Digital Sovereignty The Emerging Role of Armed Forces

In today’s digital age‭, ‬the notion of national sovereignty is no longer confined to physical borders‭. ‬Instead‭, ‬it has expanded into new domains—chief among them‭, ‬cyberspace‭. ‬This transformation reflects a profound shift in the nature of international relations and defence‭ ‬systems‭, ‬where the ability to manage data‭, ‬secure digital infrastructure‭, ‬and conduct cyber operations has become critical to a‭ ‬nation’s autonomy‭. ‬Against this backdrop‭, ‬modern armed forces are increasingly expected to expand their traditional responsibilities to‭ ‬include cyber defence‭, ‬digital deterrence‭, ‬and technological self-sufficiency in response to the challenges posed by a rapidly‭ ‬evolving digital environment‭.‬

This study explores the concept of digital sovereignty from a military perspective‭, ‬with a particular focus on the role of armed‭ ‬forces in its development and reinforcement‭. ‬It also examines the complex challenges that militaries face in securing digital sovereignty and outlines key future trends that will shape this vital pillar of national security‭.‬

Digital Sovereignty as an Operational Military Domain

Digital sovereignty refers to a state’s ability to independently manage its digital infrastructure‭, ‬data‭, ‬and cyber-related decisions without external technological dependence‭. ‬This concept is an extension of traditional sovereignty and is increasingly recognised in military strategic literature‭. ‬French defence white papers‭ (‬2008‭, ‬2013‭) ‬and the 2017‭ ‬Strategic Review of Defence and‭ ‬National Security underscore the critical importance of asserting control over digital space to preserve strategic autonomy‭. ‬In‭ ‬these frameworks‭, ‬cyberspace is no longer a mere technical domain—it is a sovereign battlefield in its own right‭, ‬where data has become as vital as traditional resources like energy and water‭.‬

Pierre Bellanger‭, ‬CEO of Skyrock and a member of the French Centre for Higher Studies in Cybersecurity‭ (‬CHECy‭), ‬was among the earliest to warn that many states are relinquishing their digital sovereignty without resistance‭, ‬due to delayed policy and regulatory responses‭. ‬This concern was echoed in a 2024‭ ‬report by the French Parliament‭, ‬which stressed the need for national capabilities to secure data and information without foreign interference‭.‬

Digital sovereignty encompasses multiple operational layers‭:‬

•‭ ‬Physical‭: ‬Servers‭, ‬networks‭, ‬and digital infrastructure

•‭ ‬Logical‭: ‬Software systems and digital architecture

•‭ ‬Cognitive‭: ‬Information flows and their interpretation

This environment transcends traditional constraints of time and space‭, ‬making even domestic institutions and individuals vulnerable to cyberattacks‭. ‬As a result‭, ‬new military theories now regard cyberspace as a distinct battlespace‭, ‬requiring dedicated offensive and defensive capabilities‭. ‬Consequently‭, ‬military doctrines have evolved to include concepts like cyber defence‭, ‬cyber deterrence‭, ‬and cybersecurity‭. ‬Major powers have created specialised commands such as the United States Cyber Command‭ (‬USCYBERCOM‭) ‬and France’s COMCYBER to lead these efforts‭.‬

The Paradox of Digital Sovereignty

Despite the necessity of achieving digital sovereignty‭, ‬armed forces must contend with a fundamental paradox‭: ‬securing a system‭ ‬composed of inherently unreliable components‭. ‬Full independence in hardware and software remains impractical‭. ‬Therefore‭, ‬militaries must strive for the highest possible level of autonomy by diversifying suppliers‭, ‬using segmented and protected networks‭, ‬and employing sovereign tools‭.‬

Key requirements for achieving operational digital sovereignty include‭:‬

•‭ ‬Sovereign encryption systems to ensure data confidentiality

•‭ ‬Fully controlled monitoring systems for data availability

•‭ ‬National algorithms to process and interpret digital information

Although complete technological independence is unattainable‭, ‬military forces can still pursue strategic autonomy by managing risks and avoiding overreliance on any single external source‭. ‬Importantly‭, ‬even domestically developed digital products cannot be‭ ‬assumed fully secure without rigorous scrutiny‭. ‬The rise of data science and machine learning has introduced a further requirement‭: ‬the development of classified national datasets to train artificial intelligence and evaluate algorithms‭. ‬In a world where‭ ‬open-source intelligence and search engine dominance influence decision-making‭, ‬militaries must ensure the neutrality and reliability of digital tools‭. ‬This includes creating proprietary algorithms and overseeing their training using secure‭, ‬state-managed‭ ‬datasets‭.‬

