<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JOBS</journal-id>
      <journal-title-group>
        <journal-title>Journal on Baltic Security</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2382-9230</issn>
      <issn pub-type="ppub">2382-9222</issn>
      <publisher>
        <publisher-name>BDC</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JOBS-8-2-JOBS-2022-0013</article-id>
      <article-id pub-id-type="doi">10.57767/jobs_2022_0013</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Resilience and Resistance in the Digital Age: Revisiting the Threshold Effect in Total Defence</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Berg</surname>
            <given-names>Elin</given-names>
          </name>
          <xref ref-type="aff" rid="j_JOBS_aff_000"/>
        </contrib>
        <aff id="j_JOBS_aff_000">Department of War Studies and Military History - Swedish Defence University.</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Pettersson</surname>
            <given-names>Ulrica</given-names>
          </name>
          <email xlink:href="mailto:ulrica.pettersson@fhs.se">ulrica.pettersson@fhs.se</email>
          <xref ref-type="aff" rid="j_JOBS_aff_001"/>
          <xref ref-type="corresp" rid="cor2">∗∗</xref>
        </contrib>
        <aff id="j_JOBS_aff_001">Centre of Special Operations Research - Swedish Defence University</aff>
      </contrib-group>
      <author-notes>
        <corresp id="cor2"><label>∗∗</label>Corresponding author.</corresp>
      </author-notes>
      <volume>8</volume>
      <issue>2</issue>
      <fpage>41</fpage>
      <lpage>60</lpage>
      <pub-date pub-type="epub">
        <day>19</day>
        <month>10</month>
        <year>2022</year>
      </pub-date>
      <history>
        <date date-type="received">
          <day>05</day>
          <month>07</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>10</day>
          <month>10</month>
          <year>2022</year>
        </date>
      </history>
      <permissions>
        <copyright-statement>Open Access. ©</copyright-statement>
        <copyright-year>2022</copyright-year>
        <copyright-holder>Ulrica Pettersson and Elin Berg</copyright-holder>
        <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under the Creative Commons Attribution 4.0 International License.</license-p>
        </license>
      </permissions>
      <abstract>
        <p>For several years, the Supreme Commander of the Swedish Armed Forces (SAF), M. Bydén, has acknowledged the significance of digital security threats 
          (Bydén, 2017). Even now, he continues to stress the importance of taking such threats seriously; ‘Sweden is attacked everyday by means that harm our society today and in the more long-term. We are not in a military conflict on and about Swedish territory, but we are in a conflict about the values we want to uphold and interests we want to be handled in a democratic way’ 
          (Dagens Nyheter, 2022).</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>threshold</kwd>
        <kwd>digital battlefield</kwd>
        <kwd>small state</kwd>
        <kwd>resilience</kwd>
      </kwd-group>
    </article-meta>
  </front>
<body>

  <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_000"></xref>

  <title>Introduction</title>
  
  <p>The use of artificial intelligence (AI), disinformation campaigns in social media, and cyberattacks against critical 
    infrastructure are widely acknowledged as significant contemporary security threats 
    (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_048">Weissmann, Nilsson, Palmertz and Thunholm, 2021</xref>). 
    For more than a decade, scholars have emphasised the dangers associated with the use of advanced technologies in warfare, 
    such as the use of semi-autonomous weapons like unmanned aerial vehicles, or more as of late, increasingly sophisticated 
    technologies, i.e., autonomous weapons systems 
    (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_054">Završnik, 2016</xref>;
      <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_025">Johansson, 2018</xref>).
  </p>

  <p>
  Within the multi-domain-battlefield (MDB), traditional land, air, and sea domains extend to encompass space and cyber as well 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_049">Wilson, 2018</xref>), 
  which make contemporary global conflicts and warfare highly affected by both soft power and technological capabilities 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_047">Warren, 2014</xref>). 
  Academics, private sector actors, and defence practitioners overwhelmingly agree that social media and everyday digital technologies, 
  meaning any electronic equipment, applications, or platforms that communicate, process, and store data 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_020">Hirblinger, 2020</xref>), 
  similarly transform the battlefield in such a fashion that either promote or seriously obstruct peace and democracy 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_022">Hoskins et al., 2020</xref>). 
  Bērziņš (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_004">2020</xref>) 
  convincingly argued that Russia was moving to conduct primarily sub-threshold warfare, and although the recent war 
  in Ukraine has been conventional to a great extent, the war is indicative of the wide range of capabilities at the disposal 
  of the warring parties, sometimes from stemming from rather unexpected sources.
</p>

<p>
  The previous distinction and dichotomy between <italic>defence</italic> and <italic>offense</italic> increasingly converges in three-dimensional ways, 
  with an expanding grey zone that transforms warfare and broadens the category of actors engaged. As mentioned, 
  this dynamic has been visible in Ukraine, where private actors play important roles in supporting Ukraine’s 
  defensive efforts against Russia, e.g., through securing internet access via Starlink 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_033">Miller et. al, 2022</xref>) 
  or proving that war crimes take place through satellite imagery 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_019">Hern, 2022</xref>). 
  Digital technologies alter the traditionally embodied nature of warfare, which makes way for non-conventional, 
  algorithmically advanced, and detached ways of harming an opponent 
  (for example <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_042">Thiele, 2016</xref>;
  <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_034">Nakasone and Lewis, 2017</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_003">Atkinson, 2018</xref>). 
  Apart from quotidian technologies that have been harnessed as tools of resistance in war, 
  the same technologies also enable hostile activities that target the population of the adversary. 
  As the online/offline and defence/offense dichotomies blur, so does war and peace, which means that military and civilian 
  actors must navigate challenges that seriously threaten national security and societal resilience against outside 
  interference in the digital sphere.
</p>

<p>  
  Current security debates, particularly in the Baltic Sea region, emphasize the whole-of-society approach to counter new threats, 
  and some governments have (re)introduced total defence models 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_011">Fiala and Pettersson, 2020</xref>), 
  wherein both military and civilian institutions, as well as individuals, play important parts 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_052">Wither, 2020</xref>). 
  A related body of research also emphasizes the importance of resistance and resilience in the contemporary security landscape 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_030">Maskaliūnaitė, 2021</xref>). 
  However, it remains somewhat unclear what are the implications digital technology and a broadened security agenda for 
  military organizations, as well as other governmental agencies or actors that co-constitute total defence. 
  In this article, we elucidate and clarify to how digital security threats influence and problematize traditional understandings 
  of conflict escalation. Sweden will act as the example of the ways in which small states can approach the issue of 
  addressing and countering digital threats. We begin by posing the rhetorical and somewhat provoking question: 
  Is there a point (a digital threshold) where attacks in the digital space are so severe and serious that the attacked 
  state could be considered to be at war despite the fact that no conventional kinetic activities yet have occurred?
</p>

  <title>Digital Battlefields</title>
<p>
 Against the backdrop of the coronavirus crisis, online activities and technological developments reached record high levels 
 in 2020 across the globe 
 (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_028">Kemp, 2020</xref>). Globally, populations connect online more than ever before, 
 and the cyber dimension of the MDB has grown unexpectedly quickly. In the beginning of this new wave of digitalization, 
 international organizations, such as United Nations Institute for Training and Research (UNITAR), warned how violent extremist 
 groups may instrumentalise the issue of COVID-19 in online spaces 
 (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_045">2020</xref>). 
 Additionally, Hagström and Gustafsson outlined how state actors, through politicians and other representatives, 
 conduct information warfare through the use of different narratives on the pandemic and the COVID-19 virus as part of greater 
 state competition 
 (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_017">2021</xref>).
</p>

