Old Wine, New Bottles?

The Challenge of State Threats
Matthew R. Redhead | 2025.07.21
Over the past decade, Western countries have faced a rising tide of hostile actions perpetrated by state actors and their partners; many sit in the so-called grey zone between peace and war and use hybrid methods of attack.
This briefing note summarises research that addresses these and other concerns, looking to provide firmer definitional boundaries and explore the scale, scope and character of modern state threats within them. Certainly, there is much that is familiar about state threats; many of the actions that fall under its broad umbrella are well-known covert and clandestine acts such as espionage, repression, sabotage, subversion and malign influence, and are closely associated with long-term adversaries of the West, such as Russia, China, Iran and North Korea. However, the research notes that besides the apparent explosion in the volume and range of hostile activity, much is new in their execution and operationalisation. Contemporary state threats combine traditional intelligence tradecraft with new technologies, exploit vulnerabilities that never existed before in societies and economies, and are increasingly outsourced to non-state actors with niche skills, physical access and higher risk tolerances than state agencies. State threats are also not just the preserve of familiar adversary states, with “middle powers” using them as tools of statecraft.
The research finds that state threats’ relative cheapness and deniability allow states to attempt to undermine, coerce and influence their opponents, with limited risk of starting a major war, making them attractive tools for politically assertive states in a time of rapid geopolitical change. Although the impact of hostile actions on Western states has so far been mixed, they have the potential to become more damaging over time as societal resilience wears down, new technologies emerge, hostile actors’ risk tolerances increase and more states participate.
Background
In 2024, the UK faced a wave of state-linked hostile actions within its borders and against its interests. These hostile actions included, but were not limited to, extensive Chinese cyber espionage against UK political, military and commercial targets; Russian espionage, cyber attacks and physical sabotage against supplies to Ukraine; and Iranian attempts to harass and assassinate dissident journalists living in the UK.
According to officials, state-linked hostile activity in the UK has risen dramatically over the past decade. In March 2023, the assistant commissioner of the Metropolitan Police, Matt Jukes, stated that his force’s casework on foreign interference and espionage had increased fourfold since March 2018, with the attempted poisoning of former Russian intelligence officer Sergei Skripal in Salisbury. This experience has been mirrored across liberal democracies in Europe, North America and the Asia-Pacific region. Consequently, many of these countries’ governments have begun to develop specific policies to respond to the threat of statebacked hostile activity. The problem these policies seek to tackle has been described in various ways, with the UK choosing the term “state threats”.
In response to the growing importance of state threats and a limited body of research on the issue, the Serious Organised Crime & Anti-Corruption Evidence research programme worked with the Royal United Services Institute to set up the inter-disciplinary State Threats Taskforce (STT) in 2023. The STT convened two workshops comprising former practitioners and experts from Europe and Five Eyes countries, which sought to scope the threat landscape faced by the UK and its allies, and current and potential policy responses.
While helping to sketch the outlines of the challenge, however, the workshops revealed uncertainty – even among those deeply immersed in relevant fields – about fundamental questions, such as the meaning of the term state threats. To address these issues, this research was developed to:
-
Clarify the meaning and coherence of the term state threats.
-
Understand why state threats have emerged as an issue now.
-
Map out the scope and nature of current state threats.
-
Assess the effectiveness of hostile activity as a tool of state policy.
-
Consider the potential development in the state threats landscape in the short-to-medium term (two to five years, following definitions of duration common in government and business).
Evidence was collected through a desk review of research literature, publicly available official documents, and credible media reports published in English over the previous decade, supplemented by 50 semi-structured interviews with academic experts, researchers, journalists, current and former government officials, and practitioners the Asia-Pacific region, Europe and North America. Interviewees were selected based on their knowledge and expertise on state threats or related areas, specific domains such as cyber or disinformation, and/or specific countries and regions, and provided new insights, further case studies and examples, and validation of emerging findings as the research progressed.
Key findings
Defining state threats
Western governments and international organisations such as the European Union (EU) and the North Atlantic Treaty Organization (NATO) use various terms for hostile activities by states; unsurprisingly, these meanings vary. While terms such as “state threats” or “hostile activity by states” sound identical, their scope can differ; for example, the UK government includes overtly hostile acts, whereas several other governments do not. Moreover, all current government definitions have ambiguities, especially around the importance of hostile intent and levels of state responsibility. Some harmful acts are not necessarily hostile as such – failing to meet climate change commitments, for example – and harmful acts undertaken by non-state actors with state links are not always undertaken at that state’s behest.