Cyberspace as a Battlefield

Cyberspace has evolved into a full-fledged combat zone‭, ‬marked by fluid dynamics‭, ‬blurred boundaries‭, ‬and constant asymmetry‭. ‬Unlike traditional warfare‭, ‬cyber operations favour the attacker‭, ‬who can act with speed and deniability‭, ‬complicating attribution‭ ‬and response‭. ‬This complexity requires armed forces to develop rapid-strike capabilities that are ready to engage in both defensive and offensive cyber missions‭.‬

Moreover‭, ‬cyberspace is a shared strategic arena for both military and civilian sectors‭. ‬The international community continues to grapple with how to regulate this domain under international law‭. ‬Compounding the challenge is the presence of not only state‭ ‬actors but also terrorist networks and nationalist groups capable of launching sophisticated cyber operations that go beyond espionage‭.‬

Strategic Imperatives for Armed Forces

In this context‭, ‬it is imperative for national institutions—especially the military—to ensure the continuity of critical operations‭, ‬economic functions‭, ‬and vital infrastructure in the face of three key categories of cyber threats‭:‬

1‭. ‬Direct attacks on data

2‭. ‬Assaults on information systems

3‭. ‬Targeted strikes on physical assets via cyber means

As digital threats become increasingly sophisticated and pervasive‭, ‬the role of the military must evolve accordingly‭. ‬This involves not only defending against cyberattacks but also shaping the broader digital security environment through proactive strategy‭, ‬innovation‭, ‬and partnerships across government‭, ‬industry‭, ‬and academia‭.‬

The Expanding Role of Armed Forces in Digital Sovereignty

In the contemporary security landscape‭, ‬ministries of defence are playing an increasingly vital role in establishing digital sovereignty‭. ‬This effort encompasses two primary responsibilities‭: ‬ensuring the optimal performance of digital infrastructure and preparing forces to operate within the cyber domain‭. ‬To achieve this‭, ‬armed forces worldwide are undergoing extensive digital transformation‭, ‬modernising both operational procedures and technological systems‭.‬

France serves as a case in point‭. ‬The establishment of its Cyber Operations Command‭ (‬COMCYBER‭) ‬in 2017‭ ‬and the Directorate General for Digitalisation and Information Systems‭ (‬DGNUM‭) ‬in 2018‭ ‬reflects its strategic intent to address the evolving nature of cyber threats‭. ‬These initiatives aim to secure national defence systems in a digital environment marked by speed‭, ‬volatility‭, ‬and‭ ‬constant innovation‭.‬

Different countries have adopted varied approaches to digital sovereignty‭. ‬France‭, ‬for example‭, ‬promotes a balanced model that combines national autonomy with international collaboration‭, ‬particularly at the European level‭. ‬Its strategy includes developing‭ ‬national encryption tools‭, ‬expanding open-source software‭, ‬and reducing reliance on foreign tech providers‭. ‬The United States‭, ‬on the other hand‭, ‬pursues digital dominance by investing heavily in advanced cyber defence and offence through institutions like USCYBERCOM‭, ‬and partnering with tech giants such as Microsoft and Palantir‭.‬

The United Kingdom blends sovereignty with strategic alliances‭, ‬having established a National Cyber Force through cooperation between military and intelligence agencies‭, ‬while maintaining its alignment with the Five Eyes alliance‭. ‬Meanwhile‭, ‬Russia leans towards complete digital autonomy‭, ‬emphasising tight regulatory control and the development of hybrid offensive capabilities‭. ‬China adopts an assertive model by enforcing strict data laws‭, ‬building national tech alternatives‭, ‬integrating artificial intelligence into defence systems‭, ‬and expanding its digital footprint globally to compete with US influence‭. ‬Despite the differences‭, ‬all these models share a core objective‭: ‬breaking technological dependence and developing independent digital ecosystems resilient to geopolitical pressure and technological blackmail‭.‬

Key Military Contributions to Digital Sovereignty

1‭. ‬Enhancing Cyber Defence Capabilities‭:‬‭ ‬Modern cyber defence is no longer reactive‭. ‬It has evolved into a proactive discipline involving early threat detection‭, ‬rapid‭ ‬response mechanisms‭, ‬and crisis management frameworks aimed at protecting critical digital infrastructure‭. ‬Militaries are investing in early warning systems and adaptive cyber-response strategies to ensure the continuous flow of sensitive civilian and military data‭. ‬In France‭, ‬the National Cybersecurity Agency‭ (‬ANSSI‭) ‬provides a broad defensive shield that extends beyond military applications to protect vital national sectors‭, ‬underscoring cybersecurity as an integral part of national defence‭.‬

