2024-10-04

An Approach to the Development of Military Capabilities


 "Thoughts without content are empty, intuitions [perceptions] without concepts are blind" 

Immanuel Kant

A Story

A fictional discussion in RED and BLUE Ministries of Defence:

  • RED Minister of Defence: "Let’s build up the strength of our standing force from 1 000 000 soldiers to 1 200 000, improve the operational transportation speed of our railways from a brigade/100km/2hrs. to a brigade/100 km/1hr., and establish new factories that can manufacture ten main battle tanks per day.”
  • BLUE Operational Commander after the Intel brief: “RED is aiming to improve their land component operational capabilities to achieve a mass advantage in any part of the area of operation. I need four mechanised brigades to counter the emerging capability within the next three years.”
  • BLUE Land Force Commander: “We do not have tanks, ammunition, mechanised troops, trained tank crews, antitank weapons, air defence, supporting fires, signals, engineers, logistics or facilities to generate four mechanised brigades. Armament acquisition takes at least four years, building training facilities takes five years and generating troops takes minimum two years. Each brigade will need at least 500 million investment and produces 50 million annual operational costs.”
  • BLUE Armed Forces Commander: “We do not have the budget nor time to meet the operational demand. Are there other options to address the emerging threat but building symmetric forces?”
  • BLUE Minister of Defence: “Now is not a good time to propose an increased defence budget because elections are within 1.5 years, and popular opinion demands health care for increasing elderly population. What is the probability that RED will use this increased military power against us?”
The above pictures a clash of several contents in varied contexts!

Approaches to Military Capability Development

Developing military capabilities is always a balanced decision between different contents and contexts projected against variety of probable threat scenarios. European Armed Forces are restoring their capabilities in competition with Russia's accelerated military industry and force generation. Some countries have selected to build symmetric armament, others apply modern technology to squeeze more lethal power from their existing capabilities, and some  do what they can in current circumstances.

In every case, the decision-making in capability building is not an easy task since every decision or non-decision impacts the Armed Forces over an extended time and may lead to peril when threats against national security unfold differently than assumed in environment illustrated in Figure 1. Furthermore, maintaining a portfolio of Military Capabilities is affected, for example:

  • Biased and noisy decision-making in an organisation (Kahneman; Johnson; Heat)
  • Path Dependence (Liebowitz & Margolis)
  • Political guidance (Gray)
  • Society´s resources and culture (Bousquet)

The following process brings some systematic analysis and assessment for the military capability planning to provide longevity, balanced sense-making from different points of interest and continuous evaluation of the situation.

Figure 1: Blue vs. Red military might

Building a Concept for Military Capability Development Decision Support

The analysis and assessment process for capability development uses the SDLC V-model  originally created for developing and testing software artefacts, illustrated in Figure 2. The V-model down-slope analysis follows Kahneman's decision-making strategies  utilizing, for example, the following methods:

  • Clustering follows loosely the US DoD DOTMLPFII-programme evaluation model  but with added Budget checkpoint
  • The concept of Operation uses a standard military CONOPS creation methodology. 

The V-model up slope assessment uses operational research methodology, e.g.:

  • Tactical Assessment utilises Lanchester models, 
  • Operational Assessment deploys QJM models, 
  • Strategic Assessment uses systems thinking models of consumption of strategic assets, and 
  • Political Assessment experiments Threat/Prospering Balancing models. 

Figure 2: Capability analysis and assessment with V-model structure

Detailing the Capability Development Analysis and Assessment Process

The process, as illustrated in Figure 3, main functions work as follows:

  • Military capability analysis receives its input from the changes in potential adversaries (RED) via intelligence information, own forces (BLUE) via business intelligence, or environment (Political, Economics, Sociological, Technological, Legal, Environment [PESTLE])
  • The change indicator recognises the change (military intelligence) and possibly pre-estimates its impact.
  • A detected and identified possible impact is forwarded to problem and/or opportunity analysis. This analysis uses existing national defence and military scenarios to detect whether the change is an opportunity or a problem. During the analysis, the key performance indicators for the solution are defined.

Whether a problem or an opportunity is detected, the top-down analysis is commenced. Suppose the problem has surprised BLUE or evolves faster than BLUE expects. In that case, a fast track forwards a quick fix directly to connecting, where urgent need is fitted into the ongoing force generation process and transformation programme is launched.

  • Problem seeks solutions first parallel through DOTMILBIE (B=budget, E=Equipment) phases, and if it is not found, then proceed towards E until there is a solution that meets the given KPIs.
  • Opportunity seeks possibilities to gain advantages over the RED through a similar sequence of analysis.

The top-down analysis provides a concept of operations (CONOPS) for bottom-up assessment to define the detailed design with a sequence of different level war games. The assessment includes the sequence of:

  1. The technical assessment compares the solution/possibility concept against the current and emerging technical capabilities of an adversary
  2. The tactical assessment compares unit-level combat outcomes and varies with strength, lethality, and protection
  3. The operational assessment compares force-level battle outcomes and varies with the area of operation, mode of operation, weather, and quality of troops.

If similar conditions exist, the three wargaming results are verified in live exercises or operations. The wargaming models learn from lessons identified in the live world.

  1. Strategic assessment compares defence-level assets over time and optimises their sustenance over various operations, environments, resources and crises. The assessment is verified using business intelligence collected from BLUE Force over time.
  2. The political assessment reflects the current and future geopolitical, decision making and other PESTLE-related features at the national political level. The assessment is verified using political intelligence collected from international relationships and political decision-making.

Once the top-down concept is assessed through levels of the bottom-up approach, the resulting solution should be considered, optimised and balanced from DOTMLPFII viewpoints and tested successfully at five levels of current and future confrontation. If not, the CONOPS is returned to the analysis process for reconsideration.

The optimised solution continues to the connecting function, where the solution is compared with the existing capability portfolio (composed of three windows: Current, in Generation, and in Planning). Once the suitable timeslot and financing are found, the optimised solution can be introduced to decision-making: Generate new capability or manage the risk other way. If the decision is towards development, a generation programme becomes a part of a 5-10-20-year plan.

During the defence capability portfolio management, the ongoing programmes are continuously compared to national defence and military scenarios and adjusted per emerging needs.

.

Figure 2: A simplified process for military capability development decision support

The above systematic capability analysis and assessment process provides:

  • Continuous and faster analysis and assessment cycle (years to months) than one-time efforts in slower frequency,
  • Faster learning process with improved connectivity to data sources than with only manual research and assessment,
  • Systematic and less biased/noisy process that survives officer rotation than human-centric and dependent process, and
  • Accumulating a knowledge base that enables further automation enhanced with business intelligence, modelling and simulation, wargaming and digital twins.

