Weaponization of data: the role of data in modern warfare

Authors

  • Dorcus Phanice OLASYA Department of Diplomacy and International Studies, University of Nairobi
  • Anita KIAMBA Department of Diplomacy and International Studies, University of Nairobi

DOI:

https://doi.org/10.53477/2284-9378-25-06

Keywords:

data, warfare, cyber war, battlefield, military.

Abstract

The 21st century is swamped with innumerable technologies distributed across different fields. Consequently, loads of data is being generated, transforming it into a tactical forte. Using appropriate tools and procedures, data can be appraised to generate enhanced insights into facts vital in decision-making for governments and businesses alike. However, despite its significance in strategic security, little attention has been paid to this concept. Accordingly, this article analyses ways in which data has influenced modern warfare and ways in which its potential misuse can be mitigated upon. Specifically, it highlights the aspect of power dissemination abetted by data availability, its influence in military strategies and procedures, and the role it plays in tactical intelligence and surveillance as well as military decision-making. The study adopts a qualitative and analytical research design as it comes with fewer ethical considerations. Secondary data is gathered from existing records, journals, reports, internet sources, policy papers, presented papers and books. Using the case study of Russia and Ukraine, the findings indicate that data has been transformative in present-day conflicts. Through open source data, actionable intelligence has been realized. Further, technologies such as remote sensing have been valuable to tactical intelligence, while the documentation of war crimes provided situational awareness in Ukraine as well. For ethical purposes, therefore, the use of data in the battlefield calls for sufficient regulations to oversee its use. This will also ensure caution during its deployment for the preservation of human rights as stipulated in the International Humanitarian Law.

Author Biography

Dorcus Phanice OLASYA, Department of Diplomacy and International Studies, University of Nairobi

Ms. Dorcus Phanice Olasya is a PhD student at the University of Nairobi, Department of Diplomacy and International Studies, pursuing a Doctor of Philosophy in International Studies. Ms.Olasya is also a Cyber Security Specialist with over 10 years of experience in the Cyber Security arena. She has hands on experience in Vulnerability Assessment and Penetration Testing of critical infrastructure that include OT, Mobile device security, Information Security policies, Social Engineering techniques, Cyber Security awareness and capacity building. With her experience, Ms.Olasya desires to grow her skills in Cyber Policy focusing on how societies can manage emerging cyber risks in view of the dynamics related to technology.

References

Allen, Capt T S. 2020. “Finding the Enemy on the Data-Swept Battlefield of 2035.” MilitaryReview 28: 28–37.

Apostolicas, Paul. 2019. “Silicon states.” Harvard International Review 40 (4): 18–21. https:// www.jstor.org/stable/26917261.

Army Technology. 2023. “How Data Became the New Frontier in Modern Warfare.” https:// www.army-technology.com/sponsored/how-data-became-the-new-frontier-inmodern- warfare/.

Bergengruen, Vera. 2024. “Tech Companies Turned Ukraine Into an AI War Lab.” Time. https://time.com/6691662/ai-ukraine-war-palantir/.

Davenport, Thomas, and Laurence Prusak. 1998. Working Knowledge: How Organizations Manage What They Know. Ubiquity. Vol. 1. https://doi.org/10.1145/348772.348775.

Dawson, Jessica, and Katie E Matthew. 2024. “Data as Ammunition–A New Framework for Information Warfare.” The Cyber Defense Review 9 (2): 93–108.

Duarte, Fabio. 2024. “Amount of Data Created Daily (2024).” Exploding Topics. https://explodingtopics.com/blog/data-generated-per-day.

Farivar, Masood. 2023. “FBI Warns About China Theft of US AI Technology.” Voice of America ( VOA). https://www.voanews.com/a/fbi-warns-about-china-theft-of-us-aitechnology/7202760.html.

Farnell, Richard, and Coffey Kira. 2024. “AI’s New Frontier in War Planning: How AI Agents Can Revolutionize Military Decision-Making .” The Belfer Center for Science and International Affairs. https://www.belfercenter.org/research-analysis/ais-newfrontier- war-planning-how-ai-agents-can-revolutionize-military-decision.

