Figure 1: Digitisation of information changes the foundations of human society (CC-BY-ND Juha Kai Mattila)
Information Evolution Impact on Interstate and Military Relations
This section reflects the impact of information evolution on interstate relations in general and particularly in the projection of military force.
The Development of Data Centricity Between States
The digitisation of information and its exchange has changed governments and interstate cooperation. Since digitalisation has made it easier to produce and disseminate information and more people receive digital information than any other medium, the value of information is higher both in instate and intrastate governance. Data is perceived to have geographical value; it is a way to control behaviour; it provides ways of power in confrontation and competition.
1. Regional control of information
The European Union is an example of geographical control of data as part of the development of information society and economy. In 2018, European Commission launched the General Data Protection Regulation (GDPR) (EU, 2018) to define how data shall be protected, processed, encrypted, ensured privacy, transferred outside of the EU region (Sharp Cookie Advisors, 2020), and who is responsible for data in different phases of its life cycle. Furthermore, GDPR requires data to be stored within the EU region, so service providers must build a regional infrastructure and organisation to provide digital services within the region. With this regulation, the EU aims to build digital trust by ensuring coherent data processing for its citizens, preventing data migration to foreign countries hosting the platforms, and establishing principles for a knowledge economy within the region. (McKinsey, 2022) In addition, EU digital market and services regulation further enhances regional data economy ambitions. (EU, 2022)
2. Protection of sovereign data environment
China and Russia are examples of information dissemination control and intention to align the domestic story when they strongly regulate the building and operation of national digital infrastructure for telecommunications, radio and TV broadcasting, media distribution and social media. (Vinkour, 2022) Furthermore, both countries strongly filter residents' access to Internet content (Kerner, 2022) and monitor their residents' digital and physical behaviour by collecting and analysing data. (Economy, 2018)
3. Information warfare
The information has become a tool (weaponised) in international confrontations. (Paganini, 2015) Although "war" may not be the correct word for the phenomena in the information dimension, it is commonly used. (Rid, 2013) An example is Iran, which declares to wage a "heavy information war", jang-e narm, (Jones, 2019) against the US, Israel, and some Sunni governments. (Eisenstadt, 2017) Iran perceives that the US and its multinational digital enterprises are attacking their national information sphere and defends against the attack using media networks and the "Halal Internet", a part of Iran's national digital infrastructure, in which they filter both access to the Internet and content of digital information. (RSF, 2016) In their offensive operations (KFCRIS, 2020), Iran uses, for example, malicious software (CCDCOE, 2012), spies (Greenberg, 2021), denial of service (The Intercept, 2015) and stealing of data. (US Department of Justice, 2020) The coalition led by the US, on their part, restricts the function of Iran's international value stream, runs information campaigns, disseminates western entertainment, and prevents the exportation of edge technology. (Jones, 2019)
4. Knowledge as a medium in strategic competition
The US-China global competition (Brookings, 2019) is an example of using knowledge to acquire innovations, immaterial rights (Sworn & Harjani, 2022), and shares in global value chains. (Gereffi, 2011) The US is trying to continue its dominance in the digital economy and military force projection. On the other hand, China aims to develop its digitalised autocratic governance and surpass the US as the global centre of power. China implements an authoritarian strategy of public sector investments and opening domestic markets to selected corporates.