References

https://euro-sd.com/2024/09/articles/40091/polands-future-armed-forces-take-shape/
https://lordslibrary.parliament.uk/uk-defence-policy-and-the-role-of-the-armed-forces/
https://www.kaitseministeerium.ee/riigikaitse2026/arengukava/eng/
https://en.wikipedia.org/wiki/V-model
https://ia.eferrit.com/ea/e22c190431de180e.pdf&hl=en&sa=X&ei=OhwAZ47NBYWoy9YPtZ-o2Q4&scisig=AFWwaeZLfyOb_lmWYlAEgljNYIGd&oi=scholarr
https://eda.europa.eu/docs/default-source/eda-publications/enhancing-eu-military-capabilities-beyond-2040.pdf
https://www.dau.edu/acquipedia-article/concept-operations-conops
https://www.jstor.org/journal/milioperresej
https://en.wikipedia.org/wiki/Lanchester%27s_laws
https://orion.journals.ac.za/pub/article/view/455
Jackson, Michael, C. (2018) Critical systems thinking and the management of complexity, Wiley, 
https://www.dni.gov/files/ODNI/documents/assessments/ATA-2024-Unclassified-Report.pdf

2024-09-21

Nine Approaches to Transformations

Intro

A recent study by McKinsey sees that digital technology will continue driving and forcing organisations to transform.  Their survey found that 89% of the respondents had launched some digital transformation. Unfortunately, they only captured 31% of the expected revenue lift and realised just 25% of the total expected cost savings. Transformation of socio-technical enterprise is challenging and becomes increasingly challenging according to Mustafa Suleyman and Michael Bhaskar or Simon Johnson and Daron Acemoglu . 

Introducing new technical opportunities, migrating legacy content in new processes and knowledgebases, introducing new ways of working, providing people with new competencies and career paths, providing new value to customers, and opening potential markets to grow is not easy to orchestrate over months and years while most of the old structure, operational costs expenditure, laggards among personnel, habituated customers, and sub-optimised shareholders are setting obstacles on the transformation paths.

This essay studies nine approaches to transformation from a personal experience perspective, aiming to summarise their feasibility to a challenge: Project portfolio, Engineered swimming lanes, Capability portfolio, Digital transformation, Linear change management, Organisational transformation, Culture driven transformation, Operational performance optimization and co-designed social change. 


Figure 1: Nine ways to approach transformation 

1. Project Portfolio

The first approach, and sometimes the simplest, is a project portfolio. The portfolio analyses the current situation (AS-IS). It defines where the enterprise needs to be in the end state (TO-BE). These two positions represent the end of the transformation roadmap. The number of projects (Temporary endeavours intended to create a specific unique outcome)  is established to provide one tangible step after another to take the enterprise towards its visioned end state, as illustrated in Figure 2.

Figure 2: A classical project portfolio approach in transformation

Naturally, the portfolio will include interdependent projects, so their timing and scope need to be well adhered to proceed with firm steps. Unfortunately, as always with a human endeavour, there are typical pitfalls that need mitigation:

  • Original project plans cannot consider all variants in the future and, therefore, need adjustment to the portfolio's situation before launch.
  • Outer forces always affect the transformation, so minor and more extensive amendments are needed to keep paths clear and steady.
  • Measuring only projects' achievements does not drive the transformation, so leading and lagging indicators are required to keep a steady pace at the transformation level.
  • Project management may be in everyone's comfort zone, so natural tendency may focus on project-level doings while deviating from the end state and achieving milestones on the way.

The project portfolio is feasible in shorter transformations where migration or change does not fit the current organisational structure but requires temporary ways to arrange people to deliver the outcome. The portfolio may be actionable in cases where technology needs modernising and end-user training.   

2. Engineered Swimming Lanes

A slightly more structured approach compared to the project portfolio is the engineered or designed swimming lanes way to arrange projects in the portfolio. For example, the swimming lanes may be defined in a military way (DOTMLPFII  or TEPIDOIL ) or architectural way (facilities, technology, information, processes, competencies, business value streams, products ). The swimming lanes are sometimes divided into phases, such as the COBIT plan, build, and run, to align life cycles between each project and make procurement easier to manage, as illustrated in Figure 3.

Figure 3: Transformation arranged as swimming lanes with life cycle phases

The swimming lane approach is feasible in engineering and specification-led transformations, e.g., large ERP  or C5ISTAR  implementations. Naturally, there will be challenges like:

  • Focusing only on each lane but forgetting the impact in other lanes, like producing doctrines (D) or tactics, techniques and procedures (TTP) without implementing them in the information systems (I) or training them to operators (T).
  • When several projects must achieve the RUN phase simultaneously to enable some significant change, individual project-level delays may ruin the entire plan. Hence, intermediate solutions or alternative projects need to be in place to ensure reliability.
  • Focusing on lanes will not deliver the transformation. Hence, clear leading and lagging drivers  must keep up the pace on roads towards TO-BE.


3. Capability Portfolio

Stepping more strategically, larger enterprises, especially the military, need to manage the life cycle of their core capabilities and assess their impact in the market or area of operation against their adversary or competitor capabilities.  For example, in military affairs, some capabilities are based on platforms (e.g., main battle tank) with several decades' long life cycles. Maintaining their applicability and reliability with mid-life updates (MLU) is cost-effective if the adversary is not aiming to disrupt with faster evolution (arms race ). Capability may comprise life cycle lengths varying from 30+ years to 24 hours, as illustrated in Figure 4.

Figure 4: Capability portfolio managing life cycles

Transformation is managed through the life cycle, calling platforms to the assembly line for MLU, which is typical for the main battle tank, fighter attacker, or frigate. Migration and replacement projects are typical for information technology hardware, whose life span seldom lasts five years. Software updates and patches are more frequent and require continuous integration (CI)  processes run by existing development and operation organisations. 

The capability portfolio also manages personnel, training, facilities, and other elements. Common mistakes observed using this approach:

  • Not understanding which elements have the shortest life span or are more sensitive to warehousing environment changes. Some armaments may run on old operating systems, creating a significant vulnerability when connected to other effectors. Rocket engines, integrated circuits, and electricity require stable warehousing conditions.
  • Retiring a long-served platform or arm also retires all trained reservists, gravely impacting the war-time order of battle.
  • Not following the technical life cycle but extending hardware or software life span for cost-saving reasons may lead to higher replacement costs (Year 2000 bug)  or dependency on rare technical competencies (legacy software ).
  • Not following adversary (or competitors') intentions, deploying higher-performing sensors and effectors, and keeping old equipment stocks may lead to strategic surprises during the first engagement days. 

