Summary
The paper provides one logical scenario for global development, interstate relations and possible confrontation in Northern Europe from a military viewpoint with a data-centric flavour. The aim is to provide a model for use in national defence planning.
In this scenario, exponentially extending digitisation and use of digital technology enforce production (e.g., big data) and use of data (e.g., data economy). The extent of data transfers processes with automation, user interfaces (XR/Metaverse), and increases the amount of information. Moreover, improving understanding with human competency and machine learning changes the behaviour of a socio-technical system.
The first wave of global competition for digital dominance is ongoing. Since the cyber environment is an international artificial structure, it does not fit under traditional national or international governance structures. Mingled powers of open market and governmental control have created digital colonisation, where the US-based corporates and China dominate the cyber environment, its services and content. Some countries like Russia, Iran, Turkey, Vietnam, and the UAE are actively trying to protect their national cyber infrastructure by technically filtering the content and services of the Internet. In addition, European Union uses regional regulation to protect the sovereignty of data and the common market.
The next wave of digitalisation will build up faster and will be about 2-3 times larger than the first wave measured in the amount of data. The second wave may transfer the current digital dominance if countries are digitally mature and digital trust is firm enough. The ongoing development transfers international dependencies and enforces different power politics.
The contemporary militarisation of the cyber and information environment has culminated in the Russian power projection 2014-2022. For example, Ukraine stores its nationally critical information abroad, safe from the Russian invasion. Russian operational preparations included cyber, data, and information impact joint with kinetic effects to create electrotechnical shock during February 2022. Furthermore, Russia arranges the media, social media, and cyber infrastructure in their captured areas of Donbas to gain control over public opinion.
The current indication of data valuation in military operations and future possibilities of digitalisation will change the coming confrontation between states. Therefore, the transformation of international relations needs to be understood in national defence preparations.
Evolution of Information and its Use
Steps of
Evolution |
Enabling
techniques and capabilities |
Examples |
Transfer of genetical information and organic
learning |
Genetical heritage |
Revolutionary change emerges from genetical
variations (i.e., mutations, natural selection, genetical transfer, specialisation) |
Transfer of information orally |
Development of language |
Songs, stories, and sagas in the transfer of information
over generations. Communication and cooperation advanced human and social
survival so much that signs and voices developed into words. In support of
explaining more abstract things, grammar and sentences emerged. |
Written transfer of knowledge |
Art of writing and printing |
1440 Gutenberg's printing machine 1774 Telegraph 1829 Typing machine 1876 Telephone 1894 Radio 1920 Television 1923 Newspaper |
Creation and dissemination of content in electrical
means |
Analogue management of voice and pictures |
Development of telephony, radio, and television
technology. The emergence of the movie industry and radio- and television
companies. 1950-1960 spreading of black and white television
networks 1960 spreading of FM radio networks 1975 video recorder 1981 Personal computer |
World Wide Web (1 and 2), Social media, Mobile
applications |
Digitation of analogic information = DATA |
The revolution of digital channels and content usage
from 1995, 16 million Internet users to 5.3 billion users by 2022. The smart
mobile phone has become a primarily used device to consume content on the
Internet as the average user spends 3.15 hours with the phone. |
Metaverse |
Digital text and pictures migrate to a 3D virtual
realm (Web3) in the human-machine interface |
Internet of Things, 5G mobile networks, edge
computing, artificial intelligence, and metaverse user interfaces. Lower
cognitive level machines transfer information, learn from each other and
create content for humans cooperating with them through virtual/extended
reality interfaces. 2003 RFIF commercial launch 2008 EU recognises IoT 2010 China announces IoT to be a key to the industry 2012 Switzerland launched the "Smart City of
Switzerland" project 2013 low-price processing platforms Arduino and
Raspberry Pi gain commercial recognition 2025 foresees over 70 billion IoT devices connected. |
Cognitive machines |
Machine-to-machine information transfer and
artificial knowledge become more critical than information presentation in
human-machine interfaces. |
Higher cognition level machines produce, learn and
process information to create artefacts like cyber-physical products or
social services. · Cognitive applications at the level of human · Learn from data or by observing action faster and
more precise than today · Possibly replicate autonomously · Create art, compose songs, and write books and
papers. |
Information Evolution Impact on Interstate and Military Relations
The Development of Data Centricity Between States
1. Regional control of information
2. Protection of sovereign data environment
3. Information warfare
4. Knowledge as a medium in strategic competition
5. Digital colonisation
Military Force Benefits from the Evolution of Digitised Information
- Pathfinder military tries to use the edge of advanced technology as fast as possible while pursuing technical dominance over potential adversaries (China's intentions).