To clarify these issues, the research sets out a new “working model” definition for state threats that combines the most common elements of existing definitions and seeks to draw pragmatic boundaries where uncertainties exist. Four criteria are identified:
-
Severity: State threats are hostile acts that fall short of the internationally defined nature of war and/or distort and subvert peacetime international rules and norms.
-
Source: State threats are initiated or encouraged by a state actor and executed by a state or non-state actor for the initiating state’s purposes.
-
Character: State threats are underhand and, by nature, covert, deceptive, corrupt, illegal, coercive and threatening. They may also abuse international rules and norms to achieve hostile ends.
-
Intention and effect: State threats cause intentional and politically motivated damage to the interests and assets of another state (or states).
This definition makes clear that state threats must include an intention to cause harm. Certainly, negligent or anti-social behaviour by states, or even positive behaviour which creates dependencies, can be “weaponised” for nefarious purposes at some future point. These types of behaviour should thus be seen as potential vulnerabilities that might become future targets for hostile action. But they should not be treated as immediate threats unless there is evidence of malign intent. Moreover, while all harmful acts of non-state actors cannot be ascribed to states with which they have links, if there is evidence of interaction between a non-state actor and a state, combined with an alignment in hostile behaviours – whether in method, target choice or timing – there are reasonable grounds for seeing non-state actions as state threats.
The state threats “moment”
The fundamental reason for state threats’ increasing prominence is mounting hard evidence. Where quantitative data about state-linked hostile actions are available – in the fields of cyber espionage and offensive operations, or online disinformation, for example – the consistent indications are that state involvement is on the rise, with states such as Russia, China, Iran and North Korea playing major roles. These quantitative data are reinforced by numerous qualitative assessments from officials, and intelligence and law enforcement officers in Western countries. However, this is not the only reason why governments are paying attention now. The geopolitical context of the past decade, with events such as Russia’s seizure of Crimea in March 2014 and its fullscale invasion of Ukraine in February 2022, have forced Western governments to look at these states’ hostile activities in a new light. What were previously treated as bearable frictions to be downplayed in the interests of maintaining good political and economic relations have increasingly been seen as indications of deep-seated aggressive intentions. Other shifts in the security environment over the past decade have also played a role. While terrorist attacks have continued, government efforts to degrade terrorists’ operational capabilities have helped reduce their impact in comparison to the attacks of the early years of the 21st century. The relative decline in the scale and lethality of such attacks has helped open “policy space” to address the challenge posed by state-linked hostile acts.
Mapping state threats
The research provides a survey of current threats in practice, outlining key areas of hostile activity, examining the methods or vectors of hostile action, and highlighting common targets and purposes behind attacks. Some types of hostile activity are overt. China has employed public diplomatic threats, commonly referred to as “wolf warrior diplomacy”, which imply dire consequences for states that do not comply. Similarly, Russia has made verbal threats against its European neighbours, supported by blatant displays of military force near international boundaries, termed “heavy metal diplomacy” by Russia expert Mark Galeotti.
Covert and clandestine measures
Contemporary state threats are more frequently clandestine or covert, however. The research identifies seven key areas of covert or semi-covert hostile activity:
-
Espionage against state, military and political targets, as well as commercial and knowledgefocused espionage.
-
Intimidation of dissidents and critics, including harassment, surveillance and “lawfare”, through to kidnapping and assassination.
-
Sabotage, including offensive cyber operations and the “systemic overload” of social systems through the weaponisation of criminal activities such as illegal migration.
-
Subversion of the information environment to shape the views, actions and decision-making of audiences within a targeted state or states.
-
Malign influence over elite figures and groups with the power and position to guide the public policy of a targeted state.
-
Sponsorship of groups seeking to destabilise the existing political order of a targeted state.
-
Orchestration of regime/government change through support for coups d’état or direct interference in electoral processes.