4. Digital Transformation

Digital transformation is developing organisational and technology-based capabilities that allow an organisation to continuously improve its impact against adversaries in operation, lower its operation costs, and, over time, gain and sustain operational or strategic advantage over adversaries.  Projects cannot deliver digital transformation, which requires changes at all layers of the enterprise: technology, information, processes, and affairs, as illustrated in Figure 5.

Figure 5: Gears of Digital Transformation

The continuous transformation cycle  needs a technical foundation where information is digitised using platforms. The platforms enable organisations to digitalise their processes, improve cost-efficiency, create new products, or provide new value. Based on digitised information and digitalised processes, organisations may seek significant changes in their business, making sense of areas of interest (network-enabled capabilities ) or deploying effectors (Mosaic Warfare ). 

Digital transformation requires to build a culture and operation model for an enterprise and hence vulnerable, for example:

  • Political or owner's agenda changes resources or mission. Swedish Defence Force was building Nätverksbaserade Försvaret  in early 2000 to transform their capabilities and address the future Russian threats when a political decision cut their resources and changed their mission.
  • Focusing on technology roll-out but forgetting to transfer human behaviour 
  • Focusing on process performance and productivity indicators to gain cost-savings but not using opportunities to find new ways for affairs. 

5. Linear Change Management

The classical change management models of Kanter (1992)  and Kotter (1996)  explain several sequential steps to take in managing organisational change. The first step usually includes defining the organisation's position, why change is required, and the situation's urgency or "burning platform". Then, there is a need for strong leadership and a capable team to define and communicate the vision. Communication spurs action, and leader enables it by empowering and removing obstacles. On the road to change, a leader celebrates achievements and anchors them in the organisation's structure. Finally, there is no way to return, and the organisation may only mature and achieve a new equilibrium, as illustrated in Figure 6.

Figure 6: Linear steps in the transformation path

Naturally, the sequence of steps does not address the change because it was initially defined from common mistakes made by studied organisational changes. Nevertheless, change management approaches transforming affairs/business as a complex socio-technical system. It puts human and working society at the centre of the transformation. 

Change management may fail in numerous ways:

  • Communication is the leverage for action, but humans usually need to hear WHY and what is there for me, our team, and the higher good. Purpose enhances motivation, which accelerates action. Many transformations claim that communication mistakes cause failures in change.
  • Suppose the vision and communication do not visualise a new or better purpose after the transformation. In that case, the legacy culture eats many good ideas for breakfast. 
  • Even after successful communication, there will be friction on the journey and pure opposition to change. An average of 30% of personnel will oppose or be passive when facing the change.  
  • Suppose the strong leader is not walking the change talk. In that case, the vision and journey remain distant and threatening to personnel. They do not hop on the transformation train.

6. Organisational Migration

Firmly established institutions with a long history cannot change because the culture, heritage and values of organisations and people are fixed. Radical transformations of affairs, business or operations require smaller units outside the parent organisation to experiment and grow in new ways. Some experimentations may fail, but some may scale fast in new ways of doing things. The parent enterprise arranges promising subsidiaries under a new viable enterprise model to meet the future. As illustrated in Figure 7, the old structure and operation methods will be terminated.

Figure 7: Organisational transformation through migration

Military Forces launch these probing organisations as Future Force Units, experimenting first in exercises, then limited level in operations before launching more comprehensive force generation and deployment. Commercial organisations may acquire and merge small entrepreneurs with new technology products or extend markets to keep up with their competitors.  Other companies innovate new ways of doing business, products, and operations with their partners, within governmental innovation incubators, or in cooperation with universities.  

Since transformation aims after the radical restructuring of affairs or disruption of social structure, mergers, acquisitions, innovation networks, or consortiums face many confronts, for example:

  • Leaders proceed without ruthless modelling and simulations with unrealistic expectations of new ways. Eventually, they do not realise the imagined value, meet the political risk appetite, or survive on the battlefield as expected. 
  • Integrating smaller, agile, more entrepreneurial cultures under the established institutional culture fails because of culture clashes, organisational misfits or power structure. 
  • "military organisations are societies built around and upon the prevailing concepts of war. A challenge to an established concept is a challenge to the organisation's social structure." Institute and culture eat experimenting subsidies for breakfast. 

7. Culture-driven

Organisational culture can be perceived as consistent, observable behaviour patterns in organisations. Incentives powerfully shape culture. Culture defines the process of "sense-making" in organisations.  Therefore, culture cannot be bypassed if transformation aims to change profound ways in the organisation. The culture-driven transformation starts with leadership, whose sense-making, behaviour and incentives must be changed first. Based on visible changes in leadership, their stories of different purposes towards a better future have more credibility to spread among personnel, creating further stories of new purposes and values. Storytelling  empowers people to behave differently, seek new ways, and acquire new competencies. The shared journey towards the vision establishes new connections among people, binds new links and incubates new ideas. The different transparency and open communication provide leadership with better information, improving organisational sense and decision-making. A positive cycle of continuous cultural transformation, illustrated in Figure 8, transfers people's behaviour, migrates information towards new flows, and acquires new technology.

 

Figure 8: Culture-drive transformation

No cohesive culture exists in any enterprise , so culture-driven transformation is not straightforward. For example:

  • If the storytelling does not emphasise strategic goals and value creation, the subcultures hang on to better legacy stories. The fighter pilot stories of the Air Force culture do not quickly transfer to heroic stories of remote controllers or successful missions of unmanned aerial vehicles (UAV). 
  • Central Transformation Office cannot monitor cultural-level powers since they are not visible in project or enterprise resource management systems. The cultural transformation indicators can only come from the business leaders and commanders.
  • Influencers (individuals in the business unit who have large, informal social networks and are trusted and respected by others for their transparency, institutional knowledge, and ability to make sense of change) and those responsible (for initiatives, their implementation and new ways of value creation) approaches may differ in units and forces. Their alignment is essential in creating stories that empower personnel towards the journey. 
  • Each unit may have different role models for virtuous behaviour. Units use different concepts and terminology for understanding and conviction. Formal reinforcement mechanisms are different for each Service . Self-confidence, teamwork, and skill building differ between Navy and Land Forces or Sales and Manufacturing.  These foundational cultural differences require different stories, echoed by influencers in proximity and expected from their commanders or managers.

