NATO Defense Spending Should Privilege Cyber

The acting Pentagon chief’s visit to NATO headquarters recently hardly reassured allies rattled by President Trump’s talk of quitting the alliance. But while Trump’s rhetoric is less than encouraging, his criticism of allies who put less than the agreed-upon 2 percent of national economic output toward defense should prompt us to rethink how we define “defense spending” in today’s fast-changing world. 

Of NATO 28’s member states, only five meet the goal; German defense spending is just 1.2 percent of GDP. In this way, at least, Trump has a point: NATO’s economics are clearly not working out, and this disorganization is undermining the alliance. But the crucial adjustment that is needed is not the amount of spending, but what it seeks to fund. 

The face of war is changing dramatically as cyber and electronic attacks become increasingly commonplace, and so must our allies’ understanding of defense. 

Over the past year, state-sponsored Russian hackers have targeted both US elections and critical components of the country’s infrastructure. Chinese hackers appear to be equal, if not more, alarming. The number of data breaches at US companies rose 27 percent in 2017. Yet the most recent NATO document to outline financial expectations remains the Wales Summit Declaration of 2014, which dedicates only two paragraphs to cyber defense and focuses on conventional defense expenditures, including the “deployability and sustainability” of “land, air and maritime forces.” 

Over the last few years, NATO’s member-states have started to acknowledge this oversight and have taken steps to jumpstart the development of cyber capabilities. The alliance has recently announced the imminent release of its first holistic cyber-operations doctrine and the construction of a new cyber command center expected to be fully staffed and operational by 2023. 

The United States, Britain, Denmark, Estonia, and the Netherlands have pledged to use their digital defense systems to respond to a serious cyber-attack on a fellow member-state. 

The alliance has launched Locked Shields and other exercises to fine-tune digital battle tactics. And in the communiqués that followed last year’s summit, “cyber” appeared more often than “terrorism.” 

Yet NATO remains woefully unprepared for digital warfare, as highlighted in a Belfer Center report published last week. One example: only a fraction of a $3 billion fund for satellite communications and computer systems, around $100 million has been used to strengthen critical cyber-defenses. We need to be spending differently rather than simply more.

Instead of pressing fellow member-states for greater financial contributions in general, Trump should launch the development of a more precise economic strategy based on the nature, likelihood, and danger of the threats we currently face. This starts by working with our allies to revise and broaden the current understanding of what defense spending entails. An updated definition would focus on the categories that are most critical to transatlantic security given recent Russian and Chinese activities, but that are not currently included within the scope of the 2-percent target, such as the cyber-defense of electoral processes and of civilian infrastructure. 

Digital defense is cheaper and more easily deployable than its more traditional, asset-heavy counterparts. Thus, revising NATO’s current spending requirements to encourage member-states to spend even a fraction of GDP on bolstering their most vulnerable cyber-fronts would likely be more effective and achievable than current objectives. 

Most importantly for the successful implementation of such changes, recent developments have shown that NATO member-states are indeed willing to spend more on cyber-defense. 

Recently, the Italian defense minister Elisabetta Trenta, a member of Italy’s populist Five Star Movement and a known critic of military spending, demonstrated interest in boosting her country’s defenses in the digital arena. 

“Spending money to develop cyber security defenses should count the same as spending money to buy tanks,” she argued. 
While this view may prove a bit extreme for most NATO leaders, it does suggest a path forward for productive compromise, improved security, and a healthier alliance. 

DefenseOne

You Might Also Read: 

Cyber Attribution Could Tear Apart NATO:

 


 

 

« Hackers Are Focused On Hijacking Payment Data
Falling Returns Mean Cyberecriminals Are Turning To Unconventional Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigiCert

DigiCert

DigiCert is the only provider of enterprise-grade SSL, IoT and PKI solutions. Our certificates are trusted everywhere, millions of times every day, by companies across the globe.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Cybersecurity & Infrastructure Security Agency (CISA)

Cybersecurity & Infrastructure Security Agency (CISA)

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

Dreamlab Technologies

Dreamlab Technologies

Over the last 20 years, Dreamlab Technologies has established itself as a source of constant innovation within the information security landscape.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

Stamus Networks

Stamus Networks

Stamus Networks offers Scirius Security Platform solutions that marry real-time network traffic data with enhanced Suricata intrusion detection (IDS) and an advanced analytics engine.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

RocketCyber

RocketCyber

RocketCyber is a Managed SOC platform empowering Managed Service Providers (MSPs) to deliver security services to small and medium businesses.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Training.com.au

Training.com.au

Training.com.au is a comparison website through which those looking to learn about different aspects of cyber security can compare learning courses from training providers from across Australia.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group) is a USA based digital transformation company with expertise in Mobile, Cloud, Web, IoT, AR, RPA, Cyberseurity and AI Technologies.