<p>  
 Despite an awareness that security threats and conflict have taken this online turn, 
 investments in traditional military capabilities have grown exponentially. Across the globe, defence budgets 
 have drastically increased in the last couple of years, with financial resources being overwhelmingly allocated 
 to the traditional services 
 (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_000">SIPRI, 2020</xref>). 
 However, the current security landscape in Europe indicates a necessity to further address the potential 
 harm of digital security threats, as well as the capabilities to detect and counter them.
</p>


<title>Political, Social and Economic Disruption through Digital Technology</title>

<p>   
In this section, we emphasize the ways in which warfare and threats arise where they do not exceed 
the kinetic threshold of open conflict as outlined in military doctrine. Drawing from the case of Sweden, 
we will illustrate how digital threats can encompass a wide spectrum of targets to disrupt political, social, 
and economic interests of an opponent state. In line with kinetic military operations, attacks may be covert or 
clandestine, and proxies may be used. However, these proxies can be human or not human. For example, an opponent 
or aggressor could use AI-driven bots or make use of servers in other region as to avoid and deny responsibility.
</p>

<p>   
In the spring of 2022, Swedish authorities had to address claims that its social services were kidnapping Muslim children. 
The disinformation campaign went viral, causing mistrust among Muslims in and outside of Sweden 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_038">Regeringskansliet, 2022</xref>). 
In the online videos that were disseminated through social media, the Swedish Government was accused of being a 
fascist state where social services place Muslim children in Christian homes with paedophiles and forcing them to 
drink alcohol. Swedish government officials and social services had to come out in force to deny the allegations 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_038">Regeringskansliet, 2022). 
  This case illustrates the danger and subtlety of threats in the digital space, which aim to undermine social cohesion, 
  the legitimacy of governmental agencies, or, as the SAF describes it, ‘the glue that holds us [a population] together’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_015"></xref>Försvarsmakten, 2021</xref>).
</p>

<p>   
When discussing online conflict, one problematic aspect is the increasingly large role of private actors. 
We previously mentioned the ways in which private companies could support resistance and defensive actions, 
most recently visible in the context of Ukraine. However, Frances Haugen, a former Facebook employee and whistle-blower, 
has warned that social media platforms run by Meta, particularly Facebook, have inadequately dealt with online misinformation 
and disinformation, as well as allowed filter bubbles to proliferate on their platform(s). 
Haugen argues that Facebook continuously prioritizes profits over people, and she claims that Meta has directly allowed for 
content that sows ethnic violence in places like Myanmar or Ethiopia 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_001">Akinwotu, 2021</xref>). 
These are but two examples wherein actors have used digital technology and social media to fuel grievances between 
different parties, which may result in persecution of specific groups and even genocide. 
Other examples include state powers supporting anti-establishment actors in other countries’ domestic politics, 
causing disruption or dissent 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_026">Jordan, 2020</xref>). 
An often cited example is the 2016 US presidential elections when bot accounts believed to have ties to Russia spread 
fake news to defame the Democratic Party presidential candidate Hillary Clinton as well as fostered support for 
the Republican representative Donald Trump 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_006">Bovet and Makse, 2019</xref>). 
Similarly, bot accounts and fake accounts spread misinformation and disinformation about the United Kingdom’s 2016 Brexit referendum 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_044">Trithara, 2020</xref>). 
</p>

<p>   
In the summer of 2021 in Sweden, one of the main grocery store chains, COOP, faced a cyber-attack that caused their 
internal systems to collapse, making it impossible for them to charge customers in over 500 of its stores across the country. 
This situation came to a climax during ransomware cyberattack, where the main target was the IT firm Kaseya, based in the United States. 
The hacker group Revil (short for Ransomware Evil), with ties to Russia, is likely responsible for the attack, 
which affected some 200 organizations and companies that use the company’s software 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_043">Tidy, 2021</xref>). 
Although this attack only affected COOP by proxy, this temporary but severe disruption led to enormous amounts of food waste. 
At first glance, this may appear to be a random event – but from a total defence perspective, the attack posed a considerable 
threat to Swedish food security and resilience. Once again, such examples highlight the unexpected ways 
that threats can appear digitally, and the variety of individuals, companies, or institutions that become targets 
in small states and beyond.
</p>

<p>   
There are also more direct and aggressive forms of tactics, such as cyber espionage and terrorism. 
Other examples may include swaggering, which entails the demonstration of military power and capability 
through tactics other than direct kinetic action. This may occur through contentious actions near a country’s border 
or an important military site or the testing of new weapons 
(<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_002">Art, 1980</xref>). 
The linkages to digital technologies might seem 
less evident here; however, one can argue that the use of digital technologies to convey messages during conventional 
battle or crisis belong to this category as well. All the aforementioned threats and tactics fall under the overarching 
definition of grey zone conflict, which we define further and expand upon in the following section. 
</p>  
<title>Defining the Grey Zone</title>
<p>
  As highlighted above, the contemporary generation of warfare occurs in both traditional and new digital domains, 
  where opportunities arise for actors to take advantage of from a substantial geographical distance 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_051">Wirtz, 2017</xref>). 
  In contemporary conflict, ‘Any space available may be engaged, [which] includes traditional and modern media instruments’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_042">Thiele, 2016</xref>). 
  Furthermore, some scholars argue that such technological developments drive conflict and division, 
  since a state border suddenly can be crossed with one computer click 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_027">Kaplan, 2017</xref>). 
  Online, ordinary citizens become potential targets of unlawful surveillance or persuasion campaigns spurred 
  by AI-driven fake accounts in comment sections. Horn, Spencer, and Kiras argue that state and non-state 
  actors use tactics of sabotage in digital spaces actively to 
  ‘… achieve national objectives during those murky periods between peace and outright war’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_021">2021</xref>). 
  Strategic sabotage in digital battlefields can be both covert and clandestine. 
  General Gerasimov markedly identified new weaknesses in the modern state defence and highlighted that 
  ‘the role of non-military means of achieving political and strategic goals has grown, and, in many cases, 
  they have exceeded the power of force of weapons in their effectiveness’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_016">2014</xref>). 
  According to Weissmann et al. 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_000">2021</xref>), 
  the indistinct state where acts of aggression remain below the threshold for conflict or war but with potential 
  for serious negative impact on national or international security constitutes the grey zone.
</p>

<p>   
  In online and offline domains, actions in the grey zone thus share certain characteristics: their hybrid nature, 
  the risks they pose to the military and defence, and their ability to disturb or skew risk analysis 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_051">Wirtz, 2017</xref>). 
  Grey zone conflict may occur between states or non-state actors that lack direct or acknowledged incompatibilities 
  or history of combat 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_026">Jordan, 2021</xref>). 
  Disputes may be subject to de-escalation and escalation, just like a in conventional conflict. 
  This dynamic may be harder to ascertain, as patterns of confrontation are non-linear and sporadic, 
  making it difficult to map the context (battlefield) and actors within it. 
  To the contrary, warfare in the grey zone can also backfire and ‘weaken the military, political, 
  and economic position of the instigator’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_053">Young, 2015</xref>).
</p>