8. Operational performance-driven

Affairs or business-level transformation may focus only on improving a process or operational performance. Performance improvement may be compliance, quality, productivity or maturity-oriented, as illustrated in Figure 9. All the above are feasible if the process or operation is at least the maturity level "defined". Below that maturity, other means are better. The quality approach improves, for example, process reliability, standardisation or best practice, and product or service quality. There are also quality frameworks for the entire enterprise.  

Continuous improvement of operations (LEAN or Toyota  approach) is part of the organisational culture that brings problems upfront, eliminates all waste (muda) in continuous effort (kaizen), and uses the pull principle to avoid overproduction and storing along the value stream.

Capability maturity improvement  is the third approach in this category. Starting from US DOD requirements for software development quality, the CMMI models have expanded to help organisations understand their capability and performance. They offer a guide to optimise business results using good practices, performance measuring, reliability and life-cycle costs analysis, and sustainability estimations. 

Figure 9: Operational or process performance-driven transformation

Operational optimisation improves the quality of service, output and cost-efficiency, but implementing it may face the following challenges:

  • Even a CMMI 5-level software developer fails if the definition of the requirements is unclear, the required effort is underestimated, or the outcome is expected within the unrealistic deadline. 
  • Performance is evaluated, and certifications are granted for an organisation, never being established at behavioural or cultural levels. 
  • LEAN transformation is a strategy that cannot be delivered as a project. Continuous improvement requires continuous measurement and ridding of evident waste. The understanding and need for action should be written in policies and adapted to the culture. 
  • LEAN is a holistic transformation involving the entire enterprise. It takes years to accomplish and requires involvement from all personnel, not only the early adaptors. 
  • None of the quality management applications are successful if the management does not support them, there is no connection to financial performance, and process performance goals are not established or measured. 

9. Social, Co-design driven

A broader social change requires better tools than projects, programs, portfolios or implementations of strategies. One approach for social change is co-design, which uses design thinking methodology but in a more cooperative nature.  Design thinking is a method teams use to understand users, challenge assumptions, redefine problems, and create innovative solutions for prototypes and tests. Design thinking includes the phases of 

  1. empathise with the society or user group, 
  2. defining their challenges and possible solutions.
  3. cycles of prototyping and testing will provide a solution that everyone can agree on
  4. deployment may begin.  

There are three approaches societies or enterprises may use to free people to solve problems in Figure 10. Emancipation delegates authority to new teams to seek and test solutions, establish a unit, and merge back into society or affairs after maturation. Liberation empowers personnel to innovate and improve (Google's 20%-time policy)  anything they are passionate about. Abolition is a method to reform existing behaviour by banning constraints or freeing people from current legislative or social codes to find more suitable codes of conduct as a society.  In the enterprise, this may be implemented by establishing subsidiary companies outside of the parent company's institutional management and letting the subsidiary find the best ways of production and engage with their customers with a more entrepreneurial culture. 

Figure 10: Co-design approach to social transformations

Degrees of freedom, delegation, and understanding of outcome may vary in the three levels of co-design. So do the challenges in using this method for transformation, for example:

  • Co-design is an iterative and collaborative process, which can make it difficult to predict outcomes. Institutes may perceive this lack of predictability as high-risk and hesitate to invest. 
  • Attempts to innovate new behaviour and value fail because long-term plans are missing, lack of innovation or entrepreneurial mindset, fear of failing, lacking means to engage competent people, or lack of budget. 
  • According to the statistics from the US, about 45% of new companies fail within the first five years. The reasons for failures may include not understanding the market, establishing the business processes, not having enough starting capital, or expanding too fast. 


 REFERENCES:

Lamarre, Eric; Smaje, Kate; Zemmel, Rodney. Rewired: The McKinsey Guide to Outcompeting in the Age of Digital and AI (p. 1). Wiley. Kindle Edition.

  Suleyman, Mustafa; Bhaskar, Michael (2023): The Coming Wave - Technology, Power, and the Twenty-First Century's Greatest Dilemma

  Johnson, Simon; Acemoglu, Daron (2023): Power and Progress - Our Thousand-Year Struggle Over Technology and Prosperity

https://www.linkedin.com/pulse/msp-managing-successful-programmes-singh-msp-pmp-csm-/
  AXELOS: Management of Successful Programmes; Programme impact matrix

https://en.wikipedia.org/wiki/DOTMLPF

  https://en.wikipedia.org/wiki/Capability_management

  https://guides.visual-paradigm.com/understanding-the-architecture-content-framework-in-togaf-a-comprehensive-overview/

  https://en.wikipedia.org/wiki/Enterprise_resource_planning

  https://www.redcom.com/what-is-c5isr/

  https://www.intrafocus.com/lead-and-lag-indicators/

https://discover.dtic.mil/wp-content/uploads/809-Panel-2019/Volume3/Recommendation_37.pdf
 
 https://www.britannica.com/topic/arms-race

  https://en.wikipedia.org/wiki/Continuous_integration

  https://en.wikipedia.org/wiki/Year_2000_problem

  https://www.droptica.com/blog/5-problems-working-legacy-software-how-deal-them/

https://www.airandspaceforces.com/article/0392stealth/

  Applied from Lamarre, Eric; Smaje, Kate; Zemmel, Rodney. Rewired: The McKinsey Guide to Outcompeting in the Age of Digital and AI (p. xiv). Wiley. Kindle Edition.

  https://mitsloan.mit.edu/ideas-made-to-matter/5-building-blocks-digital-transformation

  https://en.wikipedia.org/wiki/Network-enabled_capability
 
 https://www.darpa.mil/work-with-us/darpa-tiles-together-a-vision-of-mosiac-warfare

  https://www.foi.se/rest-api/report/FOI-R--0671--SE

https://www.cio.com/article/278677/enterprise-resource-planning-10-famous-erp-disasters-dustups-and-disappointments.html
 
 https://c4isys.blogspot.com/2024/03/contemporary-operational-theatre-and.html

  Rosabeth Kanter, Barry Stein, and Todd Jick: ”Implementing Change” chapter in The Challenge of Organizational Change (Free Press, 1992)

  John Kotter: Leading Change: Why Transformation Efforts Fail, 1996

https://hbr.org/2012/09/ten-reasons-people-resist-chang

  https://en.wikipedia.org/wiki/List_of_mergers_and_acquisitions_by_Alphabet

  https://www.a-star.edu.sg/enterprise

  https://direct.mit.edu/isec/article/47/2/48/113546/Dangerous-Changes-When-Military-Innovation-Harms

  https://orgmapper.com/why-do-mergers-and-acquisitions-fail/
  https://ssl.armywarcollege.edu/DCLM/pubs/Military%20Innovation%20Through%20Brilliant%20Mistakes%20(Hill,%20Allen,%20Army,%20July%202014).pdf

  https://hbr.org/2013/05/what-is-organizational-culture

  https://www.forbes.com/sites/isaacmizrahi/2019/02/19/storytelling-is-a-different-story-for-each-culture/

https://www.mckinsey.com/capabilities/people-and-organizational-performance/our-insights/a-single-approach-to-culture-transformation-may-not-fit-all

