that China began construction of the Yarlung Zangbo megadam on the Brahmaputra in July 2025, a project three times larger than Three Gorges, which India and Bangladesh strongly oppose.

World Bank (2024). Water Knows No Borders: Transboundary Cooperation Is Key to Water Security and Avoiding Conflict. https://blogs.worldbank.org/en/water/water-knows-no-borders-transboundary-cooperation-key-water-security-and-avoiding-conflictSummary: Acknowledges that more than half of the world’s 310 international river basins lack intergovernmental cooperative agreements, with the population in water-stressed transboundary basins projected to double by 2050.

Zhao G, et al. (2025). Transboundary Conflict from Surface Water Scarcity Under Climate Change. Nature Communications. https://www.nature.com/articles/s41467-025-63568-ySummary: Projects that nearly forty percent of global transboundary river basins could face water scarcity-induced conflict by 2050, with hotspots in Africa, Asia, the Middle East, and North America.

The Orbital Noose

Space Congestion as Gray Zone Anti-Access

You do not need to shoot down a satellite to deny space access. You only need to make the environment untenable and the signals unreliable.

The Fallacy: The Kinetic Fixation

Space warfare is framed as anti-satellite weapons destroying satellites. Kinetic kill vehicles. Directed energy. Explosions in orbit. This framing is the fallacy. You do not need to shoot down a satellite to deny space access. Debris generation, constellation congestion, close-proximity operations, and signal jamming create an orbital blockade without crossing a kinetic threshold. The kinetic fixation blinds analysts to the gray zone operations already underway above their heads.

China conducted an anti-satellite test on January 11, 2007, destroying its defunct Fengyun-1C weather satellite at an altitude of 865 kilometers. The test created a cloud of more than 3,000 pieces of trackable debris, the largest ever recorded, with an estimated 35,000 fragments down to one centimeter. As of 2018, over 4,000 trackable objects had been catalogued from the event, with the majority expected to remain in orbit for decades or centuries. The Chief of Space Operations called the test a pivot point that forced the U.S. military to rethink space operations entirely. That test was not merely a weapons demonstration. It was a proof of concept for orbital denial through environmental degradation. One missile. Three thousand fragments. Decades of collision risk. The math favors the attacker.

The Center of Gravity: The Orbit

Low Earth orbit is congested and getting worse. As of early 2025, approximately 12,000 active satellites share orbital space with tens of thousands of pieces of tracked debris and hundreds of thousands of fragments too small to track but large enough to destroy a spacecraft on impact. Every collision generates more debris. Every piece of debris increases the probability of the next collision. The Kessler Syndrome, a cascading chain reaction of collisions rendering entire orbital bands permanently unusable, is not science fiction. It is a trajectory that current debris accumulation rates are accelerating. The European Space Agency projects approximately 100,000 satellites in orbit by 2030. The congestion is compounding.

China and Russia are operating in this congested environment with increasing sophistication. The Secure World Foundation’s 2025 Global Counterspace Capabilities report documents that five Chinese satellites conducted rendezvous and proximity operations throughout 2024, practicing synchronized maneuvers that a U.S. Space Force general described as orbital dogfighting, tactics, techniques, and procedures for satellite-to-satellite operations. Russia continues proximity operations with its Luch and Luch-2 satellite series and tested a Nudol direct-ascent anti-satellite missile in November 2021, destroying its own Cosmos-1408 satellite and creating more than 1,500 pieces of trackable debris. The CSIS Space Threat Assessment 2025 confirms that Chinese and Russian satellites in both low Earth orbit and geostationary orbit continue to display increasingly advanced maneuvering capabilities that alarm U.S. and allied officials. These operations exist in a legal and doctrinal void. No treaty governs close-proximity behavior in orbit. No threshold defines when orbital maneuvering becomes hostile. No attribution mechanism reliably determines intent.

Commercial constellation vulnerability compounds the problem. GPS transmits signals so weak that a ground-based jammer can overpower them from dozens of kilometers away. The scale of this vulnerability became undeniable in 2025. A joint report by Baltic and Nordic governments to the International Civil Aviation Organization revealed that nearly 123,000 flights over Baltic airspace were affected by Russian GNSS jamming in the first four months of 2025 alone, with 27.4 percent of flights in the region experiencing interference in April. The EU Council documented the acceleration: Lithuania recorded 1,185 interference cases in January 2025, up from 556 in March 2024. Poland logged 2,732 cases of GPS jamming and spoofing in January 2025. Estonian authorities reported that at least 85 percent of flights were affected, with spoofing incidents intensifying from 40 per month in April to over 230 in July. Polish researchers traced the sources to military facilities in Kaliningrad and St. Petersburg, identifying both fixed installations and mobile maritime platforms.

These are not orbital attacks. They are ground-based attacks on space-dependent systems. The distinction matters because it reveals the true vulnerability: the space architecture does not need to be destroyed. It needs to be made unreliable. Unreliability degrades trust. Degraded trust forces reversion to legacy systems. Forced reversion reduces operational capacity. The Noose does not need to kill. It needs to choke.