<p>   
  Apart from the examples already mentioned, grey zone threats include economic coercion through trade, 
  cyberattacks on critical infrastructure such as energy systems, aggressive intelligence actions, 
  intimidating military deterrence, or political disruption 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_053">Young, 2015</xref>). 
  Criminal transactions increase with cryptocurrencies, known as digital gold, where the lack of central control or 
  regulation for such currencies, as well as the possibility of doing anonymous payment instalments is useful for 
  states and non-states actors to circumvent embargos or avoid traceability 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_050">Wilson and Howcroft, 2022</xref>). 
  Grey zone competition is not new, and non-military means such as influencing campaigns, trade wars or disinformation, 
  characterized considerable portions of the Cold War 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_023">Hughes, 2020</xref>). 
  However, the digital enablers of grey zone 
  competition transform rapidly, and research, as well as practice related to security and defence, 
  struggle to maintain the same pace.
</p>

<p> 
  Small states around the Baltic Sea, including but not limited to Sweden, Finland, Estonia, Lithuania, 
  and Latvia, have long recognized the Soviet Union and later Russia, as a highly superior opponent regarding conventional warfare 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_011">Fiala and Pettersson, 2020</xref>). 
  With this consideration in mind, these smaller states had to identify other means and strategies to 
  defend their sovereignty, which led to the adoption of deterrence- and resilience-focused models 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_007">Braw, 2021</xref>). 
  Being prepared to pre-empt or resist grey zone threats constitutes important parts of their strategy, 
  culture, and doctrine to this day 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_013">Försvarsmakten, 2016</xref>). 
  However, as mentioned earlier, those early models need to be updated to deal with contemporary digital threats. 
  Scholars and practitioners alike debate whether the grey zone definition still serves a purpose, 
  both epistemologically and operationally 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_031">Mazarr, 2015</xref>;
   <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_000">Brands, 2016</xref>). 
   Other terms like hybrid warfare, competition short of war and competition below armed conflict 
   (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_050">Wirtz, 2017</xref>) 
   serve as attempts to label this same phenomenon. One side of the debate posits that the grey zone 
   definition no longer is useful, as it often describes anything and nothing, making the term an all-catch phrase 
   (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_037">Raine, 2019</xref>). 
   However, setting aside ‘…the question of the term’s appropriateness, grey zone literature is assisting our understanding 
   of rivalry waged below the threshold of armed conflict’ 
   (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_026">Jordan, 2020</xref>). 
   In this article, we therefore use the term grey zone, partly because we find that it properly 
   conveys the expanding field that sits in between the war/peace dichotomy, but also because the grey zone 
   has and continues to play an important role in contemporary security debates. However, given this vivid 
   theoretical and doctrinal debate, challenges arise in terms of common language, definitions, and, consequently, interoperability. 
</p>

 
<title>The Threshold Effect from a Small State Perspective</title>


<p>   
  The SAF Strategic Doctrine defines threshold as that which ensures that 
  ‘…the cost of attack [is] unreasonable for the attacker’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_013">Försvarsmakten, 2016</xref>). 
  When analysing Swedish doctrine from 2016 and 2020, the authors note that both documents mention 
  irregular and subversive activities, but it remains unclear how to achieve a non-kinetic threshold 
  and whether this threshold is important. Following such considerations, it is not clear if the 
  threshold effect takes on a different meaning when it comes to digital attacks, or whether the term is 
  obsolete in these cases. As described in the doctrine, the SAF acts in concert with other agencies and actors in 
  Swedish total defence in ways that deter hostile actions to achieve a threshold effect. In total defence, 
  the military constitutes a threshold against any actor that may attempt to attack or exert pressure on Sweden. 
  Finally, the threshold carries strategic weight through its implied interconnectivity and cooperation with 
  international partners such as the North Atlantic Treaty Organization (NATO) or the European Union (EU) 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_013">Försvarsmakten, 2016</xref>). 
  Two central government agencies in Swedish total defence that belong to the civilian category 
  are the Swedish Civil Contingencies Agency 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_039">SCCA, 2022</xref>) 
  and the recently established Psychological Defence Agency 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_036">PDA, 2022</xref>). 
  However, a search for ‘threshold effect’ [<italic>tröskeleffekt</italic> in Swedish] on their respective websites resulted in no hits. 
  Although different governmental actors cooperate as part of the wider Swedish security sector, 
  our basic web search implies interoperability issues and a lack of common language between civilian 
  and military actors in total defence. If the concept of the threshold is valid only when it comes to 
  a conventional armed (kinetic) attack, this lack of conceptual stretching could explain why civilian actors do not use the term. 
</p>

<p> 
  In contemporary warfare, actors harness digital tools where the distinction between peace 
  and war is blurred at best. An aggressor (a state, a non-state actor, or a proxy) can easily 
  conduct severe aggressive activities in the digital space to threaten another state’s national security 
  and sovereignty long before a conventional military attack takes place, and the conventional threshold, 
  as currently understood, is exceeded. Digital technologies and digital threats therefore also challenge 
  the military doctrinal understanding of the threshold effect. To return to the issue of a potential digital 
  threshold effect, we reiterate that the SAF doctrine from 2016 and 2020 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_013">Försvarsmakten 2016</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_014">2020</xref>) 
  focus solely on the threshold in relation to countering kinetic attacks by potential aggressor(s). 
  The threshold effect as used in the doctrinal context must be adjusted or developed to also include the entirety of 
  today’s MBD, which encompasses cyber and space.
</p>

  <title>Countering Attacks in the Online Grey Zone</title>
<p>
  The different types of digital grey zone threats outlined in this article 
  ‘… pose a conundrum for democratic governments trying to ensure that their societies 
  are resilient [… as] the ability of any democratic country to counter hybrid threats, in large part, 
  depends on the willingness of its citizens to support government policies aimed at combating hybrid actors’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_003">Atkinson, 2018</xref>). 
  This development remains valid for states of varying sizes and across diverse military capabilities 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_042">Thiele, 2016</xref>), 
  although we have focused on small states like Sweden for the current study. 
  The use of digital technologies to undermine an adversary and its legitimacy might make a given society 
  less resilient and resistant to potential future military aggression. By dividing and polarising an adversary’s population, 
  the resilience and social cohesion may suffer as a result. This can happen as part of preparation for the use of direct force, 
  which was visible in the Russian annexation of Crimea and in its recent military invasion of Ukraine. 
  However, territorial control is no longer always an end state in contemporary conflicts, 
  and we must therefore consider new ways to think about a non-kinetic threshold effect. 
  The new wave of digitalisation triggered partially by COVID-19 highlights the urgency of perspectives that take this 
  changing nature of defence and warfare seriously.
</p>

<p>   
  Military actors are aware of the new threats they face in the digital age and that they must understand and 
  assess social media as well as other digital environments. Returning to the case of Sweden since 2020, 
  the SAF collaborates with the Royal Institute of Technology (KTH) in the training of cyber soldiers. Currently, 
  this is Sweden’s only centre for cyber soldier conscripts. However, the centre engages 
  in cutting-edge research with the needs of the SAF at its fore as part of a broader effort to prepare and render Sweden’s 
  cyber defence and security stronger 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_000">Centre for Cyber Defence and Information Security, 2021</xref>; 
  <xref ref-type="bibr" rid="j_jobs-2022-0013_ref_012">Försvarsmakten, n.d.</xref>).  
</p>

  <title>Resilience and Resistance to Digital Threats</title>
<p>
  In this article, we have argued for a need to strengthen interoperability and make sure 
  that actors in total defence share a common vocabulary. Additionally, we have, through our examples, 
  pointed to the fact that individuals often become targets of campaigns from adversarial states. Given this fact, 
  we will dedicate a part of this paper to address the necessity to link together debates on the threshold effect to 
  concepts of resilience and resistance as well. 
</p>