Origins and execution
The research examines the mechanics behind the initiation and execution of these hostile activities, to the extent possible given their largely secretive nature. Narratives shaped by Western news media frequently portray authoritarian leaders as closely guiding or directing the activities of their bureaucracies. However, the research reveals that state threats can arise from a variety of sources, including “business as usual” official processes, the self-direction of intelligence agencies, and freelance efforts by senior officials or influential private figures, as well as direct requests from state leaders themselves. To further complicate this picture, the research also finds that the operatives employed to carry out hostile acts vary; while intelligence officers remain central to state threat operations, other state officials, party officials and non-state actors are increasingly involved. These include mostly legitimate actors in the private sector, civil society and diaspora communities, alongside the more clandestine realms of private military companies, organised crime, political extremism and terrorism.
Patterns of activity
Although the research does not conduct a quantitative analysis of state threat cases, it does highlight evident trends and patterns in the qualitative evidence from recent years:
-
There have been “booms” in commercially focused espionage, cyber operations and online disinformation – activities in which technology and “whole-of-society” approaches can enable states to collect high volumes of information and penetrate sensitive systems at speed.
-
State actors have increasingly incorporated cyber tools into established forms of tradecraft, such as espionage, intimidation, sabotage and malign influence, where technology complements and enhances human activity rather than replacing it.
-
Different states have evolved varied national styles of hostile activity, such as Russia’s high-risk and brazen approach, Iran’s reliance on non-state partners, North Korea’s ambitious cybercrime spree and China’s more carefully calibrated approach. Each style is shaped by that state’s resources, ambitions, cultures and histories.
The research also confirms the widespread Western perception that contemporary state threats are largely emerging from four authoritarian regimes – China, Russia, Iran and North Korea – and that liberal democracies are among the major targets. However, it also indicates that hostile acts are not solely the province of authoritarian states and Western countries are not the only victims. In fact, hostile acts between states occur in a variety of contexts, especially among emerging middle powers. Authoritarian and autocratic states have targeted local rivals in conflict zones such as the Middle East, and democratic states such as India have allegedly used hostile acts against state rivals and dissidents both within their own regions and sometimes within the borders of Western states.
Motives
What is shaping these patterns of behaviour? The research suggests that each of the four most hostile states in question has its own distinctive culture, history and ambitions but is also subject to broader trends at work. At macro-level, what the research sees as “geopolitical climate change” is fundamental. Leading non-Western powers such as China and Russia have long preferred a world order shaped by great powers, spheres of influence and state sovereignty, instead of a Western vision of a rules-based international order dominated by the US. Now, with the shift of economic and political power away from the US and its allies, China and major developing economies not only have a desire to see the world work in support of their interests, but they also have the strength to make it happen – the kind of historical turning point that has often resulted in open war in the past. However, although China and other states enjoy growing economic and military strength relative to the West, open conflict could entail substantial and even existential risks. Consequently, hostile acts that fall short of war offer alternative ways to signal resistance to Western states and undermine Western interests, while avoiding the threat of a substantial response.
What motivates the wider use of hostile actions beyond the four main perpetrators? Many of the states in question are located close to conflict zones or in high-risk regions, and have used covert and clandestine means against their exiled opponents and local enemies for many years. However, even among the middle powers, there are indications that the use of state threats is on the rise and that this too is probably one of the effects of geopolitical climate change. With the US and its allies both less willing and less able to play the role of global law enforcer, smaller states are taking matters into their own hands, but without risking open conflict: in the words of political scientist Ivan Krastev, they “are determined to be at the table, and not on the menu”. There is also a possibility that states are emulating patterns of behaviour they see other states using with relatively little consequence. As international relations scholar Shogo Suzuki has suggested, the development of “delinquent gangs” among states can, over time, lead to a wider contagion of behaviours between states that were previously seen as unacceptable by the international community.
Novelty and effectiveness of state threats
Those with sceptical views of the potential impact of clandestine and covert action use various arguments: that such activities are not new and have not had an impact in the past; that they are inherently difficult to execute successfully and therefore have limited value as policy tools; and that their results are never certain and, indeed, can be counterproductive.
To be sure, state-backed hostile activities are not a complete novelty, and have a long and continuous global history, even during relatively peaceful periods. Nonetheless, the research finds it hard to understate the sheer volume of hostile activity currently being registered by senior Western intelligence officials, who have used language that frames the current wave of hostile acts in distinctly “epic” and “epoch-making” terms.