In contrast, in the US, the private sector with large digital economy companies (GAFAM) (Lekkas, 2022), a vast number of small, innovative enterprises and commercial cooperation are the ways and drivers. (Brookings, 2021) Competition has partially conflicted with denials of products in markets and places (ZTE, Tesla), ban of providers in critical national infrastructure (Huawei), industrial espionage, and constraints for service providers. (Timofeev, 2020) Both countries use the features of the domestic market to enable data-driven, national capabilities with residents' access to digital services, digitalisation of industry and commerce, smart cities, digitalisation of value chains (financial transactions, logistics, eMarket places) and investments in science and technology (quantum computing, artificial intelligence, digital abilities, 5 G and above technologies and data). (Ghiretti, 2021)
5. Digital colonisation
During the last four decades, international commerce has grown tenfold, financial transactions increased eight times, and travelling expanded five times worldwide. (O'Neil, 2022) Data and its flows are part of the above activities. One who controls dataflows can also control transactions and activities. At the global level, data exchanges have two hubs: The USA and China. (Vuorisalo & Aaltola, 2021) Other countries and their residents use these two countries for global commerce, finance, telecommunications services and media streaming and social media platforms. Hence, most data concerning user identity, transactions, or digital behaviour remains within service providers in these two countries for their valuation. One can call this digital colonisation since other countries depend on these two hubs' digital services and have to release their public and private data for the benefit of these two countries. (Van Niekerk, et al., 2022) The collected data makes it easy to analyse digital behaviour, events, and content, enabling the prediction of future behaviour (surveillance capitalism). (Zuboff, 2019) Data and related products are sold further for marketing, political manipulation, and military operations. (Kippo & Kemppainen, 2022) Current digital colonisation is part of the developing data economy and may change when the next wave of technology migrates the flows of data from cloud to edge. (Baygi, et al., 2021)
In summary, knowledge, information, and data enable almost all international relations, from cooperation to conflict. Governments appreciate the value of data and information as a medium both in a domestic and global environment. As the digitisation of information proceeds and the cyber environment enlarges almost exponentially, governments seek new ways to project their power and gain influence with the means of diplomatic, information, military, economic, finance, intelligence, and law enforcement (DIMEFIL). States wield these means through ways of compulsion, institutional, productive, and structural to create an effect in the information dimension, impact physical data processing or transfer and change human behaviour through cognitive or social influence. Their strategic approach is:
1. First, to break the trust between governmental institutions, citizens, and organisations.
2. Second, to create confusion, mistrust, fear of violence, terror, and feeling of compulsion.
3. Third, feed in an alternative story that changes decision-making or social behaviour according to the attacker's will.
Figure 2 illustrates a model to describe a data-driven engagement between states.
Figure 2: A view of the use of information as part of the interstate process (Mattila, 2022)
Military Force Benefits from the Evolution of Digitised Information
Global and social transformation concerning information will also impact military affairs. Therefore, the military will use digitised information, data, and knowledge depending on adapted strategic posture (Mattila, 2020):
- Pathfinder military tries to use the edge of advanced technology as fast as possible while pursuing technical dominance over potential adversaries (China's intentions).
- Operational military tries to apply digitalisation and data to improve their forces' operational and tactical performance to gain/keep an advantage (e.g., ISIS).
- Evolutionary military use data at their own pace as technology has matured to fit their risk appetite (most European Forces).
- Protective military perceives to have achieved dominance over potential adversaries and tries to sustain the existing advantage (USA).
Figure 3 provides quadchart of these strategies.
Figure 3: Quadrant of military development strategies (CC-BY-ND Juha Kai Mattila)
The following four cases provide examples of different strategic implementations:
1. The US military forces have tried to sustain their perceived technical dominance by preventing others from accessing their technological advantage (Protective):
- 1993–2003 digitalisation of operational level command and control (Network Centric Warfare) (Chizek, 2003)
- 2020 launched the preparation of tactical level digitalisation (Joint All-domain C2) (Clark, 2020)
- 2022 preparation of digitalisation in other parts of US military institute (Chief of Digital and Artificial intelligence) (Vergun, 2022)
2. The Russian armed forces have adopted the benefits of digital evolution with the following examples (Operational):
- 2007 Russia integrated cyber effects as part of their information operations against Estonia.
- 2012 During the Chechnyan war and Putin's re-election, the leadership of Russia understood that control of the information realm is critical for staying in power. (Giles, 2012)
- 2014 during the manning of Crimea, Russia applied deception, metanarratives, and cyber means to manipulate the perception of a variety of audiences. (Pynnöniemi & Racz, 2016)
- 2016 the information security doctrine defined the information area of operation, which includes technology and cognitive components. (Lilly & Cheravitch, 2020)
- 2022 the Russian leadership can control domestic digital infrastructure, broadcasting, social media, and media content. (Vinkour, 2022) (Budnitsky, 2022)
3. The Islamic State of Iraq and Sham (ISIS) organisation, recruiting, information operations and operational command and control benefitted from civilian IC technology (Operational) as follows:
- ISIS used anonymous portals for file transfer and collaboration between jihadist parties. (Shehabat & Mitew, 2018)
- ISIS used social media platforms to recruit over 40 000 fighters from over 110 countries. (Ward, 2018)
- ISIS used digital channels for ways of strategic communication, coercion through publishing acts of terror, and manipulation through propaganda. (Pellerin, 2016)
- ISIS captured the telecommunication infrastructure in their area of operation and used it to support their command and control. (CJTFOIR, 2017)
4. The generation and operations of the IT Army of Ukraine is an example of diginative networked force aiming to reach a pathfinder ability to wield distributed denial of service (DDoS) and breaching attacks against Russian digital infrastructure: (Soesanto, 2022)
- A volunteer force was called in through Twitter, Facebook, and Telegram accounts creating a command channel with around 11500 participants.