<p>   
  Defining resilience is no easy task, as its meaning and application are fluid and context dependent 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_046">Vasu, 2016</xref>). 
  Both a practical tool and a theoretical concept, it has been used in various social sciences ranging from disaster risk reduction,
  development studies, and military psychology. In a broad sense, resilience is the capability of a given subject 
  (state, individuals, communities, or environment) to effectively respond to an external shock or threat 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_005">Bourbeau, 2013</xref>). 
  In military studies, resilience often describes military personnel’s mental preparedness for warfare operations 
  or other engagements in contexts shaped by uncertainty, complexity, and physically as well as mentally demanding tasks 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_035">Nindl et al., 2018</xref>). 
  Here, we would like to acknowledge this vivid and ever-growing research programme, 
  in which scholars and practitioners have examined how to foster digital, cyber, or informational resilience. 
  Some relevant contributions include but are not limited to resilience in relation to online disinformation 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_024">Humprecht et al, 2020</xref>), 
  information warfare and counter tactics 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_009">Clack and Johnson, 2021</xref>), 
  and information system resilience 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_018">Heeks and Ospina, 2019</xref>). 
  Although there are clear connections between these fields and the topic at hand, it lies beyond the scope of the 
  current article to detail how to build and foster digital resilience. However, future scholarship would however 
  do well to link together debates on the grey zone, threshold effect, and resilience.
</p>

<p>   
  The concept of resilience is closely intertwined with notions of resistance and the ability and will 
  to withstand or recover from external pressure or malign influence 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_041">Stringer and Fiala, 2019</xref>). 
  Resilience is a prerequisite for resistance in the event of military aggression or attempts to 
  defame or delegitimise sovereignty by a foreign state or non-state armed group 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_011">Fiala and Pettersson, 2020</xref>). 
  Resistance, in turn, entails an ‘organized, whole-of-society effort, encompassing the 
  full range of activities from nonviolent to violent, led by a legally established government 
  (potentially exiled/displaced or shadow) to re-establish independence and autonomy within its 
  sovereign territory that has been wholly or partially occupied by a foreign power’ 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_041">Stringer and Fiala, 2019</xref>). 
  A compliant and supportive civilian population undergirds the whole-of-society effort. Consequently, 
  civilians must not only deem intervention and initiatives from the state as legitimate, but they must 
  also be the central actor in resisting any attempt of outside interference or threats 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_011">Fiala and Pettersson, 2020</xref>). 
</p>

<p>   
  The Swedish initiative on cyber soldier conscription marks an attempt to broaden the understanding of 
  current conflict environments. To widen their audience and to strengthen the awareness and consequently 
  resilience to digital threats among Swedish citizens, the SAF also released a YouTube documentary series called 
  <italic>When the War Comes</italic>. 
  The episodes cover different security issues that the country faces, with one episode dedicated to hybrid and gray zone threats. 
  The title refers to the <italic>If Crisis or War Comes</italic> pamphlet that all citizens receive by mail as part of Sweden’s total 
  defence preparations. The aim is to educate and increase awareness of information operations, 
  thereby increasing popular resilience. One notable difference is the emphasis on when as opposed to if here. 
  This could indicate a shifting, broader view on what constitutes war, and the SAF suggest that battle is not 
  only inevitable but also already ongoing 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_012">Försvarsmakten, 2016</xref>). 
  Overall, Sweden has taken a few steps towards further developing an overall preparedness towards digital threats. 
  However, as previously highlighted, discussions on interoperability and definitions in this area must continue. 
  It also remains unclear how well civilians are equipped to navigate digital spaces in which malign actors constantly operate and, 
  as such, potentially constitute a civic and <italic>digital</italic> threshold.
</p>

<p>   
  In 2016, the United States Special Operations Command Europe (SOCEUR) initiated an effort to design a 
  modernised concept of resilience and resistance. SOCEUR collaborated with the Baltic NATO states of Estonia, 
  Latvia, and Lithuania, as well as with other allies and partners around the Baltic Sea in seminars and workshops. 
  The purpose was to take stock of the lessons learned from previous stay-behind organizations during WWII 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_011">Fiala and Pettersson, 2020</xref>). 
  Common efforts between these nations resulted in the articulation of the Resistance Operations Concept (ROC) 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_041">Stringer and Fiala, 2019</xref>). 
  The ROC 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_011">Fiala and Pettersson, 2020</xref>) 
  presents a framework to understand how the process of resilience on a national level may increase through the planning, 
  establishment, and development of national resistance capabilities. The concept nicely aligns with debates on total defence 
  and digital technologies, as it emphasises the necessity of converging military power with civilian counterparts to further 
  enable resilience and resistance.
</p>

<p>   
  In small states like Sweden, resilience is a prerequisite to withstand external shocks and pressures as well 
  as recover from their effects and resist such influences 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_003">Atkinson, 2018</xref>). 
  Building resilience can be a powerful 
  remedy against contemporary and complex security threats 
  (<xref ref-type="bibr" rid="j_jobs-2022-0013_ref_011">Fiala and Pettersson, 2020</xref>) 
  that increasingly play out in a digital ecosystem, which civilians inhabit but also hosts militia groups, 
  states, or civil society actors.
</p>

<p>   
  The SAF narrates that digital technology and technological developments more broadly are not a 
  panacea of military success but can be tools that contribute to oppression and control by adversaries. 
  However, online spaces and digital technologies can also be potential instruments of fostering a sense of 
  community amongst civilians to strengthen domestic resilience and possibly resistance ‘When crisis or war comes’. In turn, 
  resilience needs to be understood as a gradual and continuous process, which occurs spatially both in online and offline. 
  Grey zone threats constantly affect what resilience and defence approaches entail. Therefore, the Armed Forces and 
  their civilian counterparts that together form total defence must conduct ongoing and non-linear analyses to 
  prevent hostile actions from occurring in this grey zone.
</p>

  <title>Conclusion</title>
<p>  
  Digital battlefields and the tactics used within them have been established and developed with significant speed. 
  Digital threats constitute a natural part of today’s warfare and will likely increase in both frequency and intensity 
  in the future. Contemporary technological developments provide a vast palette of tools and opportunities in new hybrid domains. 
  The situation at hand also encompasses new and more diverse actors, which was not imaginable in the era of 
  conventional warfare. Reconnaissance, surveillance, and early warning systems are undergoing rapid 
  transformation and deception and fake news appears to be implemented both clandestine (hidden) and covert (deniable) 
  in digital battlefields.
</p>

<p>   
  In this article, we have outlined some of the challenges that have arisen from these developments from the 
  perspective of a small state. As the Swedish total defence model gradually gets more traction, 
  the Armed Forces increasingly have to rely on their civilian counterparts in deterring aggression to 
  protect Swedish sovereignty. However, it is still somewhat unclear what implications digital technology and 
  a broadened security agenda entail for military organizations and other actors involved in total defence. 
  We have stressed a need for a common vocabulary between these actors to increase interoperability. 
  The ROC argues that nations need to plan for resistance and resilience in peacetime, 
  the grey zone, in war, and under occupation. Military doctrine needs to diverge from the linearity of a 
  traditional conflict scale. At the same time, it is central to realize that technology is not a silver bullet, 
  though online spaces and digital tools can constitute potential vehicles to foster community amongst civilians 
  and as such strengthen resilience.
</p>  