Favaro, Marina, and Heather Williams. 2023. “False Sense of Supremacy: Emerging Technologies, the War in Ukraine, and the Risk of Nuclear Escalation.” Journal for Peace and Nuclear Disarmament 6 (1): 28–46. https://doi.org/10.1080/25751654.2023.2219437.

Fortuin, Egbert. 2022. “‘Ukraine Commits Genocide on Russians’: The Term ‘Genocide’ in Russian Propaganda.” Russian Linguistics 46 (3): 313–47. https://doi.org/10.1007/s11185-022-09258-5.

Geissler, Dominique, Dominik Bär, Nicolas Pröllochs, and Stefan Feuerriegel. 2023. “Russian Propaganda on Social Media during the 2022 Invasion of Ukraine.” EPJ Data Sci. 12 (1). https://doi.org/10.1140/epjds/s13688-023-00414-5.

Gragido, Will, and John Pirc. 2011. “6 - State-Sponsored Intelligence.” In Cybercrime and Espionage, edited by Will Gragido and John Pirc, 81–114. Boston: Syngress. https:// doi.org/https://doi.org/10.1016/B978-1-59749-613-1.00006-6.

Griffiths, Charles. 2024. “The Latest Cyber Crime Statistics (Updated July 2024).” AAG IT Support. https://aag-it.com/the-latest-cyber-crime-statistics/.

Gu, Hongfei. 2023. “Data, Big Tech, and the New Concept of Sovereignty.” Journal of Chinese Political Science. https://doi.org/10.1007/s11366-023-09855-1.

Hammond-Errey, Miah. 2022. “Big Data and National Security: A Guide for Australian Policymakers.” Sydney: Lowly Institute. https://www.lowyinstitute.org/publications/big-data-national-security-guide-australian-policymakers.

Haraburda, Scott S. 2019. “Benefits and Pitfalls of Data-Based Military Decisionmaking.” Small Wars Journal. https://smallwarsjournal.com/jrnl/art/benefits-and-pitfalls-databased-military-decisionmaking.

Herian, Robert. 2021. Data: New Trajectories in Law. 1st edition. Routledge. https://doi.org/10.4324/9781003162001.

Hotho, Andreas, Rasmus Ulslev Pedersen, and Michael Wurst. 2010. “Ubiquitous Data” In”Ubiquitous Knowledge Discovery: Challenges, Techniques, Applications.” edited by Michael May and Lorenza Saitta, 61–74. Berlin: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-16392-0_4.

Human Rights Watch. 2019. “China’s Algorithms of Repression.” https://www.hrw.org/sites/default/files/report_pdf/china0519_web.pdf.

Jang, Simon. 2023. “The Role of Data Collection and Big Data in Military War Planning. ”| CISS AL Big Data | Medium. https://medium.com/ciss-al-big-data/data-is-constantlygenerated-a-collected-in-the-modern-era-by-everything-3738f0d8ac10.

Katz, Brian. 2020. “The Collection Edge.” Center for Strategic and International Studies(CSIS). http://www.jstor.org/stable/resrep25236.

Khoirunnisa, Khoirunnisa, and Cristy Sugiati. 2024. “Cyber Warfare Strategies in the Russia-Ukraine Conflict (2021-2022): Implications for National Security and Modern Warfare.” Journal Public Policy 10 (2): 138–45.

King, Anthony. 2024. “Digital Targeting: Artificial Intelligence, Data, and Military Intelligence.” Journal of Global Security Studies 9 (2): ogae009. https://doi.org/10.1093/jogss/ogae009.

Kofman, Michael, Anya Fink, Dmitry Gorenburg, Mary Chesnut, Jeffrey Edmonds, Julian Waller, Kasey Stricklin, and Samuel Bendett. 2021. “Russian Military Strategy: Core Tenets and Operational Concepts.”

Kramer, David J. 2015. “The Ukraine invasion: One Year Later.” World Affairs 177 (6): 9–16.http://www.jstor.org/stable/43555264.