Besides the explosion in volume, moreover, there is much that is new in the way contemporary state threats are executed. Cyber tools play an increasingly important role in well-known activities such as espionage, harassment, sabotage and disinformation. Importantly, however, cyber has not so much replaced traditional human intelligence tradecraft, but has been combined with it, creating a form of technologically augmented clandestine and covert action, providing opportunities for a greater volume, velocity and range of hostile acts.
Also new is the comprehensiveness of the approaches being used by China and Russia; their whole-of-society strategies have expanded the range of channels they use to conduct their activities, and they have strayed far from the classic state agency foci of official, military and political targets into the commercial, scientific and even societal realms as well. As Russia expert Keir Giles says of the Kremlin’s online campaign against dissent and overseas criticism, “it is a profound mistake for anybody to assume that they are too unimportant to be a target”.
The research also offers a cautious perspective on the question of effectiveness. To be sure, the picture is mixed. As intelligence historian Rory Cormac points out, few covert acts have unambiguously positive or longterm results for the perpetrators. Critics have not been cowed, Western economies have not been crippled and most Western governments have largely remained true to pre-existing policies. In fact, many of these hostile acts have also come at significant reputational cost to the perpetrators, as well as leading to policy countermeasures such as sanctions, prosecutions and the expulsion of intelligence operatives, which have the perverse effect of reducing the perpetrators’ long-term capabilities and access to their targets.
Nonetheless, this optimistic perspective might prove misguided, as the research notes several examples of hostile state action that cannot be seen as anything other than successes. China’s massive campaign of commercial espionage has certainly reaped an enormous economic dividend. In the words of General Keith Alexander, former head of US Cyber Command, it has probably been “the single greatest transfer of wealth in history”. North Korea’s cybercrime spree of recent years has also probably netted it many billions in US dollars’ worth of cryptocurrency, propping up the regime of Kim Jong Un and allowing it to continue its development of weapons of mass destruction. In other cases, hostile efforts might have played a contributory role in enabling the perpetrator’s desired outcome; some, though not all, see Russian interference in the US 2016 presidential election as a potential example. Moreover, immediate or consistent “results,” as often demanded by Western governments, may not necessarily be the aim of many of these actions. States employing hostile actions might have varying metrics of success; they may be content with achieving only an occasional “lucky hit” or expect that actions will have a measurable impact on their targets’ resilience over the medium-to-long term. It is also conceivable, as political scientists Austin Carson and Karen Yarhi-Milo argue, that states engaging in covert actions view those actions as means to “signal” credibility, strength and intent to other governments, without the accompanying risks associated with military action.
State threat futures
Despite the challenges Russia has faced in Ukraine, Iran’s recent setbacks in the Middle East and North Korea’s noticeable economic difficulties, all three continue to possess the apparent will, intent and sufficient means to pursue their current range of hostile activities. In some cases – Russia, for example – there also appears to be a growing willingness to take greater risks, escalating levels of violence and the potential threat to life. Most importantly, China boasts vast capabilities and, particularly in the realm of offensive cyber operations, has been demonstrating a heightened level of aggressiveness and readiness to pre-position assets for acts of sabotage against Western infrastructure, presumably in preparation for a potential future crisis in the South or East China Seas.
Given the relative openness of Western economies, societies and systems, all four revisionist states have good access to potential targets and, where they do not, can work with a range of deniable partners and proxies that do – especially in the criminal fraternity.
As new technologies such as varieties of artificial intelligence (AI) and quantum computing develop, opportunities for these states to enhance and extend their capabilities will also grow, although policymakers should be cautious about magnifying the effect they will have; advanced technologies can be hard to deploy and have defensive as well as offensive possibilities.
In addition to the four main current perpetrators of state threats, the research predicts their increasing use by middle powers, particularly in the Global South. As the US and other Western powers withdraw from direct involvement in regional conflicts in areas such as the Sahel, Southern Africa, the Middle East and South-East Asia, local powers are likely to become more inclined to employ tools that can assist them in damaging, deterring or influencing rivals without triggering conflict. Middle powers’ use of state threats is most likely to occur in the deployment of cyber tools for transnational repression, espionage, offensive cyber operations and online information operations. At the same time, the experience of the past decade suggests that these states might become more ambitious, daring, physical and kinetic over time, and, like the current four states of concern, increasingly turn towards non-state partners and proxies to supplement their capabilities. There is also a risk that some liberal democracies will be increasingly tempted to expand their own use of aggressive activities below the threshold of armed conflict in response to the changing international environment, testing the limits of existing law and ethical constraints.