- Next day, the command channel distributed the first assignment to attack against 31 network addresses of 31 banks, businesses, and government websites.
- Within three weeks, the cyber cluster had been organised into three services: the IT Army, the Internet Forces of Ukraine, and the e-Enemy.
- An example of fires control: After providing target information of IP address and four ports, various control channels distributed the target to around 18 800 effectors within 4 hours.
- Within three months of establishing the networked force, the cluster has attacked about 2000 Russian resources.
Almost all current military organisations and organised violence groups use data and digital technology, available or within their ability to use, for capabilities that improve force projection in conflicts.
The Development of Data, Human and Machine Towards a Socio-technical System
Digitisation and the growing data change the human-machine relationship and cooperation, creating new and emerging capabilities. For example, in 1951, Allan Turing designed the first chess-playing machine. In 1997, the IBM Deep Blue machine won for the first time against a reigning human champion (Gary Kasparov) in that game. Currently, chess games are categorised so that machines are playing against machines, and human-machine teams are playing against each other. (Knemeyer & Follet, 2019) The development of human-machine interaction in a variety of games has indicated that:
- A high-performance machine wins an expert human in seeking variations from a large combination of possibilities (10120). (Maharaj, et al., 2022)
- A more intelligent algorithm with less computing capacity may win over a less intelligent algorithm with high computing performance. (Maharaj, et al., 2022)
- A machine learning algorithm with a broader training data set can win a search-optimised designed algorithm. (Maharaj, et al., 2022)
- A novice in good cooperation with a machine and following a high-performing process may win over a master who uses higher computing power but a weaker process. (Phillips-Levine, et al., 2022)
- A less cooperating group of high experts will lose against the optimised algorithm. (Cabitza, et al., 2021)
- Well-functioning team of experts may win against an optimised algorithm. (Cabitza, et al., 2021)
- Lesser experts interacting better with each other, and their algorithm may win a less coherent group of higher experts using the same algorithm. (Cabitza, et al., 2021)
- Everyone with an available computer and algorithm will win one team of experts with a laptop and algorithm. (Knemeyer & Follet, 2019)
In summary, a party whose human-human and human-machine interaction works better will probably win. In contrast, a massing of human-machine teams may have higher odds over a lesser number of teams. Improved data (pace, friction, quality), interfaces (human-machine and machine-machine), and social structures (e.g., trust, communication) decrease entropy and friction in a socio-technical system, as illustrated in Figure 4.
Figure 4: Core components and interfaces of a balanced socio-technical system (CC-BY-ND Juha Kai Mattila)
Military organisations have an advantage over other organised violence to generate balanced socio-technical systems since they control the force generation life cycle from R&D to lessons learnt of troops (human-machine teams). Specifically, the advantage enables the development of culture, competency, process, data, and technology in coordinated steps, experimenting with different combinations and keeping up with a continuous but balanced improvement. On the other hand, other organised violence entities do not have the above control but are dependent, for example, on available products, data, service contracts, and recruitable competencies.
Ongoing Evolutionary Steps in Digital Technology and Usage of Data
The migration of digitisation, following digitalisation and further digital transformation, proceeds at a pace defined by knowledge, competency, cooperation, business, digital maturity, and trust. (Andrews, et al., 2018) Nevertheless, the rate of change has been unforeseeable since digitisation impacted over 50% of the world population within two decades. (UN, 2022) The developed countries are feeling the impact of the following steps evolution:
1. Mobile Internet and Platforms
- The Internet with IP protocol, WWW and Browser
- 3-4G providing mobile data connection
- Smart mobile devices
- Platforms for social behaviour and economic transactions (Kenney & Zysman, 2016)
- Big data and business analysis/intelligence
2. Cyber-physical products and services
- 5 G providing near-zero latency connections for masses of connected devices
- Internet of Things will produce 75% of organisations' data by 2025 (Stackpole, 2022)
- Migration of algorithms and machine learning automate digitised processes and provide a variety of man-machine interfaces
- Cloud computing provides computing power for services like IaaS, PaaS, and SaaS, which are easy to replicate and provide
3. Real-time networks of machines and Metaverse for humans
- Non-latency and high bandwidth access networks (Wi-Fi 6, 5G and 6G) are connected through fibre optical connections for networks able to slice capacity for immersive 8K perception.