Landon-Murray, Michael. 2016. “Big Data and Intelligence.” Journal of Strategic Security 9 (2): 92–121. http://www.jstor.org/stable/26466778.

Mandić, Josip, and Darijo Klarić. 2023. “Case Study of the Russian Disinformation Campaign during the War in Ukraine – Propaganda Narratives, Goals, and Impacts.”

National Security and the Future 24 (2): 97–140. https://doi.org/10.37458/NSTF.24.2.5.

Manning, Robert A. 2020. “Emerging Technologies: New Challenges to Global Stability .”https://www.internetworldstats.com/stats.htm.

Marr, Bernard. 2016. Big Data in Practice: How 45 Successful Companies Used Big Data Analytics to Deliver Extraordinary Results. John Wiley & Sons.

McCormick, H. David, and J. Matthew Slaughter. 2021. “Data Is Power.” Foreign Affairs. https://www.foreignaffairs.com/articles/united-states/2021-04-16/data-power-newrules-digital-age.

Mcwilliams, Timothy S, and Nicholas J Schlosser. 2004. “U.S. Marines in Battle: Fallujah.” Marine Corps University.

Michael, David. 2017. “What and Where Is My ‘Data’?” GPSolo 34 (2): 46–49. http://www.jstor.org/stable/26425848.

Mone, Varda, Sadikov Maksudboy Abdulajonovich, Ammar Younas, and Sailaja Petikam. 2024a. “Data Warfare and Creating a Global Legal and Regulatory Landscape: Challenges and Solutions.” International Journal of Legal Information, 1–11.

___. 2024b. “Global Legal and Regulatory Landscape: Challenges and Solutions.” International Journal of Legal Information, 1–11. https://doi.org/DOI: 10.1017/jli.2024.22.

Motupalli, Venkat. 2017. “How big data is changing democracy.” Journal of International Affairs 71 (1): 71–80. https://www.jstor.org/stable/26494364.

Mysyshyn, Anna. 2024. “Advanced Technologies in the War in Ukraine: Risks for Democracy and Human Rights.” The German Marshall Fund.

Nwanga, Mathew E., Elizabeth N. Onwuka, A.M. Albinu, and O.C. Ubadike. 2014. “Leveraging Big Data in Enhancing National Security in Nigeria.” International Journal of Knowledge, Innovation and Entrepreneurship 2 (2): 66–80.

Nye, Joseph S. 1990. “Soft Power.” Foreign Policy, no. 80 (March): 153–71. https://doi.org/10.2307/1148580.

___. 2023. “Soft Power” In “Soft Power and Great-Power Competition: Shifting Sands in the Balance of Power Between the United States and China.”, edited by Joseph S Nye, 3–15. Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-99-0714-4_1.

Offiong, E, Eke Nta, and Inyang Etim Bassey. 2021. “The Role of Information Technology in Enhancing National Security in Nigeria (2001-2020).” Pinisi Journal of Art, Humanityand Social Studies 1 (1): 44–53.

Poland, Corrie. 2018. “NATO Focuses on Big Data and Artificial Intelligence.” Energy, Installations, and Environment. https://www.safie.hq.af.mil/News/Article-Display/Article/1548241/nato-focuses-on-big-data-and-artificial-intelligence/.

Porche, Isaac R, Bradley Wilson, Erin-Elizabeth Johnson, Shane Tierney, and Evan Saltzman. 2014. “Big Data:” In Data Flood, 1–6. Helping the Navy Address the Rising Tide of Sensor Information. RAND Corporation. http://www.jstor.org/ stable/10.7249/j.ctt6wq8rr.9.

RadioFreeEurope/RadioLiberty [RFE/RL]. 2020. “Putin Bans Armed Forces Members From Carrying Electronic Devices, Gadgets.” https://www.rferl.org/a/putin-bansarmed-forces-members-from-carrying-electronic-devices-gadgets/30598888.html.

Räsänen, Minna, and James M Nyce. 2013. “The Raw Is Cooked: Data in Intelligence Practice.” Science, Technology, & Human Values 38 (5): 655–77. http://www.jstor.org/stable/23474819.