  Mansoor, Peter R.; Murray, Williamson. The Culture of Military Organizations (p. iv). Cambridge University Press. Kindle Edition

  https://www.mckinsey.com/capabilities/people-and-organizational-performance/our-insights/a-single-approach-to-culture-transformation-may-not-fit-all

  Mansoor, Peter R.; Murray, Williamson. The Culture of Military Organizations (p. iv). Cambridge University Press. Kindle Edition

  https://www.mckinsey.com/capabilities/people-and-organizational-performance/our-insights/a-single-approach-to-culture-transformation-may-not-fit-all

https://efqm.org/the-efqm-model/

  https://en.wikipedia.org/wiki/The_Toyota_Way

  https://cmmiinstitute.com/

  https://cmmiinstitute.com/resource-files/public/take-your-organization-to-the-next-level

https://www.diva-portal.org/smash/get/diva2:835753/FULLTEXT01.pdf

  https://aisel.aisnet.org/cais/vol17/iss1/36/

  https://kaizen.com/insights/why-are-most-companies-failing-with-lean-implementation/

  https://kaizen.com/insights/why-are-most-companies-failing-with-lean-implementation/

  https://www.villanovau.com/articles/six-sigma/avoid-six-sigma-project-failure/

  Noel, Leslie-Ann (2023) Design Social Change: Take Action, Work Toward Equity, and Challenge the Status Quo. Standford d.school Library

  https://www.interaction-design.org/literature/topics/design-thinking

https://medium.com/@nareshnavinash/googles-20-time-policy-60d5706084be

  https://www.dissentmagazine.org/article/abolition-as-method/

  https://www.macementer.com/insight/co-design-is-dangerous

  https://www.ideapoke.com/growthleader/reasons-innovation-fails/

  https://www.investopedia.com/financial-edge/1010/top-6-reasons-new-businesses-fail.aspx

2024-09-13

MULTI-DOMAIN APPROACH FOR ADVANTAGE IN CONFRONTATION AND CONFLICT

 Bottom Line Up First

U.S. DoD and NATO aim to build Multi-Domain Operation capabilities after successfully deploying Joint Operation capabilities during Desert Storm 1991. The chosen approach seems a logical and natural next step from a force and defence industry viewpoint. Unfortunately, from an adversary viewpoint, the best Armed Forces with Multi-Domain Operations capability constrained by the perception of war and peace is vulnerable to flanking manoeuvre through information, cognitive and social realms. A textbook example of Sun Tzu's lesson is "To subdue the enemy without fighting is the acme of skill."

Striving after Multi-Domain Operations Capabilities

The U.S. DoD has been developing the concept of Joint Operations since the Goldwater-Nichols Act 1986 and used it masterly in Desert Storm 1991 so well that at least the Chinese PLA launched their reform.  

Contemporary militaries are evolving their operational concept from Joint Operations towards Multi-Domain Operations. NATO defines the approach as the "push for NATO to orchestrate military activities across all operating domains and environments. These actions are synchronised with non-military activities and enable the Alliance to create desired outcomes at the right time and place." The Domains NATO names as "Maritime, Land, Air, Space and Cyberspace".  


 Figure 1: A Poster of Multi-Domain Operations Symposium, AUSA 2024 © Greater Los Angeles Chapter Association of the U.S. Army


The U.S. DoD's next step in evolution is called Joint All Domain Operations. "JADO shifts the focus from 'multi-domain', which individual services have been operating in for decades, and places it back on tackling the challenges of joint operations."   The U.S. aims at a combined, connected  arms (without the Service structure) force that senses and effects as one through all domains and can host combined units from other nations. The concept has also been called "Mosaic warfare". It is enabled by the emerging technology experimented on in The Project Convergence exercises . DARPA is promoting mosaic warfare as "combining weapons we already have today in new and surprising ways, introducing manned-unmanned teaming, disaggregating capabilities, and allowing commanders to seamlessly call on effects from sea, land or air depending on the situation and no matter which of the armed services is providing the capability." 

Where did We Come and Where to Go with Multi-Domain

The Multi-Domain concept is not new. Guderian joined close air support from the Luftwaffe with his Pantzer-formations since horse-towed artillery was too slow to support mechanised armies.  The electromagnetic environment has been an established fighting domain since the introduction of radars, navigation and radio during the II WWW.  The U.S. DoD has been coordinating three Services capabilities towards one Joint objective.  With the spreading of the Internet, the cyber environment has become a viable avenue, first for espionage  and later for attacks like the Russian attack against Estonia in 2007  and the U.S.-led coalition Stuxnet attack against Iran in 2010 . Currently, at least the UK MOD and U.S. Army are promoting the doctrine of Cyber and Electromagnetic Activities as combined arms effects.  

Space has been used to support military capabilities since the Gold War. After the development of anti-satellite weapons and their testing since 1958, Space has become a battlefield.  See the evolutionary path illustrated in Figure 2.

Figure 2: Evolution of domains in military conflict

Multi-Domain or Joint, All Domain Operational capabilities are in a linear evolutionary path for the Armed Forces to aim. Furthermore, the defence industry is promoting technologies enabling connectivity, plug-and-play integration of platforms, and automation for faster reaction, robust survivability, and combined effects from all domains.  

In the future, the strategic advantage will be based on improved connectivity, faster OODA-loop, and combined effect over the entire adversary system. Does everybody follow the evolutionary rules or play the same game?

How is the Multi-Domain Approach Doing in the Contemporary Continuum of Conflict?

Since the 2010s, the U.S. military planners have recognised the continuum of conflict from low to high intensity  rather than black-and-white peace and wartime in the Westphalian system . Continuum models illustrate a variety of dimensions along the line of cooperation – competition – confrontation – conflict, including non-state, hybrid and state conflicts or narrative, a zero-sum and non-zero-sum in Joint Concept for Integrated Campaigning 2018.  Militaries globally have been studying how to engage U.S. Military Power with other means and ways, as stated by Hoffman and Mattis 2005: 

"Our conventional superiority creates a compelling logic for states and non-state actors to move out of the traditional mode of war and seek some niche capability or some unexpected combination of technologies and tactics to gain an advantage."