- Operational military tries to apply digitalisation and data to improve their forces' operational and tactical performance to gain/keep an advantage (e.g., ISIS).
- Evolutionary military use data at their own pace as technology has matured to fit their risk appetite (most European Forces).
- Protective military perceives to have achieved dominance over potential adversaries and tries to sustain the existing advantage (USA).
- 1993–2003 digitalisation of operational level command and control (Network Centric Warfare) (Chizek, 2003)
- 2020 launched the preparation of tactical level digitalisation (Joint All-domain C2) (Clark, 2020)
- 2022 preparation of digitalisation in other parts of US military institute (Chief of Digital and Artificial intelligence) (Vergun, 2022)
- 2007 Russia integrated cyber effects as part of their information operations against Estonia.
- 2012 During the Chechnyan war and Putin's re-election, the leadership of Russia understood that control of the information realm is critical for staying in power. (Giles, 2012)
- 2014 during the manning of Crimea, Russia applied deception, metanarratives, and cyber means to manipulate the perception of a variety of audiences. (Pynnöniemi & Racz, 2016)
- 2016 the information security doctrine defined the information area of operation, which includes technology and cognitive components. (Lilly & Cheravitch, 2020)
- 2022 the Russian leadership can control domestic digital infrastructure, broadcasting, social media, and media content. (Vinkour, 2022) (Budnitsky, 2022)
- ISIS used anonymous portals for file transfer and collaboration between jihadist parties. (Shehabat & Mitew, 2018)
- ISIS used social media platforms to recruit over 40 000 fighters from over 110 countries. (Ward, 2018)
- ISIS used digital channels for ways of strategic communication, coercion through publishing acts of terror, and manipulation through propaganda. (Pellerin, 2016)
- ISIS captured the telecommunication infrastructure in their area of operation and used it to support their command and control. (CJTFOIR, 2017)
- A volunteer force was called in through Twitter, Facebook, and Telegram accounts creating a command channel with around 11500 participants.
- Next day, the command channel distributed the first assignment to attack against 31 network addresses of 31 banks, businesses, and government websites.
- Within three weeks, the cyber cluster had been organised into three services: the IT Army, the Internet Forces of Ukraine, and the e-Enemy.
- An example of fires control: After providing target information of IP address and four ports, various control channels distributed the target to around 18 800 effectors within 4 hours.
- Within three months of establishing the networked force, the cluster has attacked about 2000 Russian resources.
The Development of Data, Human and Machine Towards a Socio-technical System
- A high-performance machine wins an expert human in seeking variations from a large combination of possibilities (10120). (Maharaj, et al., 2022)
- A more intelligent algorithm with less computing capacity may win over a less intelligent algorithm with high computing performance. (Maharaj, et al., 2022)
- A machine learning algorithm with a broader training data set can win a search-optimised designed algorithm. (Maharaj, et al., 2022)
- A novice in good cooperation with a machine and following a high-performing process may win over a master who uses higher computing power but a weaker process. (Phillips-Levine, et al., 2022)
- A less cooperating group of high experts will lose against the optimised algorithm. (Cabitza, et al., 2021)
- Well-functioning team of experts may win against an optimised algorithm. (Cabitza, et al., 2021)
- Lesser experts interacting better with each other, and their algorithm may win a less coherent group of higher experts using the same algorithm. (Cabitza, et al., 2021)
- Everyone with an available computer and algorithm will win one team of experts with a laptop and algorithm. (Knemeyer & Follet, 2019)
Ongoing Evolutionary Steps in Digital Technology and Usage of Data
- The Internet with IP protocol, WWW and Browser
- 3-4G providing mobile data connection
- Smart mobile devices
- Platforms for social behaviour and economic transactions (Kenney & Zysman, 2016)
- Big data and business analysis/intelligence
- 5 G providing near-zero latency connections for masses of connected devices
- Internet of Things will produce 75% of organisations' data by 2025 (Stackpole, 2022)
- Migration of algorithms and machine learning automate digitised processes and provide a variety of man-machine interfaces
- Cloud computing provides computing power for services like IaaS, PaaS, and SaaS, which are easy to replicate and provide
- Non-latency and high bandwidth access networks (Wi-Fi 6, 5G and 6G) are connected through fibre optical connections for networks able to slice capacity for immersive 8K perception.