Reilly, Brant C. 2015. “Doing More with More.” American Intelligence Journal 32 (1): 18–24. http://www.jstor.org/stable/26202099.

Rettore, Paulo H L, Philipp Zißner, Mohammed Alkhowaiter, Cliff Zou, and Peter Sevenich. 2023. “Military Data Space: Challenges, Opportunities, and Use Cases.”

IEEE Communications Magazine-Series Military Communications and Networks.https://tinyurl.com/semdam.

Reuters. 2023. “Chinese Hackers Attacked Kenya State Agencies.” The EastAfrican. https:// www.theeastafrican.co.ke/tea/news/east-africa/chinese-hackers-attack-kenyagovernment-4245006.

Romine, B Harl. 1994. “Intelligence data for tactical commanders.” American Intelligence Journal 15 (1): 30–38. http://www.jstor.org/stable/44326486.

Sacks, Samm, and Justin Sherman. 2019. “Defining Data Governance.” Global Data Governance. Concepts, Obstacles, and Prospects. New America. http://www.jstor.org/stable/resrep19968.4.

Shafy Ramadhan, Muhammad Damar. 2023. “The decision to invade: an internal perspective to the russian invasion of Ukraine.” Global: Jurnal Politik Internasional 25(2): 29–53. https://doi.org/10.7454/global.v25i2.1283.

Sharma, Ritu. 2023. “Ukraine-Russia War ‘Attracts’ Tech Firms Keen To Gather ‘Invaluable’Battlefield Data & Build Future Warfare Tech.” Eurasian Times. https://www.eurasiantimes.com/new-invaluable-data-tech-firms-want-a-piece-of-ukraines/.

Shewale, Rohit. 2024. “Google Search Statistics 2024 (Most Searches & Trends).” Demandsage. https://www.demandsage.com/google-search-statistics/.

Śliwa, Zdzisław. 2022. “The Synergy between Technology and Soldiers in Warfare: The Russian Armed Forces Image during the War in Ukraine.” Wiedza Obronna .

The White House. 2024. “Bilateral Security Agreement Between the United States of America and Ukraine.” 2024. https://www.whitehouse.gov/briefing-room/statementsreleases/2024/06/13/bilateral-security-agreement-between-the-united-states-ofamerica-and-ukraine/.

Treiblmaier, Alexander. 2022. “Improving Efficiency Through Data-Driven Decision-Making In A Military Environment - .” TDHJ. https://tdhj.org/blog/post/data-drivendecision-making-military/.

Tucker, Patrick. 2020. “Russian Arms Production Slowed by Coronavirus, Analysts Find.” Defense One. https://www.defenseone.com/technology/2020/05/russian-armsproduction-slowed-coronavirus-analysts-find/165071/.

Ülgen, Sinan. 2016. “Data flows.” Governing cyberspace. A Road Map for Transatlantic Leadership. Carnegie Endowment for International Peace. http://www.jstor.org/stable/resrep26924.8.

Wang, Huiyao, and Joseph S Nye. 2022. “Power Shifts in the Twenty-First Century” In“Understanding Globalization, Global Gaps, and Power Shifts in the 21st Century:CCG Global Dialogues.” edited by Huiyao Wang and Lu Miao, 131–45. Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-19-3846-7_8.

Wilbik, Anna. 2024. “The Real Value of Data: A Matter of Fusion and Diffusion.”

Zabala-López, Alexandra, Mario Linares-Vásquez, Sonia Haiduc, and Yezid Donoso. 2024. “A Survey of Data-Centric Technologies Supporting Decision-Making before Deploying Military Assets.” Defence Technology. https://doi.org/10.1016/j.dt.2024.07.012.

Downloads

Published

2025-04-03

How to Cite

OLASYA, D. P. ., & KIAMBA, A. . (2025). Weaponization of data: the role of data in modern warfare. BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY, 14(1), 90–107. https://doi.org/10.53477/2284-9378-25-06

Issue

Section

Articles