<p>
  We have discussed what threats and attacks in the digital space may entail. We asked the rhetorical and 
  somewhat provoking question: Is there a digital threshold where attacks in the digital space are so severe 
  and serious that the attacked state could be considered to be at war although no conventional kinetic activities 
  yet have occurred? We do not claim that there is a clear answer, however, by posing the question, we managed to 
  highlight how the digital battlefield comes with many layers of complexity that compels nations to reconsider 
  whether terms used for kinetic warfare are fit for the purpose of addressing digital threats. Our aim is that 
  this article opens a debate on the concept of the threshold effect in military doctrine and among total defence actors. 
  The current war in Ukraine has again reminded us that kinetic and non-kinetic tactics meld together in twenty-first 
  century warfare and war in line with the Gerassimov doctrine. Following this development, one must carefully consider 
  the ways in which whole-of-society and total defence models are currently implemented and adjust them according 
  to current trends. Finally, one cannot underestimate the importance of discussions on future defence. The purpose 
  of this article is not to raise advanced empty criticisms but rather to raise salient questions and encourage 
  future research and discussion focusing on digital resilience in order to reach new conclusions for the total 
  defence strategies of the future.
</p>  

</body>


<back>

  <ref-list id="j_jobs-2022-0013">
  <title><lable></lable>Bibliography</title>


<ref id="j_jobs-2022-0013_ref_001">
<mixed-citation publication-type="journal">
<bold>
  <surname>Akinwotu</surname>, <given-names>Emmanuel</given-names>. (<year>2021</year>)
  </bold>
  ‘<article-title>Facebook’s role in Myanmar and Ethiopia under new scrutiny</article-title>’, 
  <italic><source>The Guardian</source></italic>. 
  7 October. 
  Available at: 
  <ext-link xlink:href="https://www.theguardian.com/technology/2021/oct/07/facebooks-role-in-myanmar-and-ethiopia-under-new-scrutiny">
    https://www.theguardian.com/technology/2021/oct/07/facebooks-role-in-myanmar-and-ethiopia-under-new-scrutiny</ext-link>, 
  (Accessed 1 July 2022).
</mixed-citation>
</ref>

<ref id="j_jobs-2022-0013_ref_002">
  <mixed-citation publication-type="book">
  <bold><surname>Art</surname>, <given-names>Robert J.</given-names> (<year>1980</year>) 
</bold>
‘<article-title>To What Ends Military Power?</article-title>’ 
<italic><source>International Security</source></italic>. 
<volume>4</volume> (<issue>4</issue>), pp. <fpage>3</fpage>–<lpage>35</lpage>.
</mixed-citation>
</ref>