Consequently, while the research indicates that state threats have had somewhat mixed effects thus far, this does not guarantee a decline in their use or a lack of impact in the future. Their relative cheapness and apparent lack of political risk are likely to make them attractive tools of statecraft in the short-tomedium term for various types of states, and their sustained use over time is also likely to have corrosive effects, especially in young democracies or emerging economies that are less well placed to resist them; for example, in regions such as the Balkans and the Sahel. Even highly resilient developed states with robust protections in place may also face greater risks of physical damage or long-term corrosive effects on social cohesion in the face of sustained hostile activity.
Implications
The research does not aim to provide a comprehensive overview of how targeted Western states have responded to various types of state threats, although several initiatives aimed at strengthening economic security, democratic integrity and social cohesion in European and Five Eyes countries are acknowledged. Consequently, the research does not assess the quality and effectiveness of Western responses to the challenge of state threats, nor does it offer detailed policy proposals. However, the research findings hold significant implications for the framing and implementation of future policy for Western governments, which are outlined in five groups of observations below.
Observation 1: Avoid wishful thinking and ignorance when assessing threats and vulnerabilities
In the past 20 years, many Western states have turned a “blind eye” to the hostile actions of states such as Russia and China, prioritising economic relationships and seeing such behaviour as an aberration that can be ignored. Since the full-scale invasion of Ukraine in February 2022, this perspective has changed, although the pronouncements of the recently re-elected US President Donlad Trump suggest the possibility of a less united Western front in the face of Russian aggression at least. The research indicates, however, that regardless of variations in Western policy, the current challenge from state threats will continue. The hostile conduct of states such as Russia, China and Iran, and their use of state threats, reflect their longterm desire to see a world order that rejects liberal rules and norms in favour of hard sovereignty and spheres of influence, within which Western power will be diminished. Unless the US and its allies decide to accept that fate – which seems unlikely, regardless of President Trump’s rhetoric – the underlying reasons for conflict will continue. State threats from Russia, China and their associates are unlikely to disappear anytime soon, and may proliferate more widely in their use among non-aligned middle powers and even democratic states. Thus, Western governments must grasp, and continue to acknowledge the significance, dynamics and probable longevity of the challenge.
Western governments must also avoid hubris and overconfidence in their assessment of how wellpositioned they are to resist state threats. Open societies present significant attack surfaces for aggressive states. As governments have learned in preparing for disasters, it is perilous to assume that the worst experiences of the past are the right benchmarks for future catastrophes. While Western states have so far not faced major setbacks due to hostile state activity, the possibility that an act of physical sabotage or an offensive cyber operation might have disastrous consequences, including major loss of life, cannot be ruled out. Over the longer term, moreover, the hard-to-detect corrosive effects of persistent hostile activity may indeed begin to surface. If the intensity and potential impact of such activities escalate, current levels of Western resilience and efforts to enhance it may prove insufficient to the task.
To an extent, Western governments are relatively well-placed to understand state threats and their own vulnerabilities because of the high competence and knowledge of their diplomatic cadres, and intelligence and security agencies. Since the terrorist attacks of 11 September 2001 in the US, Western governments have also developed expertise in resilience and protective security. However, in many Western states, government departments and agencies are woefully under-resourced in relevant linguistic and cultural expertise or appropriate technical skills. They have, moreover, obvious gaps in their bodies of knowledge and expertise when it comes to understanding more intangible matters such as democratic resilience and social cohesion, or the full spectrum of their countries’ vulnerabilities and dependencies on other states, especially complex international systems such as trade, finance, energy supplies and communications infrastructure. If governments are to be able to understand and act upon threats and vulnerabilities, therefore, they must consider whether they have the right people with the right knowledge in place.