2‭. ‬Developing Offensive Cyber Capabilities‭:‬‭ ‬Digital sovereignty is not just about defence‭. ‬Strategic deterrence increasingly hinges on offensive cyber capabilities‭. ‬These‭ ‬enable militaries to respond to cyberattacks swiftly‭, ‬proportionately‭, ‬and‭, ‬when necessary‭, ‬pre-emptively‭. ‬Known as‭ ‬“active deterrence‭,‬”‭ ‬this approach demonstrates the ability to retaliate and neutralise threats before they escalate‭. ‬Many armed forces now conduct‭ ‬advanced cyber warfare simulations to refine offensive tactics and develop new countermeasures‭.‬

3‭. ‬Investing in National Software and Encryption‭: ‬Dependence on foreign software exposes national defence systems to security breaches and potential surveillance‭. ‬Therefore‭, ‬many‭ ‬militaries are investing in sovereign software solutions tailored to their unique cyber needs‭. ‬These include secure network management tools‭, ‬command and control platforms‭, ‬and encryption algorithms specifically designed to protect classified military data‭, ‬even under advanced cyber assault‭.‬

4‭. ‬Establishing Data Sovereignty‭: ‬As cloud computing and AI become increasingly prevalent‭, ‬data sovereignty has emerged as a crucial element of digital sovereignty‭. ‬This concept involves ensuring that all data generated within national borders remains subject to local laws and ethical standards‭. ‬It also includes enforcing algorithmic transparency and privacy regulations to protect the integrity and autonomy of digital systems‭.‬

5‭. ‬Building Strategic Public-Private Partnerships‭:‬‭ ‬Given the fast pace of technological innovation and the growing complexity of cyber threats‭, ‬no military can operate in isolation‭. ‬Cooperation with the private sector is essential for maintaining operational superiority in the digital domain‭. ‬Strategic partnerships with leading tech firms and private research institutions help militaries access cutting-edge solutions‭. ‬For instance‭, ‬the French military collaborates with Whaller to develop secure communication platforms free from foreign surveillance and vulnerabilities‭.‬

Challenges to Achieving Digital Sovereignty

1‭. ‬Technological Dependence‭: ‬Reliance on foreign technology remains one of the most pressing challenges to digital sovereignty‭. ‬Many national defence infrastructures still depend on external providers for software‭, ‬data analysis tools‭, ‬and cloud services‭, ‬leaving them exposed to geopolitical risks‭, ‬espionage‭, ‬and cyber extortion‭. ‬European militaries‭’ ‬widespread use of Microsoft products illustrates this vulnerability‭. ‬These risks were heightened during the administration of former US President Donald Trump‭, ‬whose policies raised concerns over transnational digital dependencies‭.‬

2‭. ‬Legal and Political Complexities‭: ‬Cyber warfare operates in a grey zone of international law‭. ‬Determining the source of a cyberattack‭ (‬the attribution problem‭) ‬is‭ ‬notoriously difficult‭, ‬making it challenging to develop appropriate responses‭. ‬The lack of clear legal frameworks complicates the development of effective deterrent policies and makes it difficult to hold actors accountable‭. ‬Political instability further‭ ‬undermines the resilience of cyber infrastructure‭.‬

3‭. ‬High Costs and Technical Complexity‭: ‬Building sovereign cyber ecosystems demands significant financial and human resources‭, ‬as well as advanced technological expertise‭. ‬The technical complexity of developing secure‭, ‬resilient systems capable of withstanding sophisticated cyber threats poses an additional hurdle‭. ‬Striking the right balance between operational efficiency and technological independence is particularly challenging in conventional military environments‭.‬

Conclusion‭: ‬Towards a Sovereign Digital Future

Digital sovereignty is no longer a luxury—it is a strategic imperative for any nation seeking to preserve its autonomy in a rapidly evolving digital landscape‭. ‬Armed forces play a central role in this effort‭, ‬from strengthening cyber defences and building offensive capabilities to forging strategic partnerships and developing independent technological ecosystems‭.‬

While the road to digital sovereignty is fraught with challenges‭, ‬it remains the only viable path to securing national interests‭ ‬in the face of increasingly complex and multi-dimensional cyber threats‭. ‬Going forward‭, ‬militaries are expected to expand their‭ ‬role by investing in sovereign artificial intelligence applications‭, ‬advancing quantum technologies for cybersecurity‭, ‬and contributing to international efforts to establish legal norms for conduct in cyberspace‭.‬

In an age where bytes are as powerful as bullets‭, ‬the battle for sovereignty will be won not just on land‭, ‬sea‭, ‬or air‭, ‬but in the silent‭, ‬shadowy world of cyberspace‭.‬

By‭: ‬Professor Wael Saleh‭ ‬–‭ ‬‭(‬Expert at Trends Research and Advisory Center‭)‬

Youtube
WhatsApp
Al Jundi

Please use portrait mode to get the best view.