- The automated function of networked machines enables the 4th industrial revolution and autonomous transportation
- Edge computing and data-driven machine learning improve the level of machine cognition (Brown, 2022)
- Digitisation and increasing connected devices will increase the amount of data by 2025 to 175 Zettabytes. Human cognition requires machine support and smart data to identify any pattern from the amount of data. (De Goes, 2013)
- Human-machine interface migrates from screen and keyboard to 3D Metaverse. (Gartner, 2021)
The above steps are foreseeable scenarios. Nevertheless, the developed data and digital technology will change work, economy, governance, and free time in societies, but the pace of transformation is determined by social, political, and business decisions. (Kenney & Zysman, 2016) Furthermore, the transformation does not come without risks and failures. Data and algorithms-based processes, information and decision-making are more abstract, hence harder to comprehend and explain. Consequently, transformation produces both intended and unintended results (DRCF, 2022), including wicked system problems created by well-meaning intentions. (Rainie & Anderson, 2017)
Possible Evolutionary Scenario in Nordic Countries
Based on the foresight and trends explained in previous sections, this part uses the scenario planning method (Chermack, 2011) to describe a possible future scenario further. This scenario is loosely based on linear extrapolation and prospective systems analysis (De Jouvenel, 2000) of the evolution within the past ten years in Northern Europe. This approach does not include forecasting (Van der Heijden, 2000), the typical second component of futures research. Firstly, the scenario method defines foundational assumptions and then creates a general scenario of 2032. Thirdly, it sets assumptions about the evolution of the threat environment and fourthly, it provides a confrontational scenario between state entities in Northern Europe in 2032.
Possible Development of Societies and Economy in Northern Europe 2032
The scenario "Feasible" is based on the following assumptions of development by 2032:
- The Nordic income distribution society survives the Russian-created energy crises starting in 2022. The democratic system serves citizens sufficiently even when the feeling of polarisation increases. Nevertheless, the situation does not create inner conflict yet. The economic and financial deepening of the European Union proceeds slowly and only gradually improves the EU market region compared to more progress leveraging US and China markets.
- Government structure and services are digitised gradually, but digital transformations occur elsewhere. Automation and the 4th industrial revolution transformed services, industry, traffic, and logistics. Regional software development and data engineering competency have an opportunity to grow with the 4th industrial revolution and, finally, replace the global platform service providers.
- Nordic countries can sufficiently keep their working-age population producing wealth and increase the educated younger generation through labour-based immigration and international students staying in the country after graduation. Nevertheless, public nursing and education cannot replace home nurture and Metaverse addicts too much. Hence, social exclusion continues growing and fuelling polarisation. Moreover, the major tax-paying part of the population feels more critical about the increasing amount of pensioners, long-term unemployed, and uneducated.
- The energy crisis, which emerged in 2022, accelerates the transfer of European energy production. However, industry, products, and consumption suffer from higher energy costs than in the US and Asian markets. For example, China will leverage their cheaper energy bill and improve competency assets in increasing their productivity and gaining more global markets with cyber-physical products. The decreasing fossil energy incomes may increase social unrest in current OPEC and other major oil-producing countries and possibly launch "Arab Spring"-like uprisings. (U.S. JCS, 2016)
- People spend their time more in virtual worlds than in traditional broadcasting, media, and social media channels, where their system 1 (Kahneman, 2011) will get faster and more complete needs fulfilment. Global gaming and social media companies can renew their offerings fast enough to sustain their market share and continue consolidating their entertainment and media portfolios. Regional media companies may survive in niche segments either sponsored by public resources or narrowly targeted advertisement selling.
- The physical and mental well-being becomes more fragile, and polarisation for those physically active and with live social networks and those isolated in a virtual world and staying home defines social structure.
- The existential threats (nuclear holocaust, climate change, scarcity of resources and distinction of species) gain more evidence in everyday life, and their secondary impact (refugees, unnormal weather, threat with weapons of mass destruction) change public opinions and political decision-making. Furthermore, the fast progress of digital and biotechnology changes the everyday work and economic structure too quickly, creating social unrest.
The assumptions mentioned above may lead to the following scenario, "Feasible 2032", from a socio-technical perspective:
- Energy crises, reaching for carbon neutrality and culmination of the societal structure polarise public opinion and fracture democratic consensus-seeking. The number of employees decreases, and the unemployed increases while the industrial culmination automates industry, traffic, governance, and services. As work-based income creation becomes challenging, the public sector may be forced to provide meaningful activities for the inactive part of the population. Maybe even longer military service becomes an option.