The Chinese (PRC) PLA's recognition and understanding of the current form of war is one of "informatisation" and "intelligentization", where battlefield dominance is achieved through information technology and networked forces, increasingly assisted by automation and artificial intelligence.  They see that patterns of warfare have changed from attrition-based warfare (although the fact in Ukraine)  patterns carried out at the front to information firepower strikes and network-electronic integrated confrontations that occur throughout the battlefield or even globally. The PLA concept of operations includes three lines:

  1. "Collective operations refers to the need to develop a range of interconnected operational systems that can work cooperatively, coordinate the combination of military and non-military measures outlined above, and achieve the PRC's desired war outcomes."  Possibly, the PLA's definition of the Multi-Domain Operations concept.
  2. "Asymmetric strikes are enabled by a thorough understanding of the enemy's operational system and focused on attacking key vulnerabilities, weakening the enemy's operational strength, capabilities, and potential by applying resources as efficiently as possible."  Possibly refers to ways to project power other than through contemporary military domains.
  3. "Paralysing the enemy's systems centres the tailored application of force to reduce key areas of an enemy's functionality and gain initiative and control of battlefield developments."   It possibly indicates more innovative avenues of effect and centres of gravity.

These three lines of operation are combined with "war control",  which may refer to controlling the scope, scale, and pace of war.

The PRC also has a more holistic view of the competition over Diplomatic, Information, Military, Economy, Technology, Infrastructure and International relationships through the Belt and Road Initiative, the Global Development Initiative, and the Global Security Initiative.  Beijing is pursuing "efforts short of armed conflict by expanding coercion to new fronts, violating principles of sovereignty, exploiting ambiguity, and deliberately blurring the lines between civil and military goals", as described in the U.S. National Defense Strategy of 2018. 

Russia, on the other hand, was relatively successful in launching operations in Georgia, Ukraine, Syria, and Middle Africa, manoeuvring within the continuum without crossing the red line of war. Only the 2022 intention to launch a coordinated "blitzkrieg" to capture Kyiv and change the government exposed their main incapability at strategic, operational and tactical levels of warfare.  Nevertheless, the Russian ability to wage information operations  supported by cyber-attacks  and salvos of hundreds of missiles and drones are impacting NATO and Ukrainian political decision-making and structures.

Russia has long been preparing the foundation for their influence operation among domestic and European populations. After the first three months of Russian "Special Operation", some Ukrainians still believed in the de-Nazification of Kyiv.   Over 2.5 years of war, the majority of Greece, Bulgaria, and Italy citizens do not want to send more weapons to help Ukraine win.  Most of the citizens of Hungary, Slovakia, and Bulgaria do not perceive Russia as a threat.  Armenia, Bosnia and Herzegovina, Georgia, Moldova, and Serbia are torn between Russian influence and willingness to become members of the European Community. 

It appears that all countries and militaries are not capable or willing to follow the Multi-Domain competition but play a different game around the military strong points. While Western militaries are building Joint Multi-Domain capabilities in physical and cyber realms, China and Russia are joining their efforts over cyber and information realms to bypass the Multi-Domain militaries waiting behind the war threshold and target both political and population cognitive and social structures with information and kinetic means for terror. 

Figure 3 illustrates the confrontation between two entities. BLUE is an open society and economy with 4th industrial supporting advanced military force but constrained by Westphalian Peace-War definitions. RED is projecting its power more flexibly through the entire spectrum of realms: Physical, information, Cognitive and Social without breaching the line of  War. RED operates in the information realm, using available channels to plant perceptions, beliefs and memes in the cognitive sphere (human perception).  The planting is harvested at the social level where opposing sides spread xenophobia, media bubbles are enforced, and wildly spreading memes are faster than any truth. Cyber attacks and physical destruction support the main information operation of the critical infrastructure in the physical realm.  The RED Multi-Domain approach differs from BLUE militaries space, air, land, sea and cyber. The Jointness of RED hybrid operations is created by controlling information operations, cyber operations and kinetic actions of criminals and terrorists. The Joint impact is multiplied in BLUE media channels, affecting BLUE political and public opinion. The War Control targets soft spots, triggers a small impact and lets the adversary system multiply its effect. It sounds like Sun Tzu's optimum strategy to win the battle without fighting. 

 

Figure 3: Difference of the game between some countries DIME power projection

It may be wise for the Western Armed Forces to consider more of the Total National Defence (Totalförsvaret  in Sweden and Kokonaismaanpuolustus  in Finland) besides getting finally rid of the legacy boundaries of different Services on the battlefield.


References:
https://www.rand.org/pubs/research_reports/RRA1560-1.html
https://www.act.nato.int/article/mdo-in-nato-explained/
https://www.japcc.org/flyers/all-domain-operations-in-a-combined-environment/
https://www.defensenews.com/artificial-intelligence/2023/04/28/connectivity-will-make-or-break-us-military-use-of-ai-official-says/
https://www.defense.gov/News/News-Stories/Article/Article/3692664/project-convergence-capstone-4-works-to-integrate-joint-multinational-defense-s/
https://www.nationaldefensemagazine.org/articles/2018/11/16/darpa-pushes-mosaic-warfare-concept
https://en.wikipedia.org/wiki/Heinz_Guderian
https://en.wikipedia.org/wiki/Electronic_warfare
https://www.rand.org/pubs/research_reports/RRA1560-1.html
https://en.wikipedia.org/wiki/Cyberwarfare
https://icds.ee/en/the-bronze-soldier-crisis-of-2007/
https://en.wikipedia.org/wiki/Stuxnet
https://www.researchgate.net/publication/354879784 _Cyber_and_Electromagnetic_Activities_and_Their_Relevance_in_Modern_Military_Operations
https://en.wikipedia.org/wiki/Anti-satellite_weapon
https://www.baesystems.com/en-us/definition/mosaic-warfare
https://www.leidos.com/insights/what-mosaic-warfare
https://en.wikipedia.org/wiki/Conflict_continuum
https://en.wikipedia.org/wiki/Westphalian_system
https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/ joint_concept_integrated_campaign.pdf? ver=2018-03-28-102833-257
James Mattis and Frank G. Hoffman, “Future Warfare: The Rise of Hybrid Wars,” Proceedings 131/11/1233 (November 2005), <www. usni.org/magazines/proceedings/2005-11/ future-warfare-rise-hybrid-wars>.
https://www.rand.org/pubs/research_reports/RRA1535-1.html
https://interpret.csis.org/chinese-assessments-of-the-war-in-ukraine-2-years-on/
https://www.rand.org/pubs/research_reports/RRA1535-1.html
https://www.rand.org/pubs/research_reports/RRA1535-1.html
https://www.rand.org/pubs/research_reports/RRA1535-1.html
https://www.rand.org/pubs/research_reports/RRA1535-1.html
https://chinapower.csis.org/20th-party-congress-china-military-pla-cmc/
https://thestrategybridge.org/the-bridge/2023/8/28/chinese-political-warfare-a-strategic-tautology
https://www.defenseone.com/threats/2022/03/five-reasons-why-russia-struggling-ukraine/362636/
https://www.defenseone.com/ideas/2022/04/dont-sleep-russian-information-war-capabilities/364050/
https://www.reuters.com/markets/europe/european-us-regulators-tell-banks-prepare-russian-cyberattack-threat-2022-02-09/
https://www.defenseone.com/ideas/2022/04/dont-sleep-russian-information-war-capabilities/364050/
https://ecfr.eu/publication/the-meaning-of-sovereignty-ukrainian-and-european-views-of-russias-war-on-ukraine/
https://www.aljazeera.com/opinions/2023/2/6/why-some-eu-countries-still-harbour-pro-russian-sentiments
https://carnegieendowment.org/research/2024/05/bosnia-moldova-armenia-between-russia-eu
https://insightnews.media/how-russian-disinformation-works-in-europe-babakovs-hacked-emails/
https://insightnews.media/russias-military-unit-54777-disinformation-and-psychological-operations-abroad/
https://barrystrauss.com/fighting-smart-a-lesson-from-sun-tzu/
https://www.forsvarsmakten.se/sv/om-forsvarsmakten/totalforsvaret/
https://fi.wikipedia.org/wiki/Kokonaismaanpuolustus


