Military Review English Edition May-June 2014 | Page 33
UTILITY OF CYBERPOWER
One of DOD’s biggest assets to leverage is its
buying power. In 2011, DOD spent over $375
billion on contracts. 45 The military should, of
course, use its buying power to insist on strict
security standards when purchasing hardware and
software. However, it also can use its acquisition
process to reduce vulnerabilities through its use
of defense contractors. Similar to detailed classification requirements, contracts should specify
network security protocols for all contract firms as
well as their suppliers, regardless of the services
provided. Maintaining stricter security protocols
than industry standards would become a condition
of lucrative contracts. Through its contracts, allies,
and position as the nation’s largest employer,
DOD can affect preferences to improve outer
layer defenses.46
Develop an offensive defense. Even in defensive war, Clausewitz recognized the necessity of
offense to return enemy blows and achieve victory.47 Robust offensive capabilities can enhance
deterrence by affecting an adversary’s decision
calculus.48 DOD must prepare for contingencies
calling for offensive support to other domains or
independent action through cyberspace.
The military should develop offensive capabilities for potential scenarios but should purposefully
define its preparations as defense. Communicating
a defensive posture is important to avoid hastening a security-dilemma-inspired cyber–arms race
that may have already started.49 Over 20 nations
reportedly have some cyberwar capability.50 Even if
it is too late to slow others’ offensive development,
controlling the narrative remains important.51 Just as
the name Department of Defense sends a different
message than its former name–War Department–
developing defensive capabilities to shut down
rogue cyberattackers sounds significantly better
than developing offensive capabilities that “knock
[the enemy] out in the first round.”52
Do not expect rapid changes in international
order or the nature of war. Without question, the
world is changing, but world order does not change
overnight. Nye detailed changes due to globalization
and the spread of information technologies, including
diffusion of U.S. power to rising nations and nonstate
actors. However, he claimed it was not a “narrative
of decline” and wrote, “The United States is unlikely
to decay like ancient Rome or even to be surpassed
by another state.”53 Adapting to current trends is
Secretary of the Army John McHugh receives an update briefing from staff members of U.S. Army Cyber Command, Fort Belvoir, Va., 2
April 2012. (U.S.Army)
MILITARY REVIEW
May-June 2014
31