Episode 9: Innovation Meets Operations: AI, Unmanned Systems, and European Defence Readiness 

In this episode of StrategicALLY, hosts Livia Perrulli and Simon Perrin de Brichambaut are joined by Yves Augustus, founder of the European defence tech company STARK and former officer in the Belgian Army. With a background spanning engineering, defence, and business development, Mr. Augustus brings a unique perspective on how Europe can bridge capability gaps through innovation. We explore how the private sector can better respond to the operational needs of armed forces, the potential of AI-powered unmanned systems, and what capabilities are still lacking across European defence. Mr. Augustus also shares his views on transatlantic innovation gaps, lessons from U.S. initiatives like the Replicator program, and how EU defence investments could reshape industrial readiness. Tune in as we discuss how responsible innovation and military insight can drive strategic resilience and strengthen Europe’s position in a competitive global landscape. Podcast edited by Livia Perrulli. For more information about STARK and its work, visit their website and follow Yves Augustus on LinkedIn.

Comments Off on Episode 9: Innovation Meets Operations: AI, Unmanned Systems, and European Defence Readiness 

Naval Drones in the Sky: How Ukraine’s Magura Fleet Is Redefining Air Superiority in Coastal Warfare 

Ukraine’s MAGURA programme shows how distributed seaborne air denial might change coastal warfare assumptions. This InfoFlash defines this concept, tracks MAGURA V5 and V7 development and examines the twin shoot-downs of Russian SU-30SM fighters and Mi-8 helicopters. By pairing low-signature hulls to R-73 or AIM-9 seekers and feeding them target data from the Delta cloud, Kyiv fielded surface craft that can outmatch aircraft whose unit cost outweighs the boats by almost 100:1. Findings indicate inverted cost-exchange ratios, condensed kill chains, and new risks for patrol routes across narrow seas. The paper argues that littoral states should replicate this networked model with off-the-shelf sensors and surplus missiles, shifting budgeting priorities from frigates and fighter wings to expendable nodes and shared data links. Recommended actions include modular procurement, joint training that integrates missile-armed USVs, reinforced ship defences, and tighter controls on seeker heads and autonomy software before proliferation broadens the threat in coming years.

0 Comments

The potential consequences of cyberattacks under NATO’s Article 5: applying self-defence in cyberspace

The increasing frequency and sophistication of cyberattacks have transformed international conflicts and challenged the international legal framework regarding self-defence. Today, NATO members face security threats capable of causing widespread disruption without the use of physical force. These threats test the aptness of NATO's Article 5, which would be the legal basis for the invocation of the mutual defence clause in cyberspace. The Wales Summit Declaration and Brussels Summit Declaration recognised that cyberattacks may reach the threshold of an armed attack, potentially triggering Article 5. However, invoking Article 5 for a cyberattack raises further legal questions, particularly in relation to the attribution of responsibility and the applicability of the right to self-defence. The involvement of non-state actors and the inability to clearly prove state involvement in a cyberattack challenges the conventional way of executing retaliatory actions. International law, in its current form, fails to instruct states on how to apply self-defence in cyberspace. Hence, as NATO governments appear increasingly reliant on cyberspace for both military capabilities and public services, they should actively consider the uncertainty that would derive from a unilateral invocation of Article 5 in the case of a cyberattack.

0 Comments

Operation Midnight Hammer: Tactical Triumph or Strategic Illusion?

Operation Midnight Hammer unfolded during the night of June 21 and 22, 2025, as the United States launched a coordinated strike against Iran’s nuclear facilities at Fordow, Natanz, and Esfahan. The operation involved more than 125 aircraft, including seven B-2 Spirit stealth bombers, and has been described as the largest and longest B-2 mission since the war in Afghanistan began in 2001 (D’Urso, 2025). According to General Dan Caine, Chairman of the Joint Chiefs of Staff, the operation required “months of positioning and preparation” (U.S. Department of Defense, 2025, para. 3), moving “from strategic planning to global execution” within weeks (U.S. Department of Defense, 2025, para. 12). Deception played a critical role to preserve the element of surprise. Just hours before the strike, two additional B-2 bombers were dispatched westward toward Guam, serving as decoys (Holliday, 2025a). Their movements, including staged refuelling stops in Oklahoma, California, and Hawaii, were intended to draw attention away from the real strike package (Holliday, 2025b).

Comments Off on Operation Midnight Hammer: Tactical Triumph or Strategic Illusion?

Operation Spiderweb: under Russia’s nose

On 1 June 2025, Ukraine launched Operation Spiderweb, the most effective drone attack against Russian airfields since the start of the war. A total of 117 drones were used to strike airbases across five regions – Murmansk, Irkutsk, Ivanovo, Ryazan, and Amur regions –, with the aim of inflicting maximum damage on Russian aircraft far away from the frontier (Al Jazeera, 2025; Horowitz, 2025). Reports suggest that 41 aircrafts – including A-50, Tu-95, Tu-22 M3 and Tu-160 – have been hit in the operation along with a third of Russian bombers that are currently used as cruise-missile carriers (Horowitz, 2025; Security Service of Ukraine, 2025; Zoria, 2025).

Comments Off on Operation Spiderweb: under Russia’s nose