NATO Defense Spending Should Privilege Cyber

The acting Pentagon chief’s visit to NATO headquarters recently hardly reassured allies rattled by President Trump’s talk of quitting the alliance. But while Trump’s rhetoric is less than encouraging, his criticism of allies who put less than the agreed-upon 2 percent of national economic output toward defense should prompt us to rethink how we define “defense spending” in today’s fast-changing world. 

Of NATO 28’s member states, only five meet the goal; German defense spending is just 1.2 percent of GDP. In this way, at least, Trump has a point: NATO’s economics are clearly not working out, and this disorganization is undermining the alliance. But the crucial adjustment that is needed is not the amount of spending, but what it seeks to fund. 

The face of war is changing dramatically as cyber and electronic attacks become increasingly commonplace, and so must our allies’ understanding of defense. 

Over the past year, state-sponsored Russian hackers have targeted both US elections and critical components of the country’s infrastructure. Chinese hackers appear to be equal, if not more, alarming. The number of data breaches at US companies rose 27 percent in 2017. Yet the most recent NATO document to outline financial expectations remains the Wales Summit Declaration of 2014, which dedicates only two paragraphs to cyber defense and focuses on conventional defense expenditures, including the “deployability and sustainability” of “land, air and maritime forces.” 

Over the last few years, NATO’s member-states have started to acknowledge this oversight and have taken steps to jumpstart the development of cyber capabilities. The alliance has recently announced the imminent release of its first holistic cyber-operations doctrine and the construction of a new cyber command center expected to be fully staffed and operational by 2023. 

The United States, Britain, Denmark, Estonia, and the Netherlands have pledged to use their digital defense systems to respond to a serious cyber-attack on a fellow member-state. 

The alliance has launched Locked Shields and other exercises to fine-tune digital battle tactics. And in the communiqués that followed last year’s summit, “cyber” appeared more often than “terrorism.” 

Yet NATO remains woefully unprepared for digital warfare, as highlighted in a Belfer Center report published last week. One example: only a fraction of a $3 billion fund for satellite communications and computer systems, around $100 million has been used to strengthen critical cyber-defenses. We need to be spending differently rather than simply more.

Instead of pressing fellow member-states for greater financial contributions in general, Trump should launch the development of a more precise economic strategy based on the nature, likelihood, and danger of the threats we currently face. This starts by working with our allies to revise and broaden the current understanding of what defense spending entails. An updated definition would focus on the categories that are most critical to transatlantic security given recent Russian and Chinese activities, but that are not currently included within the scope of the 2-percent target, such as the cyber-defense of electoral processes and of civilian infrastructure. 

Digital defense is cheaper and more easily deployable than its more traditional, asset-heavy counterparts. Thus, revising NATO’s current spending requirements to encourage member-states to spend even a fraction of GDP on bolstering their most vulnerable cyber-fronts would likely be more effective and achievable than current objectives. 

Most importantly for the successful implementation of such changes, recent developments have shown that NATO member-states are indeed willing to spend more on cyber-defense. 

Recently, the Italian defense minister Elisabetta Trenta, a member of Italy’s populist Five Star Movement and a known critic of military spending, demonstrated interest in boosting her country’s defenses in the digital arena. 

“Spending money to develop cyber security defenses should count the same as spending money to buy tanks,” she argued. 
While this view may prove a bit extreme for most NATO leaders, it does suggest a path forward for productive compromise, improved security, and a healthier alliance. 

DefenseOne

You Might Also Read: 

Cyber Attribution Could Tear Apart NATO:

 


 

 

« Hackers Are Focused On Hijacking Payment Data
Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

NEC

NEC

NEC offers a complete array of solutions to governments and enterprises to protect themselves from the threats of digital disruption.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

TempoCap

TempoCap

TempoCap is a European growth-stage technology fund with offices in London and Berlin. We invest across a variety of high- growth sectors including cybersecurity.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.