- The global platform and media providers are so dominant in the segments of entertainment and social media. Hence, the regional providers have not survived. The US and China continue competing and extending their data colonisation of centralised platforms worldwide.
- People fulfil their need to be accepted in virtual environments and second life -platforms, where social code of conduct may differ remarkably from the rules of social cooperation in the physical world. (Keltinkangas-Järvinen, 2010) Empty home, ritual religion, and negligible fatherland do not enforce national feelings or willingness to sacrification on behalf of the country. The structure of social capital is in transfer (Putnam, 2000), making a postmodern human more fragile, easier to manipulate and seeking protection of authority during crises. (Timcke, 2021) Autocratic regimes may have better advantages than democratic systems for strategic and operational surprises in interstate power projection.
- The human-machine interface is mostly 3D -virtual (Metaverse) (Ball, 2022) or required in the 4th Industrial Revolution (Kopletov, 2020). A legacy interface like screen, keyboard, and mouse have migrated to miniaturised VR or XR devices, widely used for studying, technical design, creating arts and music, and consuming digital products.
- The data-driven enterprise processes data in real-time, data supports all corporate decision-making, cooperation, and business process performance. Agile data sources are available for all processes, data is valuated as a product, data management is automated, and every corporation is a member of a more comprehensive data ecosystem, which supports the control of the entire value chain. (McKinsey Digital, 2022)
- High-performance computing, quantum processing, and digital modelling enable R&D, design, and creation of digital twins for cyber-physical structures and products, which helps engineering sciences to develop and migrate complex socio-technical systems. However, culture and competency deficiencies remain significant obstacles to implementation and adaptation.
- Faster digitalisation than in the rest of Europe and over 5% (of GDP) of investments in science and technology keep the Nordic Countries on top of the Global Talent Competitiveness and Global Innovation Index with improved utilisation of talent and innovation. Therefore, foreign competency and capital are available for new Nordic enterprises.
- 5/6 G networks, edge computing, machine learning and connected things (IoT) have transformed the business processes and models of Nordic industry, logistics, infrastructure services and health care to compete successfully in providing cyber-physical products and services to the slowly improving European market.
The confrontation scenario and its possible development in Northern Europe in 2032
"When it comes to predicting the nature and location of our next military engagements, since Vietnam, our record has been perfect. We have never once gotten it right, from the Mayaguez to Grenada, Panama, Somalia, the Balkans, Haiti, Kuwait, Iraq, and more—we had no idea a year before any of these missions that we would be so engaged."
- U.S. Secretary of Defence Robert Gates (Gates, 2011)
"I don't think there's been a time in the history of warfare where things have been changing as rapidly,"
- U.S. Chairman of the House Armed Service Committee, Adam Smith (Williams, 2022)
Assuming that the threat environment evolves within the next ten years in Northern Europe as follows:
- After losing most of its military land and artillery forces in attrition warfare against Ukraine, domestic income from fossil energy remains low, and import restrictions on western technology remain in place because of war crimes, Russia has not been able to re-establish and modernise its military might. As a result, to some degree, Russian space, air, and naval forces sustain their ability to control areas of operation and support power politics. However, the Red Army has significant challenges in the digitalisation and automation of its weapon and sensor platforms. Therefore, the operational art seeks to exploit anything existing, asymmetric ways of warfare and innovative ways to utilise commercial technology and products.
- The Russian information environment remains under the control of an autocratic regime, and domestic opinion manipulation uses themes of religion, nationalism, and fear of outside enemies to maintain Slavic integrity. Moreover, the tacit memory between individual citizens recalls the massive loss of human power in the special operation of 2022 – 2023.
- The Russian cyber environment is enclaved from the Internet with tight content and packet filters, and Russian platforms and services compensate for global digital services. Moreover, with Chinese support, Russia has implemented a vast surveillance system to gain more control of the physical and logical behaviour of their residents.
- In Europe, populism using conservative values and totalitarian flavoured regimes create confrontations, but economic and infrastructure dependencies stabilise relationships. Nevertheless, polarisation and ideological powers generate terrorism within Europe.
- Existential threats in Figure 5 and their secondary effects create refugees and inequality that impact European public opinion and deteriorate stability.
- Digitalisation and proceedings in biotechnology transfer societies and create new weaknesses and connections in trust relations between citizens, government, and power sources.
- The competition between China and the USA projects market and product restrictions also in Europe.