<ref id="j_jobs-2022-0013_ref_003">
  <mixed-citation publication-type="journal">
  <bold><surname>Atkinson</surname>, <given-names>Carol</given-names>. (<year>2018</year>)</bold> 
‘<article-title>Hybrid Warfare and Societal Resilience: Implications for Democratic Governance</article-title>’, 
<italic><source>Information and Security: An International Journal</source></italic>, 
<volume>39</volume> (<issue>1</issue>), pp. <fpage>63</fpage>-<lpage>76</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_004">
  <mixed-citation publication-type="journal">
  <bold><surname>Bērziņš</surname>, <given-names>Jānis</given-names>. (<year>2014</year>)</bold> 
‘<article-title>Russia’s New Generation Warfare in Ukraine: Implications for Latvian Defense Policy</article-title>’, 
<publisher-name>National Defence Academy of Latvia, Center for Security and Strategic Research</publisher-name>, 
Policy Paper, no. <issue>2</issue>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_005">
  <mixed-citation publication-type="journal">
  <bold><surname>Bourbeau</surname>, <given-names>Philippe</given-names>. (<year>2013</year>) </bold>
<article-title>Resiliencism: Premises and promises in securitization research. 
  Resilience: International Policies, Discourses and Practices</article-title>. 
Available at: 
<ext-link xlink:href="https://www.academia.edu/4434934/Bourbeau_Philippe_Resiliencism_Premises_and_promises_in_securitization_research_Resilience_International_Policies_Discourses_and_Practices_2013_1_1_4_17_Lead_Article">
  https://www.academia.edu/4434934/Bourbeau_Philippe_Resiliencism_Premises_and_promises_in_securitization_research_Resilience_International_Policies_Discourses_and_Practices_2013_1_1_4_17_Lead_Article
</ext-link>, 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_006">
  <mixed-citation publication-type="journal">
  <bold><surname>Bovet</surname>, <given-names>Alexandre</given-names>, and <surname>Makse</surname>, <given-names>Hernán</given-names> A.
     (<year>2019</year>)</bold> 
‘<article-title>Influence of fake news in Twitter during the 2016 US presidential election</article-title>’, 
<italic><source>Nature communications</source></italic>. 
<volume>10</volume> (<issue>1</issue>), pp. <fpage>7</fpage>–<lpage>14</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_007">
  <mixed-citation publication-type="journal">
  <bold><surname>Braw</surname>, <given-names>Elisabeth</given-names>. (<year>2021</year>)</bold> 
<article-title>Producing Fear in the Enemy’s Mind: How to Adapt Cold War Deterrence for Gray-Zone Aggression</article-title>. 
Research report, <publisher-name>The American Enterprise Institute</publisher-name>, JSTOR, 
Available at: 
<ext-link xlink:href="https://www.jstor.org/stable/resrep30207?seq=1">https://www.jstor.org/stable/resrep30207?seq=1</ext-link>, 
(Accessed: 12 June 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_008">
  <mixed-citation publication-type="journal">
  <bold><surname>Bydén</surname>, <given-names>Micael</given-names>. (<year>2017</year>)</bold> 
<article-title>Förmågor idag och imorgon - Rikskonferensen</article-title>. 
Available at: 
<ext-link xlink:href="https://www.forsvarsmakten.se/sv/aktuellt/2017/01/ob-holl-anforande-pa-folk-forsvars-rikskonferens">
  https://www.forsvarsmakten.se/sv/aktuellt/2017/01/ob-holl-anforande-pa-folk-forsvars-rikskonferens</ext-link> 
(Accessed: 12 May 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_009">
  <mixed-citation publication-type="book">
  <bold><surname>Clack</surname>, <given-names>Timothy</given-names>, and <surname>Johnson</surname>, 
    <given-names>Robert</given-names>. (Eds.) 
    (<year>2021</year>) </bold>
    <italic><source>The World Information War: Western Resilience, Campaigning, and Cognitive Effects</source></italic>. 
    <publisher-loc>Abindon</publisher-loc>, <publisher-loc>Oxon</publisher-loc> and <publisher-loc>New York</publisher-loc>, NY: 
    <publisher-name>Routledge</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_010">
  <mixed-citation publication-type="journal">
  <bold><given-names>Dagens Nyheter</given-names>. (<year>2022</year>)</bold> 
<article-title>ÖB: Sverige angrips varje dag</article-title>. <day>11</day> <month>January</month>. 
Available at: 
<ext-link xlink:href="https://www.dn.se/sverige/ob-sverige-angrips-varje-dag/">
  https://www.dn.se/sverige/ob-sverige-angrips-varje-dag/</ext-link> 
(Accessed: 30 June 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_011">
  <mixed-citation publication-type="journal">
  <bold><surname>Fiala</surname>, <given-names>Otto</given-names>, and <surname>Pettersson</surname>, <given-names>Ulrica</given-names>.
     (<year>2020</year>)</bold> 
‘<article-title>ROC(K) Solid Preparedness: Resistance Operations Concept in the Shadow of Russia</article-title>’, 
<italic><source>Prism</source></italic>. 
<volume>8</volume> (<issue>4</issue>), pp. <fpage>17</fpage>–<lpage>28</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_012">
  <mixed-citation publication-type="journal">
  <bold><given-names>Försvarsmakten </given-names> [<given-names>Swedish Armed Forces</given-names>]. (<year>n.d.</year>)</bold>
 <article-title>Cyberförsvar</article-title>. 
 Available at: 
 <ext-link xlink:href="https://www.forsvarsmakten.se/sv/var-verksamhet/det-har-gor-forsvarsmakten/cyberforsvar">
  https://www.forsvarsmakten.se/sv/var-verksamhet/det-har-gor-forsvarsmakten/cyberforsvar</ext-link> 
 (Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_013">
  <mixed-citation publication-type="book">
  <bold><given-names>Försvarsmakten</given-names> [<given-names>Swedish Armed Forces</given-names>]. 
    (<year>2016</year>)</bold> 
<italic><source>Militärstrategisk doktrin [Stratigic Doctrine] MSD 16</source></italic>, 
<publisher-loc>Stockholm</publisher-loc>: <publisher-name>Swedish Armed Forces</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_014">
  <mixed-citation publication-type="journal">
  <bold><given-names>Försvarsmakten</given-names> [<given-names>Swedish Armed Forces</given-names>]. 
    (<year>2020</year>)</bold> 
<italic><source>Militärstrategisk doktrin [Stratigic Doctrine] MSD 20</source></italic>. 
<publisher-loc>Stockholm</publisher-loc>: <publisher-name>Swedish Armed Forces</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_015">
  <mixed-citation publication-type="journal">
  <bold><given-names>Försvarsmakten</given-names> [<given-names>Swedish Armed Forces</given-names>]. 
    (<year>2021</year>)</bold> 
<article-title>When the war comes, episode 2, ‘The grey area’</article-title>. 
Available at:  
<ext-link xlink:href="https://www.youtube.com/watch?v=1985OMqm1pE">
  https://www.youtube.com/watch?v=1985OMqm1pE</ext-link>, 
(Accessed 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_016">
  <mixed-citation publication-type="journal">
  <bold><surname>Gerasimov</surname>, <given-names>Valeri</given-names>. (<year>2015</year>)</bold> 
Chief of the General Staff of the Russian Federation, 
‘<article-title>Moscow’s Shadows. Analysis and Assessment of Russian Crime and Security</article-title>’, 
Available at: 
<ext-link xlink:href="https://inmoscowshadows.wordprss.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/">
  https://inmoscowshadows.wordprss.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/</ext-link> 
(Accessed: 6 of Feb 2015)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_017">
  <mixed-citation publication-type="journal">
  <bold><surname>Hagström</surname>, <given-names>Linus</given-names>, and <surname>Gustafsson</surname>, <given-names>Karl</given-names>. 
    (<year>2021</year>)</bold> 
‘<article-title>The limitations of strategic narratives: The Sino-American struggle over the meaning of COVID-19</article-title>',
 <italic><source>Contemporary Security Policy</source></italic>.
  <volume>42</volume> (<issue>4</issue>), 
  pp. <fpage>415</fpage>–<lpage>449</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_018">
  <mixed-citation publication-type="journal">
  <bold><surname>Heeks</surname>, <given-names>Richard</given-names>, and <surname>Ospina</surname>,
     <given-names>Angelica</given-names> V. 
    (<year>2019</year>)</bold> 
    ‘<article-title>Conceptualising the link between information systems and resilience: A developing country field study</article-title>’, 
    <italic><source>Information Systems Journal</source></italic> 
    <volume>29</volume> (<issue>1</issue>), 
    pp. <fpage>70</fpage>–<lpage>96</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_019">
  <mixed-citation publication-type="journal">
  <bold><surname>Hern</surname>, <given-names>Alex</given-names>. 
    (<year>2022</year>)</bold> 
<article-title>'Satellite images of corpses in Bucha contradict Russian claims',</article-title>. 
<italic><source>The Guardian</source></italic>. 5 April, 
Available at: 
<ext-link xlink:href="https://www.theguardian.com/world/2022/apr/05/satellite-images-of-corpses-in-bucha-prove-russian-claims-wrong">
  https://www.theguardian.com/world/2022/apr/05/satellite-images-of-corpses-in-bucha-prove-russian-claims-wrong</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_020">
