Military Review English Edition May-June 2014 | Page 33

UTILITY OF CYBERPOWER One of DOD’s biggest assets to leverage is its buying power. In 2011, DOD spent over $375 billion on contracts. 45 The military should, of course, use its buying power to insist on strict security standards when purchasing hardware and software. However, it also can use its acquisition process to reduce vulnerabilities through its use of defense contractors. Similar to detailed classification requirements, contracts should specify network security protocols for all contract firms as well as their suppliers, regardless of the services provided. Maintaining stricter security protocols than industry standards would become a condition of lucrative contracts. Through its contracts, allies, and position as the nation’s largest employer, DOD can affect preferences to improve outer layer defenses.46 Develop an offensive defense. Even in defensive war, Clausewitz recognized the necessity of offense to return enemy blows and achieve victory.47 Robust offensive capabilities can enhance deterrence by affecting an adversary’s decision calculus.48 DOD must prepare for contingencies calling for offensive support to other domains or independent action through cyberspace. The military should develop offensive capabilities for potential scenarios but should purposefully define its preparations as defense. Communicating a defensive posture is important to avoid hastening a security-dilemma-inspired cyber–arms race that may have already started.49 Over 20 nations reportedly have some cyberwar capability.50 Even if it is too late to slow others’ offensive development, controlling the narrative remains important.51 Just as the name Department of Defense sends a different message than its former name–War Department– developing defensive capabilities to shut down rogue cyberattackers sounds significantly better than developing offensive capabilities that “knock [the enemy] out in the first round.”52 Do not expect rapid changes in international order or the nature of war. Without question, the world is changing, but world order does not change overnight. Nye detailed changes due to globalization and the spread of information technologies, including diffusion of U.S. power to rising nations and nonstate actors. However, he claimed it was not a “narrative of decline” and wrote, “The United States is unlikely to decay like ancient Rome or even to be surpassed by another state.”53 Adapting to current trends is Secretary of the Army John McHugh receives an update briefing from staff members of U.S. Army Cyber Command, Fort Belvoir, Va., 2 April 2012. (U.S.Army) MILITARY REVIEW May-June 2014 31