- The automated function of networked machines enables the 4th industrial revolution and autonomous transportation
- Edge computing and data-driven machine learning improve the level of machine cognition (Brown, 2022)
- Digitisation and increasing connected devices will increase the amount of data by 2025 to 175 Zettabytes. Human cognition requires machine support and smart data to identify any pattern from the amount of data. (De Goes, 2013)
- Human-machine interface migrates from screen and keyboard to 3D Metaverse. (Gartner, 2021)
Possible Evolutionary Scenario in Nordic Countries
Possible Development of Societies and Economy in Northern Europe 2032
- The Nordic income distribution society survives the Russian-created energy crises starting in 2022. The democratic system serves citizens sufficiently even when the feeling of polarisation increases. Nevertheless, the situation does not create inner conflict yet. The economic and financial deepening of the European Union proceeds slowly and only gradually improves the EU market region compared to more progress leveraging US and China markets.
- Government structure and services are digitised gradually, but digital transformations occur elsewhere. Automation and the 4th industrial revolution transformed services, industry, traffic, and logistics. Regional software development and data engineering competency have an opportunity to grow with the 4th industrial revolution and, finally, replace the global platform service providers.
- Nordic countries can sufficiently keep their working-age population producing wealth and increase the educated younger generation through labour-based immigration and international students staying in the country after graduation. Nevertheless, public nursing and education cannot replace home nurture and Metaverse addicts too much. Hence, social exclusion continues growing and fuelling polarisation. Moreover, the major tax-paying part of the population feels more critical about the increasing amount of pensioners, long-term unemployed, and uneducated.
- The energy crisis, which emerged in 2022, accelerates the transfer of European energy production. However, industry, products, and consumption suffer from higher energy costs than in the US and Asian markets. For example, China will leverage their cheaper energy bill and improve competency assets in increasing their productivity and gaining more global markets with cyber-physical products. The decreasing fossil energy incomes may increase social unrest in current OPEC and other major oil-producing countries and possibly launch "Arab Spring"-like uprisings. (U.S. JCS, 2016)
- People spend their time more in virtual worlds than in traditional broadcasting, media, and social media channels, where their system 1 (Kahneman, 2011) will get faster and more complete needs fulfilment. Global gaming and social media companies can renew their offerings fast enough to sustain their market share and continue consolidating their entertainment and media portfolios. Regional media companies may survive in niche segments either sponsored by public resources or narrowly targeted advertisement selling.
- The physical and mental well-being becomes more fragile, and polarisation for those physically active and with live social networks and those isolated in a virtual world and staying home defines social structure.
- The existential threats (nuclear holocaust, climate change, scarcity of resources and distinction of species) gain more evidence in everyday life, and their secondary impact (refugees, unnormal weather, threat with weapons of mass destruction) change public opinions and political decision-making. Furthermore, the fast progress of digital and biotechnology changes the everyday work and economic structure too quickly, creating social unrest.
- Energy crises, reaching for carbon neutrality and culmination of the societal structure polarise public opinion and fracture democratic consensus-seeking. The number of employees decreases, and the unemployed increases while the industrial culmination automates industry, traffic, governance, and services. As work-based income creation becomes challenging, the public sector may be forced to provide meaningful activities for the inactive part of the population. Maybe even longer military service becomes an option.