  <mixed-citation publication-type="book">
  <bold><surname>Hirblinger</surname>, <given-names>Andreas</given-names> T. 
    (<year>2020</year>)</bold> 
<italic><source>Digital Inclusion in Peacemaking: A Strategic Perspective</source></italic>. 
<publisher-loc>Geneva</publisher-loc>, <publisher-loc>Switzerland</publisher-loc>: 
<publisher-name>Graduate Institute of International and Development Studies</publisher-name>, 
<publisher-name>Center on Conflict and Development and Peacebuilding</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_021">
  <mixed-citation publication-type="journal">
  <bold><surname>Horn</surname>, <given-names>Bernd</given-names>, <surname>Kiras</surname>, D. <given-names>James</given-names>, 
    and <surname>Spencer</surname>, <given-names>Emily</given-names>. (<year>2021</year>) </bold>
<italic><source>The (in)visible hand: Strategic Sabotage</source></italic>. 
<publisher-loc>Ottowa</publisher-loc>: <publisher-name>CANSOF</publisher-name>, <publisher-name>Wing Winnipeg Publishing Office</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_022">
  <mixed-citation publication-type="book">
  <bold><surname>Hoskins</surname>, <given-names>Andrew. et al</given-names>. 
    (<year>2020</year>) </bold>
<italic><source>Digital war</source></italic>. 
<publisher-loc>Cham</publisher-loc>, <publisher-loc>Switzerland</publisher-loc>: <publisher-name>Springer Nature Switzerland AG</publisher-name>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_023">
  <mixed-citation publication-type="journal">
  <bold><surname>Hughes</surname>, <given-names>Geraint</given-names>. (<year>2020</year>)</bold>
     ‘<article-title>War in the Grey Zone: Historical Reflections and Contemporary Implications</article-title>’, 
<italic><source>Survival (London)</source></italic>. 
<volume>62</volume> (<issue>3</issue>), pp. <fpage>131</fpage>–<lpage>158</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_024">
  <mixed-citation publication-type="journal">
  <bold><surname>Humprecht</surname>, <given-names>Edda</given-names>, <surname>Esser</surname>, <given-names>Frank</given-names>,
     and <surname>Van Aelst</surname>, <given-names>Peter</given-names>. (<year>2020</year>)</bold>
 ‘<article-title>Resilience to online disinformation: A framework for cross-national comparative research</article-title>’, 
 <italic><source>The International Journal of Press/Politics</source></italic> 
 <volume>25</volume> (<issue>3</issue>), 
 pp. <fpage>493</fpage>-<lpage>516</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_025">
  <mixed-citation publication-type="journal">
  <bold><surname>Johansson</surname>, <given-names>Linda</given-names>. (<year>2018</year>)</bold> 
‘<article-title>Ethical Aspects of Military Maritime and Aerial Autonomous Systems</article-title>’, 
<italic><source>Journal of Military Ethics</source></italic>. 
<volume>17</volume> (<issue>2</issue>–<issue>3</issue>), pp. <fpage>140</fpage>–<lpage>155</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_026">
  <mixed-citation publication-type="journal">
  <bold><surname>Jordan</surname>, <given-names>Javier</given-names>. (<year>2020</year>)</bold> 
‘<article-title>International Competition Below the Threshold of War: Toward a Theory of Gray Zone Conflict</article-title>’, 
<italic><source>Journal of Strategic Security</source></italic>. 
<volume>14</volume> (<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>24</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_027">
  <mixed-citation publication-type="journal">
  <bold><surname>Kaplan</surname>, <given-names>Robert</given-names> D. (<year>2019</year>)</bold> 
‘<article-title>A New Cold War Has Begun</article-title>’, 
<italic><source>Foreign Policy</source></italic>. 
Available at: 
<ext-link xlink:href="https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun/">
  https://foreignpolicy.com/2019/01/07/a-new-cold-war-has-begun/</ext-link>, 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_028">
  <mixed-citation publication-type="journal">
  <bold><surname>Kemp</surname>, <given-names>Simon</given-names>. (<year>2020</year>) </bold>
<italic><source>Digital 2020: Global Digital Overview</source></italic>. 
Available at: <ext-link xlink:href="https://datareportal.com/reports/digital-2020-global-digital-overview">
  https://datareportal.com/reports/digital-2020-global-digital-overview</ext-link>, 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_029">
  <mixed-citation publication-type="journal">
  <bold><given-names>KTH Royal Institute of Technology</given-names> (<year>2022</year>)</bold> 
<publisher-name>Centre for Cyber Defence and Information Security</publisher-name>. 
Available at: 
<ext-link xlink:href="https://www.kth.se/cdis/centre-for-cyber-defence-and-information-security-1.946971">
  https://www.kth.se/cdis/centre-for-cyber-defence-and-information-security-1.946971</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_030">
  <mixed-citation publication-type="journal">
  <bold><surname>Maskaliūnaitė</surname>, <given-names>Asta</given-names>. (<year>2021</year>)</bold> 
‘<article-title>Exploring Resistance Operating Concept. Promises and pitfalls of (violent) underground resistance</article-title>’, 
<italic><source>Journal on Baltic Security</source></italic>. 
Vol <volume>7</volume> (<issue>1</issue>), pp. <fpage>27</fpage>–<lpage>38</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_031">
  <mixed-citation publication-type="journal">
  <bold><surname>Mazarr</surname>, <given-names>Michael</given-names> J. (<year>2015</year>)</bold> 
<italic><source>Mastering the Gray Zone: Understanding a Changing Era of Conflict. U.S. Army War College Carlisle</source></italic>. 
Available at: 
<ext-link xlink:href="https://apps.dtic.mil/sti/citations/AD1000186">
  https://apps.dtic.mil/sti/citations/AD1000186</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_032">
  <mixed-citation publication-type="journal">
  <bold><surname>Mckew</surname>, <given-names>Molly</given-names> K. (<year>2017</year>) </bold>
    ‘<article-title>The Gerasimov Doctrine</article-title>’, 
    <italic><source>Politico</source></italic>.
     Available at: <ext-link xlink:href="https://politi.co/2KZQlKd">https://politi.co/2KZQlKd</ext-link> 
     (Accessed 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_033">
  <mixed-citation publication-type="journal">
  <bold><surname>Miller</surname>, <given-names>Christopher</given-names>, <given-names>Scott</given-names>, <given-names>Mark</given-names>, 
    and <surname>Bender</surname>, <given-names>Bryan</given-names>. (<year>2022</year>) </bold>
‘<article-title>UkraineX: How Elon Musk’s space satellites changed the war on the ground</article-title>’, 
<italic><source>Politico</source></italic>. 
Available at: 
<ext-link xlink:href="https://www.politico.eu/article/elon-musk-ukraine-starlink">
  https://www.politico.eu/article/elon-musk-ukraine-starlink</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_034">
  <mixed-citation publication-type="journal">
  <bold><surname>Nakasone</surname>, <given-names>Paul</given-names> M., 
    and <given-names>Lewis</given-names>, <given-names>Charlie</given-names>. (<year>2017</year>) </bold>
    ‘<article-title>Cyberspace in Multi-Domain Battle</article-title>’, 
    <italic><source>The Cyber Defense Review</source></italic>. 
    <volume>2</volume> (<issue>1</issue>), pp. <fpage>15</fpage>–<lpage>26</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_035">
  <mixed-citation publication-type="journal">
  <bold><surname>Nindl</surname>, B., <surname>Billing</surname>, D., <surname>Drain</surname>, J., <surname>Beckner</surname>, M., <surname>Greeves</surname>, J., 
    <surname>Groeller</surname>, H., <surname>Teien</surname>, H., <surname>Marcora</surname>, S., <surname>Moffitt</surname>, A., <surname>Reilly</surname>, T., 
    <surname>Taylor</surname>, N., <surname>Young</surname>, A. and <surname>Friedl</surname>, K. 
    (<year>2018</year>)</bold> 
    ‘<article-title>Perspectives on resilience for military readiness and preparedness: Report of an 
      international military physiology roundtable</article-title>’, 
    <italic><source>Journal of Science and Medicine in Sport</source></italic>. 
    <volume>21</volume> (<issue>11</issue>), pp. <fpage>1116</fpage>–<lpage>1124</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_036">
  <mixed-citation publication-type="journal">
  <bold><given-names>PDA - Psychological Defense Agency</given-names> [<given-names>Myndigheten för psykologiskt försvar</given-names>] 
(<year>2022</year>)</bold> 
Available at: 
<ext-link xlink:href="https://www.mpf.se">https://www.mpf.se</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_037">
  <mixed-citation publication-type="journal">
  <bold><surname>Raine</surname>, J. (<year>2019</year>)</bold> 
‘<article-title>War or peace? Understanding the grey zone</article-title>’, 
<publisher-name>IISS</publisher-name>. 
Available at: 
<ext-link xlink:href="https://www.iiss.org/blogs/analysis/2019/04/understanding-the-grey-zone">