2024-08-24

A Quick View of Modern Military Strategy

What is a Modern Military Strategy?

Definition for a Military Strategy

National-related strategy is comprehensive, provides direction, has a purpose of control, and is fundamentally concerned with applying power in achieving national goals. (Eccles, 1958) Current national-level strategic thinking assumes that states and other competitive entities have interests they will pursue to the best of their abilities. Interests may be realised in end states like survival, economic well-being, and enduring national values. A good strategy is never developed in isolation. The following figure illustrates one view of the strategic horizon. (Yarger, 2006)

Figure 1: A comprehensive strategy view

Carl von Clausewitz defined the military strategy as "the employment of battles to gain the end of war." (Clausewitz, 1984) B.H. Liddell Hart extended the definition to "military means" and "to fulfil the ends of policy." (Liddell Hart, 1967) Lenin and Trotsky extended the strategy towards the art of infinite conquest by diminishing the boundaries between war and peace in the struggle of classes. (Strachan, 2008) 

It seems natural that military strategy is subordinate to national defence strategy, being its military pillar. The US defines national strategy as: "The art and science of developing and using the political, economic, and psychological powers of a nation, together with its armed forces, during peace and war, to secure national objectives." (Mattis, 2018)


An Environment for Military Strategy

From the strategic survivability viewpoint, a state may perceive threats as existential, global/regional, and intra-state threats. Military force may be required to mitigate threats in all of these categories, for example, taking care of flows of immigrants fleeing changing climate and withering resources, deterring the violence spreading caused by the clash of ideologies, or preventing the alienation of the nation's youths. These state strategic goals are not close to military ways of using controlled violence but can be assigned to the Armed Forces. Therefore, a military strategy is always a part of state security and defence strategies.

Figure 2: A generic threat environment from a state security view (Mattila, 2022)

Strategic Horizon - Finite or Infinite - for a Military Strategy

Military strategy is all about using armed power in a confrontation between two or more societies. (Gray, 1999) Call these societies nations, states, coalitions, enterprises, or groups. Previously, the escalated confrontation ended in war between states, but nowadays, we have a different continuum of conflicts. (Carse, 2013) Wars are seldom declared since military strategies seek more clandestine ways to wield power. In Ukraine, Russia never admitted involvement but used their conventional forces without insignias and mercenaries or voluntary groups, i.e., Little Green Men, to occupy Crimea and Eastern parts of Ukraine in 2014. (Wikipedia, 2024) Phenomena is called a hybrid conflict in the Western military-strategic thinking. (Hybrid CoE, 2024) Since the Westphalian world order is no longer valid, the military needs to think of strategy as part of an infinite game with various actors through the entire spectrum of relationships.

Figure 3: Continuum of conflict according to US Military Strategy 2015 © U.S.DoD

Lines of Power Projection in a Confrontation

Traditionally, militarised violence has changed social behaviour by causing material and human attrition in the physical realm. Survivors of the violence have forwarded information about horrors to other people, whose feelings and beliefs are altered based on the received information. (US DoD, 2018) People may change their behaviour when these new feelings and beliefs are confirmed within the social construction. (Zuboff, 2019, ss. 93-97) That is the simple, linear approach. Whereas, in many revolutions, a force captures control over broadcasting services, starts distributing their information and changes the behaviour of society. Besides, social media has enabled terrorists to distribute videos of their physical violence to a broader audience, thus extending the impact of fear and terror. (Kaldor, 2012) Furthermore, the art of strategy (Sun, 2014, ss. 92-93) aims to conquer or suppress the adversary without fighting by indisposing the adversary's plans and preventing the junction of its forces. The physical attrition on the battlefield, especially against prepared positions, is perceived as the worst scenario. Figure 4 illustrates that cyberspace gradually extends towards the physical, information and cognitive realms and subsequently opens new avenues to create impact and change human behaviour.

Figure 4: A wider view of lines of military power projection (Mattila, 2022)

An Operational Military Strategy

There are two types of military strategies: operational and force development strategy. The operational strategy uses existing military capabilities to achieve political aims. (Smith, 2008) The force development strategy aims to meet the requirements of future threats and objectives stated by political analysis.

The operational strategy is one element in a four-part structure: (Gray, 1999)

  • First are the political ends to be obtained. 
  • Second are the strategies for obtaining them, and how resources will be deployed. 
  • Third are tactics, how resources that have been deployed are used or employed. 
  • Fourth and last are the resources themselves, the means at our disposal. 

Thus, operational strategy and tactics bridge the gap between ends and means.