The Convergence Gap

Space debris modelers see orbital mechanics. Anti-satellite weapons analysts see kinetic threats. Commercial satellite operators see congestion and insurance costs. Electronic warfare specialists see signal jamming as a tactical problem. Arms control scholars see treaty gaps. The IW community discusses space competition without a gray zone doctrine for orbital operations.

Nobody has converged debris weaponization, close-proximity operations, commercial constellation dependency, ground-based signal jamming, and the legal void into a single orbital gray zone warfare framework. The Secure World Foundation classifies counterspace threats into five categories: co-orbital, direct-ascent, electronic warfare, directed energy, and cyber. The CSIS Space Threat Assessment tracks each domain. Thirteen EU member states issued a joint letter demanding coordinated action on GNSS interference. None of these institutions sees the convergent architecture: that debris from a 2007 ASAT test, proximity operations rehearsed in 2024, signal jamming affecting 123,000 flights in 2025, and the legal void shielding all of it are components of a single weapon system being assembled in plain sight.

This is the gap. Not intelligence. Synthesis.

Naming the Weapon: The Orbital Noose

I propose the term The Orbital Noose to describe the convergent denial of space access and space-dependent capability through debris generation, constellation congestion, close-proximity operations, and signal jamming without crossing a kinetic threshold. The Noose tightens incrementally. Each additional piece of debris, each unattributed proximity operation, each jamming event degrades the orbital environment and the systems that depend on it until the cost of operating exceeds the benefit.

The Noose is the gray zone weapon for the orbital domain. It does not destroy satellites. It makes the environment in which satellites operate progressively untenable, and the ground systems that depend on them progressively unreliable.

The Doctrine: Five Pillars of Orbital Sovereignty

First Pillar: The Orbital Congestion Index. A real-time national security metric quantifying space access degradation. Tracked debris density, collision probability by orbital band, jamming event frequency, close-proximity operation tempo, and GPS reliability rates. Briefed alongside terrestrial threat assessments because what happens in orbit determines what works on the ground.

Second Pillar: Debris as a Weapon. Doctrinal recognition that deliberate debris generation constitutes a hostile act requiring a deterrent response. The 2007 Chinese ASAT test created one-sixth of all radar-trackable debris then in orbit. Russia’s 2021 test added another 1,500 pieces. These were not science experiments. They were attacks on the orbital commons that will constrain allied operations for generations. The framework must name them as such.

Third Pillar: Close-Proximity Rules of Engagement. Establishment of internationally recognized norms for orbital proximity operations, with defined minimum approach distances, mandatory notification requirements, and consequences for violation. The absence of rules is not neutrality. It is permission for the adversary who is willing to operate closest.

Fourth Pillar: Resilient Space Architecture. Distributed, redundant satellite constellations designed to absorb losses without system degradation. Rapid reconstitution capability for critical orbital assets. Hardened signals resistant to jamming and spoofing. The current architecture is optimized for peacetime efficiency. It must be redesigned for contested operations.

Fifth Pillar: Integrated Counter-Jamming Doctrine. Recognition that ground-based signal jamming is an attack on space infrastructure requiring a unified response across space command, electronic warfare, and intelligence authorities. The 123,000 jammed flights over the Baltic are not a telecommunications problem. They are a space warfare problem executed from the ground. Thirteen EU member states have demanded action. The response must extend beyond diplomatic protest to operational deterrence.

Space Cowboys

The GPS signal that guides your car, your aircraft, your surgeon’s scalpel, and your military’s precision weapons travels 20,000 kilometers from space to your receiver in a signal weaker than a refrigerator light viewed from across a continent. A jammer costs a few hundred dollars. The satellites that carry that signal share their orbits with debris from weapons tests conducted nearly two decades ago. The rules governing behavior in that orbital environment were written in 1967, before humans had walked on the moon. The orbit now holds 12,000 active satellites, 100,000 tracked objects, and an estimated one million fragments large enough to damage a spacecraft.

The Noose is already tightening. One hundred twenty-three thousand flights disrupted in four months. Three thousand debris fragments from a single test. Five Chinese satellites rehearsing dogfighting maneuvers. Zero binding rules for close-proximity orbital operations. The question is not whether the Noose will close. The question is whether anyone will name it before it does.

This paper names it.

RESONANCE

Air and Space Forces Magazine (2023). Saltzman: China’s ASAT Test Was Pivot Point in Space Operations. https://www.airandspaceforces.com/saltzman-chinas-asat-test-was-pivot-point-in-space-operations/Summary: Chief of Space Operations Gen. B. Chance Saltzman recounts the 2007 Chinese ASAT test as the pivotal moment that led to the creation of the Space Force, noting the test created more than 3,000 trackable debris pieces and forced a permanent shift in how the U.S. military approaches space operations.