- The global platform and media providers are so dominant in the segments of entertainment and social media. Hence, the regional providers have not survived. The US and China continue competing and extending their data colonisation of centralised platforms worldwide.
- People fulfil their need to be accepted in virtual environments and second life -platforms, where social code of conduct may differ remarkably from the rules of social cooperation in the physical world. (Keltinkangas-Järvinen, 2010) Empty home, ritual religion, and negligible fatherland do not enforce national feelings or willingness to sacrification on behalf of the country. The structure of social capital is in transfer (Putnam, 2000), making a postmodern human more fragile, easier to manipulate and seeking protection of authority during crises. (Timcke, 2021) Autocratic regimes may have better advantages than democratic systems for strategic and operational surprises in interstate power projection.
- The human-machine interface is mostly 3D -virtual (Metaverse) (Ball, 2022) or required in the 4th Industrial Revolution (Kopletov, 2020). A legacy interface like screen, keyboard, and mouse have migrated to miniaturised VR or XR devices, widely used for studying, technical design, creating arts and music, and consuming digital products.
- The data-driven enterprise processes data in real-time, data supports all corporate decision-making, cooperation, and business process performance. Agile data sources are available for all processes, data is valuated as a product, data management is automated, and every corporation is a member of a more comprehensive data ecosystem, which supports the control of the entire value chain. (McKinsey Digital, 2022)
- High-performance computing, quantum processing, and digital modelling enable R&D, design, and creation of digital twins for cyber-physical structures and products, which helps engineering sciences to develop and migrate complex socio-technical systems. However, culture and competency deficiencies remain significant obstacles to implementation and adaptation.
- Faster digitalisation than in the rest of Europe and over 5% (of GDP) of investments in science and technology keep the Nordic Countries on top of the Global Talent Competitiveness and Global Innovation Index with improved utilisation of talent and innovation. Therefore, foreign competency and capital are available for new Nordic enterprises.
- 5/6 G networks, edge computing, machine learning and connected things (IoT) have transformed the business processes and models of Nordic industry, logistics, infrastructure services and health care to compete successfully in providing cyber-physical products and services to the slowly improving European market.
The confrontation scenario and its possible development in Northern Europe in 2032
- After losing most of its military land and artillery forces in attrition warfare against Ukraine, domestic income from fossil energy remains low, and import restrictions on western technology remain in place because of war crimes, Russia has not been able to re-establish and modernise its military might. As a result, to some degree, Russian space, air, and naval forces sustain their ability to control areas of operation and support power politics. However, the Red Army has significant challenges in the digitalisation and automation of its weapon and sensor platforms. Therefore, the operational art seeks to exploit anything existing, asymmetric ways of warfare and innovative ways to utilise commercial technology and products.
- The Russian information environment remains under the control of an autocratic regime, and domestic opinion manipulation uses themes of religion, nationalism, and fear of outside enemies to maintain Slavic integrity. Moreover, the tacit memory between individual citizens recalls the massive loss of human power in the special operation of 2022 – 2023.
- The Russian cyber environment is enclaved from the Internet with tight content and packet filters, and Russian platforms and services compensate for global digital services. Moreover, with Chinese support, Russia has implemented a vast surveillance system to gain more control of the physical and logical behaviour of their residents.
- In Europe, populism using conservative values and totalitarian flavoured regimes create confrontations, but economic and infrastructure dependencies stabilise relationships. Nevertheless, polarisation and ideological powers generate terrorism within Europe.
- Existential threats in Figure 5 and their secondary effects create refugees and inequality that impact European public opinion and deteriorate stability.
- Digitalisation and proceedings in biotechnology transfer societies and create new weaknesses and connections in trust relations between citizens, government, and power sources.
- The competition between China and the USA projects market and product restrictions also in Europe.
- The integration of NATO and their defence capabilities have evolved following the Russian power projection 2014-2023 and can deter 3rd generation adversaries. As a result, northern European defence systems are integrated, and Nordic military capabilities are used seamlessly.
