defense strategy vulnerabilities