- The integration of NATO and their defence capabilities have evolved following the Russian power projection 2014-2023 and can deter 3rd generation adversaries. As a result, northern European defence systems are integrated, and Nordic military capabilities are used seamlessly.
- Instead of a hierarchically commanded, industrially generated military force, a knowledge economy-driven military force is a value network of military organisations, corporations, and non-profit organisations, which generates, supports, and uses vertically and parallelly synergetic military power. The military capability of the defence value network is based on information exchange, trust, and common language. (Niemelä, 2002)
Figure 5: One state-level threat model (Mattila, 2022)
The above assumptions and previous generic scenarios may create the following confrontation scenario between Nordic countries and Russia: (U.S. JCS, 2016) (RAND, 2020) (Kelly, 2022)
a) Strategic dimension
- The Russian regime tries to contain its position and privileges by controlling tightly domestic information environment and opinion creation. Moreover, Russia tries to create chaos in their neighbours' public opinion creation and political decision-making.
- Fabricated conflicts are waged as infinite (Carse, 2013) information operations a la Lenin (Strachan, 2008), adjusted to create enough leverage for domestic themes and spread confusion outside Russia. Russian goal is a continuous confrontation (according to the struggle of classes tradition) from a higher moral position that provides motivation and coherence to Slavic people. Therefore, sustaining the control and regime of Russia.
- War, by definition, is too black and white for recent confrontation and conflict. The conflicting parties are not only states. Violence is not a military monopoly. The scarcity of conventional resources creates innovative ways of power projection and manipulation. At the core of conflict lies the control of the attention of different audiences. (Ford & Hoskins, 2022)
- Russian sources of power in international confrontation are more comprehensive than the traditional diplomacy and military. Other means include information, economics, finance, intelligence, and law enforcement, together with the leverage of other threats in Figure 5 and their impact. (Mattila, 2022)
- Besides compulsory ways, Russia uses institutional, productive, and structural avenues of effect to culture confrontation, create chaos in neighbours, and maintain coherency within the country.
b) Operational dimension
- Russian centralised, autocratic command of effectors and avenues of effect (e.g., political, information, economy, finance, social, technical, military, institutional) generate the ability for joint operations. The joint operations may be used, for example, to found, ameliorate, contain, constrain, deter, coerce, degrade, corrupt, penetration (Hoffman, 2018) and destroy. (Mattila, 2011)
- Russian operational art seeks targets from adversary society's entire value stream, aiming to deteriorate information transfer, digital trust, social integration, and logistic chains between entities.
- Besides conventional military forces, Russia is using sources of power organised in ideological sects, criminal groups, terrorists, corporations, international organisations (NGO), new cooperative institutions (U.S. JCS, 2016), governmental organisations, military corporations (e.g., Wagner), militias, other states, and coalitions. (Creweld, 1991)
c) Tactical military dimension
- Russia seeks asymmetric avenues for impact and combines tactical capabilities through all six military domains: space, air, maritime, land, cyber, and electromagnetic.
- Authoritarian and deep hierarchical command and control culture minimises the tactical level initiative, slows the pace of action (McChrystal, et al., 2015), and cements doctrinal or institutional organisational function.
- The conflict escalates to violence in metropoles, where an urbanised population provides enough physical and cognitive masses, polarisation is more apparent, and enough media and social media agents to enforce information impacts. (Brown, et al., 2019)
d) Information dimension
- Russia benefits from commercial and social behavioural data, which coordinates precise targeting in the Nordic socio-technical systems.
- Machine learning and vast amounts of data enable human-machine cooperation, which, following an optimal process, always wins pure human sense- and decision-making.
- Development cycles and product life cycles are shorter. Therefore, competing organisations need to be more flexible in their strategy and agile in their production for creating cyber-physical products and services. Model-driven design, digital twins, and simulation are profound enablers in continuous integration and release.
- Information dimension enforces all confrontation and conflict in other avenues of effect with impact at cognitive and social levels. (Ford & Hoskins, 2022)
e) Technical dimension
- The extending digitisation of the Nordic critical infrastructure increases Russian opportunities for cyber attack vectors and physical level vulnerabilities for kinetic effect.
- The internationally integrated and interdependent, complex digital infrastructure includes vulnerabilities to impact critical functions via secondary systems and supply chain.
- Consolidated Metaverse provides several avenues of effect for individual-level system one need satisfaction.
- Converged functions and miniaturised technology generate autonomous, multifunctional, and multisensory consumables, which may be used as such or with minor adjustments for violence.
The above-defined scenario may be used to develop state-level forces for international confrontations.