- Instead of a hierarchically commanded, industrially generated military force, a knowledge economy-driven military force is a value network of military organisations, corporations, and non-profit organisations, which generates, supports, and uses vertically and parallelly synergetic military power. The military capability of the defence value network is based on information exchange, trust, and common language. (Niemelä, 2002)
- The Russian regime tries to contain its position and privileges by controlling tightly domestic information environment and opinion creation. Moreover, Russia tries to create chaos in their neighbours' public opinion creation and political decision-making.
- Fabricated conflicts are waged as infinite (Carse, 2013) information operations a la Lenin (Strachan, 2008), adjusted to create enough leverage for domestic themes and spread confusion outside Russia. Russian goal is a continuous confrontation (according to the struggle of classes tradition) from a higher moral position that provides motivation and coherence to Slavic people. Therefore, sustaining the control and regime of Russia.
- War, by definition, is too black and white for recent confrontation and conflict. The conflicting parties are not only states. Violence is not a military monopoly. The scarcity of conventional resources creates innovative ways of power projection and manipulation. At the core of conflict lies the control of the attention of different audiences. (Ford & Hoskins, 2022)
- Russian sources of power in international confrontation are more comprehensive than the traditional diplomacy and military. Other means include information, economics, finance, intelligence, and law enforcement, together with the leverage of other threats in Figure 5 and their impact. (Mattila, 2022)
- Besides compulsory ways, Russia uses institutional, productive, and structural avenues of effect to culture confrontation, create chaos in neighbours, and maintain coherency within the country.
- Russian centralised, autocratic command of effectors and avenues of effect (e.g., political, information, economy, finance, social, technical, military, institutional) generate the ability for joint operations. The joint operations may be used, for example, to found, ameliorate, contain, constrain, deter, coerce, degrade, corrupt, penetration (Hoffman, 2018) and destroy. (Mattila, 2011)
- Russian operational art seeks targets from adversary society's entire value stream, aiming to deteriorate information transfer, digital trust, social integration, and logistic chains between entities.
- Besides conventional military forces, Russia is using sources of power organised in ideological sects, criminal groups, terrorists, corporations, international organisations (NGO), new cooperative institutions (U.S. JCS, 2016), governmental organisations, military corporations (e.g., Wagner), militias, other states, and coalitions. (Creweld, 1991)
- Russia seeks asymmetric avenues for impact and combines tactical capabilities through all six military domains: space, air, maritime, land, cyber, and electromagnetic.
- Authoritarian and deep hierarchical command and control culture minimises the tactical level initiative, slows the pace of action (McChrystal, et al., 2015), and cements doctrinal or institutional organisational function.
- The conflict escalates to violence in metropoles, where an urbanised population provides enough physical and cognitive masses, polarisation is more apparent, and enough media and social media agents to enforce information impacts. (Brown, et al., 2019)
- Russia benefits from commercial and social behavioural data, which coordinates precise targeting in the Nordic socio-technical systems.
- Machine learning and vast amounts of data enable human-machine cooperation, which, following an optimal process, always wins pure human sense- and decision-making.
- Development cycles and product life cycles are shorter. Therefore, competing organisations need to be more flexible in their strategy and agile in their production for creating cyber-physical products and services. Model-driven design, digital twins, and simulation are profound enablers in continuous integration and release.
- Information dimension enforces all confrontation and conflict in other avenues of effect with impact at cognitive and social levels. (Ford & Hoskins, 2022)
- The extending digitisation of the Nordic critical infrastructure increases Russian opportunities for cyber attack vectors and physical level vulnerabilities for kinetic effect.
- The internationally integrated and interdependent, complex digital infrastructure includes vulnerabilities to impact critical functions via secondary systems and supply chain.
- Consolidated Metaverse provides several avenues of effect for individual-level system one need satisfaction.
- Converged functions and miniaturised technology generate autonomous, multifunctional, and multisensory consumables, which may be used as such or with minor adjustments for violence.
No comments:
Post a Comment