Burnham J (2025). Showcasing Advanced Space Capabilities, China Displays Dogfighting Maneuvers in Low Earth Orbit. Foundation for Defense of Democracies. https://www.fdd.org/analysis/policy_briefs/2025/03/21/showcasing-advanced-space-capabilities-china-displays-dogfighting-maneuvers-in-low-earth-orbit/Summary: Reports that five Chinese satellites conducted coordinated proximity maneuvers in 2024 resembling aerial dogfighting, as described by a U.S. Space Force general, demonstrating maturing anti-satellite capabilities including satellite capture and graveyard orbit displacement.

Council of the European Union (2025). GNSS Interference as a Growing Safety and Security Concern. Document ST-9188-2025-REV-1. https://data.consilium.europa.eu/doc/document/ST-9188-2025-REV-1/en/pdfSummary: Joint letter from 13 EU transport ministers documenting GNSS interference cases: Lithuania 1,185 in January 2025, Poland 2,732, Latvia 1,288, Estonia 1,085, with interference traced to sources in Russia and Belarus and characterized as systematic, deliberate hybrid action.

CSIS (2025). Space Threat Assessment 2025. Center for Strategic and International Studies. https://www.csis.org/analysis/space-threat-assessment-2025Summary: Confirms that Chinese and Russian satellites in both LEO and GEO continue to display increasingly advanced maneuvering capabilities alarming U.S. officials, with widespread GPS jamming and spoofing in and around conflict zones and continued concern over potential Russian nuclear anti-satellite capability.

Defense News (2025). Researchers Home In on Origins of Russia’s Baltic GPS Jamming. https://www.defensenews.com/global/europe/2025/07/02/researchers-home-in-on-origins-of-russias-baltic-gps-jamming/Summary: Polish researchers at Gdynia Maritime University identified jamming sources in Kaliningrad and St. Petersburg, including the first publicly verified case of ship-based GNSS jamming in the Baltic Sea, with interference shifting from blocking signals primarily to falsifying them in 2025.

ERR News (2025). Damage from Russia’s GPS Jamming Amounts to Over 500,000 Euros, Estonia Says. https://news.err.ee/1609759581/damage-from-russia-s-gps-jamming-amounts-to-over-500-000-estonia-saysSummary: Estonian authorities report at least 85 percent of flights affected by GPS jamming, with spoofing incidents rising from 40 per month in April to over 230 in July 2025, and four jammers identified between Narva and St. Petersburg including one activated near the Estonian border in July.

EU Today (2025). Baltic-Nordic Report: Russian GNSS Interference Disrupted Almost 123,000 Flights in Four Months. https://eutoday.net/russian-gnss-interference-disrupted-123000-flights/Summary: Reports the joint Baltic-Nordic submission to ICAO documenting 122,607 flights across 365 airlines affected by GNSS interference from January through April 2025, with April averaging 27.4 percent and some areas exceeding 42 percent.

GPS World (2025). 13 EU Member States Demand Action on GNSS Interference. https://www.gpsworld.com/13-eu-member-states-demand-action-on-gnss-interference/Summary: Reports the joint letter from transport ministers of 13 EU countries demanding coordinated action, documenting Poland’s 2,732 jamming and spoofing cases in January 2025 and characterizing the interference as systematic hybrid warfare targeting strategic radio spectrum.

Kelso TS (2007). Analysis of the 2007 Chinese ASAT Test and the Impact of Its Debris on the Space Environment. Center for Space Standards and Innovation. https://amostech.com/TechnicalPapers/2007/Orbital_Debris/Kelso.pdf.Summary: Primary technical analysis confirming at least 2,087 pieces of trackable debris from the Chinese ASAT test, with NASA estimating over 35,000 fragments down to one centimeter, and modeling showing over 79 percent of debris expected to remain in orbit for decades.

Lousada D, Gao S (2018). Fengyun-1C Debris Cloud Evolution Over One Decade. Advanced Maui Optical and Space Surveillance Technologies Conference. https://ui.adsabs.harvard.edu/abs/2018amos.confE..50L/abstractSummary: Documents that over 4,000 trackable objects had been catalogued from the 2007 Chinese ASAT test by 2018, with some analyses suggesting debris density in the sun-synchronous regime has exceeded the criteria threshold for Kessler Syndrome.

Orbital Today (2025). Are We on the Brink of War in Space? The Global Counterspace Report Says Yes. https://orbitaltoday.com/2025/06/22/are-we-on-the-brink-of-war-in-space-the-global-counterspace-report-says-yes/.Summary: Summary of the Secure World Foundation 2025 report documenting five Chinese satellites conducting rendezvous and proximity operations in 2024, Russia’s Luch and Luch-2 proximity operations, and a total of 6,851 catalogued debris fragments from national ASAT tests with 2,920 still in orbit.

Secure World Foundation (2025). 2025 Global Counterspace Capabilities: An Open Source Assessment. https://www.swfound.org/publications-and-reports/2025-global-counterspace-capabilities-reportSummary: Eighth annual assessment documenting counterspace capabilities of 12 countries, detailing five Chinese satellites conducting RPOs in 2024, Russian electronic warfare systems including Krasukha and Borisoglebsk, and classifying threats across co-orbital, direct-ascent, electronic warfare, directed energy, and cyber categories.