NATO Lags Behind in the Newest Defenses Against Cyber Attack

It would seem that NATO is not as prepared for a cyber attack as one would think. Even though security has improved at the organization, it still lags behind that of their counterparts in the civilian world. It would seem that government entities are more concerned with getting things back to normal after a cybersecurity breach as opposed to the identification of the source, putting already-specified defensive capabilities into action, taking control of the method of intrusion, and taking the fight to the intruder — all business as usual for your standard IT security team, according to

One recent example of the military dealing with a cyber attack occurred after NATO’s Supreme Allied Commander in Europe, Admiral James Stavridis, had his Facebook hacked by Chinese Spies. An unspecified number of British military and NATO officials had “friended” the fake account. This permitted the harvesting of phone numbers and private e-mail addresses of those who were fooled.

The real problem lies with the attitude that superior force can overcome any foe. What military commanders fail to realize is that gone are the days of knowing just who the enemy is and what their capabilities are. The warriors of the new cyber space battlefield are often more experienced than their NATO counterparts and, in some cases, are acting as agents for what amounts to state-sponsored cyber terrorism.

Military commanders need to let go of the rigid thinking of the past. They cannot fight the unseen cyber attackers in the same way they would a conventional army. Unless they want to continue to let countries such as China dominate this new field of battle, they need to adapt new policies in regards to cybersecurity. Until then, the nations of NATO will remain vulnerable to such attacks.

For more information about NATO’s cyber vulnerabilities, visit: