Ensuring digital sovereignty represents a critical challenge for modern military organisations, particularly as they increasingly rely on artificial intelligence to bolster cyber security. Clara Maathuis of the Open University of the Netherlands and Kasper Cools from the Royal Military Academy, Belgium, and Vrije Universiteit Brussel, Belgium, and their colleagues propose a new framework to define and assess control over data and AI models used in military cybersecurity. This multi-faceted approach addresses the need to protect sensitive defence assets from evolving threats, such as unauthorised access and supply-chain attacks, while simultaneously preserving operational autonomy, assuring security and safety, and fostering ethical compliance. By integrating strategic, legal, and interoperability considerations with a detailed analysis of real-world incidents, the researchers present a practical and resilient framework designed to enhance control over critical digital assets in an increasingly complex landscape.
Numerous academics are contributing to this field, exploring topics ranging from cyber espionage to the protection of unmanned systems and critical infrastructure. These studies consistently highlight the growing need for robust security measures and greater control over data and AI technologies, especially within military contexts. Investigations into cyber warfare and espionage reveal increasingly sophisticated state-sponsored campaigns, demanding advanced defensive strategies.
Researchers are also examining the vulnerabilities of unmanned aerial vehicles and the importance of securing data supply chains, particularly during times of conflict. These studies emphasize the need for proactive measures to protect critical assets and maintain operational resilience. Several studies focus on the concept of digital sovereignty, exploring its meaning, evolution, and practical application within the military domain. This research identifies key data artefacts used in developing and training AI systems for cybersecurity, establishing a foundational understanding of data sovereignty requirements.
The work highlights the importance of asserting and maintaining control over these data assets, reflecting the intersection of AI, cybersecurity, military operations, and policy studies. Investigations into the conflict in Ukraine provide valuable insights into the challenges and imperatives of maintaining sovereignty over digital infrastructures, data, and AI models under conditions of active geopolitical confrontation. Researchers emphasize the need for operational autonomy, security, and ethical alignment in the face of increasingly sophisticated cyberattacks. These studies collectively contribute to a growing body of knowledge aimed at strengthening cybersecurity and promoting digital sovereignty in an increasingly complex world.
Military AI Cybersecurity, Framework Definition and Assessment
This research pioneers a multi-faceted framework to define and assess digital sovereign control of data and AI-based models specifically for military cybersecurity applications. The study employs a design-oriented research approach, merging systematic literature review with critical analysis of real-world field incidents to ensure both the effectiveness and realism of the proposed framework. This methodology directly addresses the increasing need for military organizations to establish digital sovereignty, particularly given their growing investment in AI-driven cyber security solutions. At the core of this work lies a dual methodological strategy, beginning with a systematic literature review to identify and analyse existing datasets used in military AI-based cyber security.
This review provides a concrete understanding of the empirical resources powering these AI systems, grounding the framework in practical data practices. Simultaneously, the team conducted an extensive literature review examining the meaning, evolution, and implications of digital sovereignty across various domains, with a specific focus on its military applications. This dual approach ensures the framework is both conceptually robust and anchored in real-world data usage. To demonstrate the framework’s applicability, researchers present a detailed use case focused on cyber operations and efforts related to the ongoing war in Ukraine.
This case study provides critical insights into the challenges, dynamics, and imperatives of maintaining sovereignty over digital infrastructures, data, and AI models under conditions of active geopolitical confrontation. The selection of this specific conflict allows for a nuanced examination of sovereignty in a high-stakes, rapidly evolving environment. This research represents, to the best of the team’s knowledge, the first comprehensive effort to design a framework for digital sovereign control in this critical domain.
Military AI Data Artefacts for Cyber Control
This research delivers a comprehensive framework for Digital Sovereign Control, specifically designed for military AI-based cyber security systems, addressing a critical gap in existing literature. The study began with a Systematic Literature Review, meticulously identifying and categorizing datasets essential for developing and training AI systems in military cyber contexts. This initial phase examined a large number of articles across key databases, ultimately resulting in the in-depth analysis of a significant subset of relevant publications. The research pinpointed key data artefacts used in areas such as cyber defence, cyber warfare, blockchain analysis, social media intelligence, agent-based modelling, and specialized training corpora, establishing a foundational understanding of data sovereignty requirements.
Building upon this empirical groundwork, the team conducted an extensive review of digital sovereignty itself, examining theoretical frameworks, conceptual models, relevant doctrines, and technological enablers. This second phase focused on establishing the core elements for designing a Digital Sovereignty Control framework within the military domain. The work highlights the importance of asserting and maintaining control over these identified data artefacts, reflecting the intersection of AI, cyber security, military operations, and policy studies. The framework developed addresses the multidimensional challenges of sovereignty in this field, offering a tangible approach to managing modern military operations, cybersecurity, data management, and AI governance within the defense sector. This research provides a crucial advancement in ensuring control over critical digital assets and preserving operational autonomy in an increasingly complex threat landscape.
Sovereign Control of Defence Data and AI
This research presents a multi-angled framework designed to define and assess digital sovereign control over data and AI-based models used in military cybersecurity. The framework considers context, autonomy, stakeholder involvement, and risk mitigation as key elements in protecting sensitive defence assets from threats like unauthorized access and supply-chain attacks. Its layered architecture provides a comprehensive structure for establishing, assessing, and maintaining verifiable sovereign control over critical digital assets and AI-driven processes. The framework’s applicability is underscored by its relevance to current geopolitical events, specifically the cyber threats observed during the conflict in Ukraine.
Researchers emphasize the importance of maintaining operational autonomy, security, and ethical alignment in the face of increasingly sophisticated cyberattacks. While the framework offers a robust approach to digital sovereignty, the authors acknowledge the need for further empirical validation through pilot studies and real-world applications to refine assessment metrics. Future work should also focus on developing standardized protocols and collaborative frameworks to balance national interests with the need for interoperability among allied forces.
👉 More information
🗞 Digital Sovereignty Control Framework for Military AI-based Cyber Security
🧠 ArXiv: https://arxiv.org/abs/2509.13072