Observation 2: Understand opponents’ thinking
The research highlights the differing mindsets and worldviews of Russia, China, Iran and North Korea that have allowed them to develop their challenges to the international rules-based order. In all four instances, the strategic cultures of these states show a fluid attitude towards what constitutes peace or war, and an attraction to seeking out loopholes in previously accepted legal frameworks and international norms of behaviour. As Australian scholar-soldier David Kilcullen points out, Russia and China have sought to test the West vertically by pushing hostile actions to the threshold of armed conflict and horizontally by expanding forms of hostile action across a wide range of areas, many of them unexpected, such as illegal migration. For Western governments and international organisations that emphasise clear legal boundaries and due process, state threats thus pose deep challenges when it comes to framing appropriate and timely responses. Very often, Western governments and organisations simply do not have in place the appropriate structures, processes or capacity to cope.
This suggests that Western countries need to reconsider whether the clear peace/war dichotomy on which they have based their policies for many decades (if not centuries) still makes sense when their opponents are happy to ignore the boundary between them. It further indicates Western countries need to take a more imaginative approach to which sectors threats might emerge from and in what combinations. These suggestions should not be seen as a plea to governments to take an “anything goes” approach or to mindlessly pursue novel potential threats. Legality, and principles of ethics necessity and proportionality, should remain essential to the character of Western responses, as should an ongoing focus on core areas of national security. However, if Western governments do not show more agility, flexibility and creativity in how they respond to state threats, they will risk confirming the assessments of opponents who see them as easy targets, inviting further hostile action.
Observation 3: Ask whether the current resilience-focused model of response is enough
Currently, the core Western approach to state threats is a state-agnostic, resilience-focused model that sometimes seeks to deter or disrupt state threats at source, or use punitive or retaliatory responses – but largely eschews offensive operations and takes a piecemeal approach to developing shared international standards of behaviour. This is especially true in cyberspace, where a strong focus on civilian cyber security has been combined with “persistent engagement” with attackers – a phrase used by cyber scholars Michael Fischerkeller and Richard Harknett. Alongside this, Western powers have also undertaken a desultory diplomatic pursuit of international standards for cyber operations.
Based on the long-term nature of the threat, however, a key question that Western governments need to address is whether the current balance between different types of measures is appropriate. The resilience-based model alone is far from cost-free, and there will be natural and appropriate concerns about the risks of heavy-handed legislation or regulation of fundamental freedoms, whether political, social or economic. The cost of upgrading the resilience of existing systems, structures and processes, or better yet by building it in by design, would need to be explicitly accepted; and, to protect civil liberties, checks and balances on intrusive legislation such as legislative renewals and sunset clauses would need to be considered.
Furthermore, governments must consider whether they are prepared to protect and insulate themselves from hostile actions and more frequently pre-empt attacks, react to them and possibly escalate in response. Western states must carefully evaluate how to alter aggressors’ “return on investment” calculations, not only by mitigating the effects of hostile state behaviour, but also by imposing costs that may shift the decisionmaking processes of perpetrator states. Doing so might offer Western governments more opportunities to shape the environment they face.
However, if they choose a more assertive path, they will also need to calibrate how far they are willing to go. Quite apart from triggering a hostile response, such behaviours could have a potentially degrading effect on the West’s ideas about itself, its standards and its wider reputation, as the US intelligence community found in the wake of revelations about its past behaviour in the mid-1970s. Were legal and ethical tolerances to change dramatically, and the consequences of these changes to become public, there could be negative effects on public trust in the institutions of government and damage to the reputation of Western states as upholders of international standards, feeding Chinese and Russian narratives, about Western hypocrisy and further undermining the integrity and stability of the rules-based order. If reactive and explicitly offensive measures are to come into play, therefore, they will need to be circumscribed and calibrated within legal and ethical bounds.
To mitigate the accusations that the West is just as bad as its opponents and to create preventative measures against proliferating hostile state behaviours, Western states will also need to consider what they do to shape international standards. Assertive diplomacy in multilateral and “minilateral” forums might kickstart discussions about international standards in non-military conflict, starting with cyberspace, but expanding to cover the role and scope of espionage, sabotage and subversion outside periods of traditionally defined war. Although these are unlikely to gain immediate traction with states such as Russia, Iran or North Korea, they may gain a hearing with a less truculent China and offer a nucleus of consensus that could help provide a barrier to the proliferation of hostile activities in the future.
