NATO Defense Spending Should Privilege Cyber

The acting Pentagon chief’s visit to NATO headquarters recently hardly reassured allies rattled by President Trump’s talk of quitting the alliance. But while Trump’s rhetoric is less than encouraging, his criticism of allies who put less than the agreed-upon 2 percent of national economic output toward defense should prompt us to rethink how we define “defense spending” in today’s fast-changing world. 

Of NATO 28’s member states, only five meet the goal; German defense spending is just 1.2 percent of GDP. In this way, at least, Trump has a point: NATO’s economics are clearly not working out, and this disorganization is undermining the alliance. But the crucial adjustment that is needed is not the amount of spending, but what it seeks to fund. 

The face of war is changing dramatically as cyber and electronic attacks become increasingly commonplace, and so must our allies’ understanding of defense. 

Over the past year, state-sponsored Russian hackers have targeted both US elections and critical components of the country’s infrastructure. Chinese hackers appear to be equal, if not more, alarming. The number of data breaches at US companies rose 27 percent in 2017. Yet the most recent NATO document to outline financial expectations remains the Wales Summit Declaration of 2014, which dedicates only two paragraphs to cyber defense and focuses on conventional defense expenditures, including the “deployability and sustainability” of “land, air and maritime forces.” 

Over the last few years, NATO’s member-states have started to acknowledge this oversight and have taken steps to jumpstart the development of cyber capabilities. The alliance has recently announced the imminent release of its first holistic cyber-operations doctrine and the construction of a new cyber command center expected to be fully staffed and operational by 2023. 

The United States, Britain, Denmark, Estonia, and the Netherlands have pledged to use their digital defense systems to respond to a serious cyber-attack on a fellow member-state. 

The alliance has launched Locked Shields and other exercises to fine-tune digital battle tactics. And in the communiqués that followed last year’s summit, “cyber” appeared more often than “terrorism.” 

Yet NATO remains woefully unprepared for digital warfare, as highlighted in a Belfer Center report published last week. One example: only a fraction of a $3 billion fund for satellite communications and computer systems, around $100 million has been used to strengthen critical cyber-defenses. We need to be spending differently rather than simply more.

Instead of pressing fellow member-states for greater financial contributions in general, Trump should launch the development of a more precise economic strategy based on the nature, likelihood, and danger of the threats we currently face. This starts by working with our allies to revise and broaden the current understanding of what defense spending entails. An updated definition would focus on the categories that are most critical to transatlantic security given recent Russian and Chinese activities, but that are not currently included within the scope of the 2-percent target, such as the cyber-defense of electoral processes and of civilian infrastructure. 

Digital defense is cheaper and more easily deployable than its more traditional, asset-heavy counterparts. Thus, revising NATO’s current spending requirements to encourage member-states to spend even a fraction of GDP on bolstering their most vulnerable cyber-fronts would likely be more effective and achievable than current objectives. 

Most importantly for the successful implementation of such changes, recent developments have shown that NATO member-states are indeed willing to spend more on cyber-defense. 

Recently, the Italian defense minister Elisabetta Trenta, a member of Italy’s populist Five Star Movement and a known critic of military spending, demonstrated interest in boosting her country’s defenses in the digital arena. 

“Spending money to develop cyber security defenses should count the same as spending money to buy tanks,” she argued. 
While this view may prove a bit extreme for most NATO leaders, it does suggest a path forward for productive compromise, improved security, and a healthier alliance. 

DefenseOne

You Might Also Read: 

Cyber Attribution Could Tear Apart NATO:

 


 

 

« Hackers Are Focused On Hijacking Payment Data
Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

PROOF

PROOF

PROOF is a Brazilian leader in cybersecurity. Our goal is to assist our Customers in managing security efficiently and in tune with business needs.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

SECQAI

SECQAI

At SECQAI we create dual-use hardware and software to enable the future of computing.