  https://www.iiss.org/blogs/analysis/2019/04/understanding-the-grey-zone</ext-link>, 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_038">
  <mixed-citation publication-type="journal">
  <bold><given-names>Regeringskansliet</given-names>. (<year>2022</year>)</bold> 
<italic><source>Disinformation campaign against Swedish public authorities regarding social services</source></italic>. 
Available at: 
<ext-link xlink:href="https://www.government.se/articles/2022/02/disinformation-campaign-against-swedish-public-authorities-regarding-social-services">
  https://www.government.se/articles/2022/02/disinformation-campaign-against-swedish-public-authorities-regarding-social-services</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_039">
  <mixed-citation publication-type="journal">
  <bold><given-names>SCCA - Swedish Civil Contingencies Agency</given-names> [<given-names>Myndigheten för samhällsskydd och beredskap</given-names>] 
    (<year>2022</year>)</bold> 
Available at: 
<ext-link xlink:href="https://www.msb.se/sv">https://www.msb.se/sv</ext-link>, 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_040">
  <mixed-citation publication-type="journal">
  <bold><given-names>Stockholm International Peace Research Institute</given-names> (<year>2021</year>)</bold> 
‘<article-title>World military spending rises to almost $2 trillion in 2020</article-title>’, 
<publisher-name>SIPRI</publisher-name>. 
Available at: 
<ext-link xlink:href="https://www.sipri.org/media/press-release/2021/world-military-spending-rises-almost-2-trillion-2020">
  https://www.sipri.org/media/press-release/2021/world-military-spending-rises-almost-2-trillion-2020</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_041">
  <mixed-citation publication-type="journal">
  <bold><surname>Stringer</surname>, <given-names>Kevin</given-names> D., and <surname>Fiala</surname>, <given-names>Otto</given-names> C. 
(<year>2019</year>)</bold> 
‘<article-title>The ROC: The Resistance Operating Concept: 
  Special Operations Command Europe’s Collaborative Approach within Unconventional Warfare</article-title>’, 
<italic><source>Special warfare</source></italic>. <volume>32</volume> (<issue>3</issue>).
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_042">
  <mixed-citation publication-type="journal">
  <bold><surname>Thiele</surname>, <given-names>Ralph</given-names> D. (<year>2016</year>)</bold> 
‘<article-title>Building Resilience Readiness against Hybrid Threats – A Cooperative European Union/NATO Perspective</article-title>’, 
Available at: 
<ext-link xlink:href="https://www.semanticscholar.org/paper/Building-Resilience-Readiness-against-Hybrid-%E2%80%93-A-Thiele/e84ee04e90228cc69a8029e2cc8b2b67cd22bdf5">
  https://www.semanticscholar.org/paper/Building-Resilience-Readiness-against-Hybrid-%E2%80%93-A-Thiele/e84ee04e90228cc69a8029e2cc8b2b67cd22bdf5</ext-link>, 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_043">
  <mixed-citation publication-type="journal">
  <bold><surname>Tidy</surname>, <given-names>Joe</given-names>. (<year>2021</year>)</bold>
   ‘<article-title>Swedish Coop supermarkets shut due to US ransomware cyber-attack</article-title>’, 
<italic><source>BBC News</source></italic>. <day>3</day> <month>July</month>. 
Available at: 
<ext-link xlink:href="https://www.bbc.com/news/technology-57707530">https://www.bbc.com/news/technology-57707530</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_044">
  <mixed-citation publication-type="journal">
  <bold><surname>Trithara</surname>, <given-names>Dakoda</given-names>. (n.d.) </bold>
‘<article-title>Securitizing Disinformation: The Case of Westminster’s Digital, Culture, Media and Sport Committee</article-title>’, 
<italic><source>Democracy and Security</source></italic>. (ahead-of-print), 1–28.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_045">
  <mixed-citation publication-type="journal">
  <bold><given-names>United Nations Institute for Training and Research</given-names> (<year>2020</year>)</bold> 
<italic><source>Impact of COVID-19 on Violent Extremism and Terrorism</source></italic>. 
<publisher-name>UNITAR</publisher-name>. Available at: 
<ext-link xlink:href="https://www.unitar.org/learning-solutions/publications/impact-covid-19-violent-extremism-and-terrorism">https://www.unitar.org/learning-solutions/publications/impact-covid-19-violent-extremism-and-terrorism</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_046">
  <mixed-citation publication-type="journal">
  <bold><surname>Vasu</surname>, <given-names>Norman</given-names>. (<year>2016</year>)</bold> 
‘<article-title>Resilience and National Security: ”Everyone Has a Plan ’Til They Get Punched in the Mouth”</article-title>’, 
in <italic><source>State, Society and National Security</source>. World Scientific</italic>. pp. <fpage>93</fpage>–<lpage>102</lpage>. 
Available at: 
<ext-link xlink:href="https://www.worldscientific.com/doi/abs/10.1142/9789813140127_0007">https://www.worldscientific.com/doi/abs/10.1142/9789813140127_0007</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_047">
  <mixed-citation publication-type="journal">
  <bold><surname>Warren</surname>, T. <given-names>Camber</given-names>. (<year>2014</year>)</bold> 
‘<article-title>Not by the Sword Alone: Soft Power, Mass Media, and the Production of State Sovereignty</article-title>’, 
<italic><source>International Organization</source></italic>. 
<volume>68</volume> (<issue>1</issue>), pp. <fpage>111</fpage>–<lpage>141</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_048">
  <mixed-citation publication-type="book">
  <bold><surname>Weissmann</surname>, <given-names>Mikael</given-names>, <surname>Nilsson</surname>, <given-names>Niklas</given-names>, 
    <surname>Palmertz</surname>, <given-names>Björn</given-names>, and <surname>Thunholm</surname>, <given-names>Per</given-names>. 
    (<year>2021</year>)</bold> 
    <italic><source>Hybrid Warfare: Security and Asymmetric Conflict in International Relations</source></italic>. 
    <publisher-loc>London</publisher-loc>: <publisher-name>I.B. Tauris</publisher-name>. 
    Available at: 
    <ext-link xlink:href="http://www.bloomsburycollections.com/book/hybrid-warfare-security-and-asymmetric-conflict-in-international-relations">
      http://www.bloomsburycollections.com/book/hybrid-warfare-security-and-asymmetric-conflict-in-international-relations</ext-link> 
    (Accessed: 26 August 2021)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_049">
  <mixed-citation publication-type="journal">
  <bold><surname>Wilson</surname>, D. (<year>2018</year>)</bold> 
‘<article-title>The Anatomy of Two-Level Maintenance in Multi-Domain Battle</article-title>’, 
<italic><source>Army Sustainment</source></italic>. 
<volume>50</volume> (<issue>1</issue>), pp. <fpage>32</fpage>-<lpage>35</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_050">
  <mixed-citation publication-type="journal">
  <bold><surname>Wilson</surname>, <given-names>Tom</given-names>, and <given-names>Howcroft</given-names>, <given-names>Elizabeth</given-names>. 
    (<year>2022</year>)</bold> 
‘<article-title>Cryptocurrencies in a time of war</article-title>’, 
<italic><source>Reuters</source></italic>. 4 March. 
Available at: 
<ext-link xlink:href="https://www.reuters.com/technology/cryptocurrencies-time-war-2022-03-04">
https://www.reuters.com/technology/cryptocurrencies-time-war-2022-03-04</ext-link> 
(Accessed: 1 July 2022)
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_051">
  <mixed-citation publication-type="journal">
  <bold><surname>Wirtz</surname>, <given-names>James</given-names> J. (<year>2017</year>)</bold> 
‘<article-title>Life in the ‘Gray Zone’: observations for contemporary strategists’</article-title>, 
<italic><source>Defense and Security Analysis</source></italic>. 
<volume>33</volume> (<issue>2</issue>), pp. <fpage>106</fpage>–<lpage>114</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_052">
  <mixed-citation publication-type="journal">
  <bold><surname>Wither</surname>, <given-names>James Kenneth</given-names>. (<year>2020</year>) </bold>
‘<article-title>Back to the future? Nordic total defence concepts</article-title>’, 
<italic><source>Defence Studies</source></italic>. 
<volume>20</volume> (<issue>1</issue>), pp. <fpage>61</fpage>–<lpage>81</lpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_053">
  <mixed-citation publication-type="journal">
  <bold><surname>Young</surname>, <given-names>Elizabeth</given-names>. (<year>2013</year>)</bold>
 ‘<article-title>Decade of War: Enduring Lessons from a Decade of Operations</article-title>’, 
 <italic><source>PRISM</source></italic>. <volume>4</volume> (<issue>2</issue>), <fpage>123</fpage>.
</mixed-citation></ref>

<ref id="j_jobs-2022-0013_ref_054">
  <mixed-citation publication-type="book">
  <bold><surname>Završnik</surname>, <given-names>Aleš</given-names>. (<year>2016</year>)</bold> 
<italic><source>Drones and unmanned aerial systems: legal and social implications for security and surveillance</source></italic>. 
<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name>.
</mixed-citation></ref>
  
  </ref-list>
</back>

</article>