Observation 4: Shape a coherent, comprehensive and prioritised set of responses
The research highlights the complex and often decentralised nature of how state threats emerge in perpetrator states. Regime objectives are sometimes achieved through top-down direction and at other times via more entrepreneurial initiatives. These regimes have various channels of operational action available to them, including both state agencies and state-linked non-state actors. Western governments must be cognisant of this reality, while also refraining from assuming that an equally diffuse set of countermeasures will be effective in response. In fact, the frequently episodic character and disorienting effect of state threats necessitate that Western governments develop clear and coherent narratives and strategies to avoid losing sight of the significance of these threats.
Western governments therefore need to consider how best to organise their responses, giving particular attention to threats’ cross-domain character. This will necessitate a coherent risk assessment and a common strategy across government and society. National governments need to develop a “single point of view” on state threats, and effective leadership and coordination mechanisms to guide and oversee strategic implementation, necessitating closer cooperation between agencies and government departments dealing with different dimensions of the same problem. One such area is tackling the activities of state-linked organised crime, which will require coordination, intelligence sharing, and even joint-working between intelligence agencies and law enforcement.
Prioritisation will also be essential. Countries must carefully assess the full range of threats and vulnerabilities, while pragmatically considering the time and resources available. Not all vulnerabilities can be addressed simultaneously and the order in which they are tackled is significant. In this context, governments may find it tempting to concentrate on familiar areas, as much resilience work will involve the protection of processes, networks, assets and people, most of which will be relatively easy to map and measure. However, governments must also address the more intangible elements of democratic and societal resilience, which are sometimes perceived as overly challenging to tackle but likely pose the greatest existential risks if left unmitigated. Furthermore, governments need to remain vigilant and responsive to emerging threats or vectors of attack. However, they should not unthinkingly pursue novel issues for their own sake, shifting resources en masse at the expense of tackling existing and unmitigated challenges. This is particularly important when considering the potential impact of AI, the promise and dangers of which are far from clear at present.
Observation 5: Take an approach based on partnership, both domestically and internationally
As the research indicates, in some of the most active perpetrator states, particularly Russia and China, the regimes adopt a whole-of-society approach to executing clandestine and covert activity. Furthermore, although these states do not appear to have established security ties with one another comparable to a Five Eyes-type relationship, there are signs of cooperation in sharing online expertise and evading sanctions, and in the sphere of online disinformation, with states recycling and echoing the narratives of the other revisionist states.
The liberal democratic states of the West cannot aspire to emulate authoritarians’ mobilisation of private enterprise and civil society as instruments of the state. Moreover, they should refrain from doing so if they wish to uphold their essential character as open societies. Nevertheless, Western states do not confront a binary choice; the continuum between open and closed societies is wide. As past crises such as the Covid-19 pandemic indicate, liberal democracies can work together in pursuit of broader objectives, temporarily limiting some freedoms without discarding them entirely.
One of the most effective ways to achieve coherence outside of such an obvious crisis is through a partnership model, which may impose some new obligations on the private sector and civil society but will also require willing cooperation, support and initiative from non-governmental actors. The value of this approach has already been observed in areas such as the fight against financial crime, both in the UK and beyond. However, for partnerships to succeed, governments must share a clear threat picture to provide incentives for action, establish a coherent strategy in response and work with non-governmental partners to develop mechanisms for cooperation. In summary, governments need to take businesses, organisations and the wider public into their confidence if they are to address state threats effectively.
Ultimately, the research indicates that the issue of state threats cannot be tackled by a single state in isolation. An international perspective is vital. Many of the threats facing Western states are analogous, as are the vulnerabilities to these dangers. In specific instances, such as the fragility of international infrastructure, these constitute shared challenges. Developing a coherent cross-border response, whether initially through minilateral coalitions of like-minded states or ultimately through broader multilateral platforms such as NATO or the EU, is crucial. Concurrently, the growing risk of the escalating use of state threats by middle powers highlights the necessity for dialogue regarding the perils of persistent hostile activities and their impact on societal resilience and stability. The UN would serve as the obvious platform for this discussion; however, given current divisions within the UN Security Council, more fruitful approaches will likely arise from engagement at bilateral, minilateral and regional levels.
Matthew Redhead is the Senior Associate Fellow at the Royal United Services Institute (RUSI). He was a UK government employee and senior financial crime professional.