Operational strategies are, for example, attrition, annihilation, exhaustion, Fabian strategy or any variation and combination of these four:

  • Attrition seeks to gradually erode the combat power of the enemy's armed forces. The perfect example of this is WW I (Wikipedia, 2024) and seemingly, the recent Russian Spring 2024 effort against Ukraine. (Institute for the study of war, 2024) 
  • Annihilation seeks the immediate destruction of the combat power of the enemy's armed forces. Napoleon is considered a perfect example of this strategy as he was seeking a single massive battle which won the war all at once. (Wikipedia, 2024) When Russia denied this opportunity, Napoleon was not able to achieve his political goals of annihilating Russian Forces and gaining a surrender.
  • Exhaustion seeks the gradual erosion of an enemy nation's will or means to resist. Here, one is pursuing an indirect objective, using military power not against the enemy's armies or navies, but against the things that make him capable of fighting at all. The U.S.-led coalition used this strategy of not hitting the enemy's combat forces directly but making them irrelevant by destroying their industrial base, logistics, and Command and Control in The First Gulf War. (Chun, 2010) Another example is the US waged wars in Vietnam and Afghanistan. In both cases, the US popular opinion was exhausted with negative information coming from the front. (Kimmit, 2009)
  • Fabian Strategy (named after the Roman dictator Quintus Fabius trying to avoid direct confrontation with Hannibal in the 2nd Punic War) seeks to avoid the conflict and, if possible, to survive while gaining more time and resources to switch to other strategies. The approach was used by Tsar Alexander against Napoleon’s Grand Armeen attack when scorching resources from their avenue of approach, George Washington in the American Revolutionary War against English forces, and Viet Minh using hit and run against French forces. (Wikipedia, 2024)

These strategies may include deterring, denying, disrupting, degrading, or defeating, as called in the US DoD integrated approach 2015.

A Military Force Generation Strategy

The Force generation strategy can be presented using Gattorna’s strategic posture analysis (Gattorna, 2010) in Figure 5. Military strategies can be analysed from four postures: 

  • lower risk strategies of Evolutionary and more proactive Protective or 
  • higher risk strategies of reactive Operational and Pathfinder.

Most of the European militaries develop their forces in an Evolutionary posture. Evolutionary means that they continuously but carefully improve their forces with available technology and copy tactics from other forces they benchmark. Posture is a low-risk approach, but for example, NATO was caught by surprise when the Warsaw Pact disintegrated, and it took a long time for NATO to react to fulfil new expectations in the 1990s and 2000s. The Russian operations in Georgia, Ukraine, and Syria again caught NATO countries unprepared, and now they are busy reacting and trying to address old threats of peer-level or dominant conventional forces.

At their northern borders, the Warsaw Pact and China developed their forces in an operational posture. Since they did not have the latest technology but had a willing population and strong 2nd and 3rd generation armament manufacturing, they developed massive armies using conventional technology at an elevated level of operational efficiency.

The US Armed Forces have varying Pathfinder and Protective strategies. They have tried to gain strategic advantage two times by being a Pathfinder in developing the newest technology. First, the Strategic Defence Initiative in the early 1980s, which, although only an information operation, helped to exhaust the resources of the Soviet Union. (Wikipedia, 2024) Second, the Network Centric Warfare initiative (US DoD, 2001), which gave them an upper hand in the Gulf Wars, succeeded in annihilating twice the military might of Saddam Hussein. The US has been applying a protective posture to prevent other nations from copying their advanced technologies by controlling high-tech exports to China. (Eitel, 2024)

Figure 5: Strategic postures for military development strategies (Mattila J. K., 2020)

Samples of Current Military Strategies

The United States of America

The US National Defense Strategy 2018 (Mattis, 2018) differs from its predecessor, 2015 (U.S. DoD, 2015) in recognising China and Russia as the higher national threats. The strategy realises that fast-developing commercial technology is available to state and non-state actors thus eroding the Protective posture the US has previously enjoyed. The strategy emphasises sustaining US strengths in the lethality of their forces, strong alliances, technological innovation and culture of performance, which create an advantage against their opponents in confrontations. However, the US strives for Operational superiority by improving its operational dynamism, Interagency integration, and building a more lethal force for performance but within limits of affordability. Furthermore, the intention to "field a lethal, resilient, and rapidly adapting joint force" and the statement that "size matters" hints at traditional Attrition as the operational strategy. Only "advanced autonomous systems are invested broadly," tells of efforts to regain long-term strategic Pathfinder advantages.

The United Kingdom

The U.K. National Security Strategy 2015 (UK MoD, 2015)recognises that, besides non-state actors, there is a rise in Russian state-born confrontations. Also, the cyber environment is perceived as a new dimension for confrontation and conflicts, requiring improved defensive capabilities and national resilience. Armed Forces are required to increase their manpower and create Joint Force 2025 to project force abroad. The Joint Force is demanded to be bigger (50,000) and more agile to tackle a broader range of more sophisticated adversaries together with security and intelligence agencies. The UK follows the Evolutionary strategy of increasing and developing its conventional force. However, the request for further agility proves a hint of Operational superiority. In conclusion, the military might be employed agilely using joint and interagency effects, indicating the operations' attrition/exhaustion types.

Finland

The Government's Defence Report in Finland 2017 (PM of Finland, 2017)recognises the deteriorated security situation after the occupation of Crimea, conflict in eastern Ukraine, and rising tension in the Baltic Sea region. They recognise that cyber and psychological operations are signs of Russian ability to wield "a wider range of instruments in pursuing its objectives." The increased challenge for Finnish defence is reduced early warning and a more comprehensive range of instruments (military and non-military) used against the military, government and population through all five dimensions of operation (space, air, land, maritime and cyber). The clause "Finland must be able to resist military pressure and a rapidly escalating military threat and repel a large-scale attack" may indicate, to a degree, Fabian strategy to gain time for allied forces to come and strengthen the defence. Therefore, the Finnish strategy aims to build the resiliency of forces, government, and society. Subsequently, they seek better ability to provide and receive military assistance and raise the threshold effect of armed forces in preventing the escalation of the conflict.

Further, the force utilisation is described as "forces are divided into manoeuvre (operational), regional and local forces. The regional forces are used to create regional defence coverage. The manoeuvre forces create the centre of gravity of the defence and fight the decisive battles. The local forces participate in the battle and provide security, surveillance, and support to the manoeuvre and regional forces in their area and assist them in maintaining contact with the other authorities." 

The development strategy sustains the long legacy of evolutionary posture as the strategic capability programmes remain at the level of replacing dated platforms with new but similar ones. The strategy writers have seen it necessary even to defend the posture with "It is not possible to substitute the Hornet fleet's capability with GBAD systems or with any unmanned aerial vehicles already in operational use or on the design board; they would cover but a part of the Hornet fleet's capability."