The purpose of the National Military Strategy of the United States of America (2011) is “to provide the ways and means by which our military will advance our enduring national interests as articulated in the 2010 National Security Strategy (NSS) and to accomplish the defense objectives in the 2010 Quadrennial Defense Review (QDR)” released by then Chairman, Joint Chiefs of Staff Admiral Mike Mullen.
Much of the National Military Strategy is based on the 2010 National Security Strategy (NSS).
The points that stick out to this Cyber Fellow are:
- Identifies Cyberspace as a global domain required for military operations.
- The ability to operate in an anti-access and area-denial (A2AD) are key capabilities both tactically and strategically. The threat from state conducting and condoning cyber intrusions continues to grow along with the difficulty of attribution.
- Retain the global leadership role and national interest of a strong, innovative and growing U.S. economy in an open international economic system that promotes opportunity and prosperity (Defense Industrial Base (DIB) Partnership). This requirement is sited from the 2010 National Security Strategy.
- Assist in shaping the Future Force.
- Assure access to the global connected domains and cyberspace for the Joint Force.
- Enable Combatant Commanders (COCOM) to operate effectively across all domains. Via Strategic Command and Cyber Command collaborate with U.S. Government agencies to develop new cyber norms, capabilities, organizations, and skills. Enable effective action in cyberspace.
- Work with Department of Homeland Security (DHS), particularly the Coast Guard, to improve cyberspace awareness. In response to cyber incident provide planning command and control, to the Department of Homeland Security, state and local governments, and non-governmental organizations (NGO).
- Secure Joint the ‘.mil’ domain; require a resilient DoD cyberspace architecture that employs a combination of detection, deterrence, denial, and multi-layered defense. Improve cyberspace capabilities to achieve significant and proportionate effects at less cost and lower collateral impact.
The impact to the U.S. Navy Information Dominance Corps is:
- To ensure they are able to operate in an A2AD environment;
- Assist the DoD in executing the DIB partnership program;
- Utilize Information Technology to achieve cost and manning efficiencies;
- Assure access to the Naval portion of the ‘.mil’ domain.
The strength of this document is the recognition of cyberspace as one of the global domains. It provides backing and importance not previously seen focused on the network, the transport layer and information within the network.
The weakness in the National Military Strategy is the fiscal environment. I would stipulate that the goals are all achievable. However they become a much greater task when faced with a major reduction in budgets as we’ve seen recently.
Incoming search terms:national military strategy 2012, a2ad environment, a2ad military, the national military strategy of the united states of america, national DEFENSE strategy 2012, US national military strategy 2012, the national security strategy of the united states of america 2012, strengths and weaknesses of National military strategy, national military strategy of the united states of america 2012, National Military Strategy of the United States, National Military Strategy for Cyber Operations, National Military Strategy
Follow A Cyber Fellow on Twitter!
"Olympia Circuits shows Arduino datalogger and Arno Add-Ons at Maker Faire 2013" http://t.co/JHxSdzIBH9
"Using data and computer models to store wind energy underground" http://t.co/YurOyi1NWx
"What I've Learned By Leading A Startup--And Taking On Google" http://t.co/kaFrOCjMB0
"Security Risks of Too Much Security" http://t.co/SQJqaqaUOa
"The Future Of Web Authentication" http://t.co/BTmS0gqfN0
"The Next Frontier For 3-D Printing: Helping The Disabled" http://t.co/1huBQkPSkE
"Morning Brief: Exposed Chinese hacking unit resumes attacks" http://t.co/e1F5SxGcRx
- Acquisition (46)
- Big Ideas (8)
- CES (10)
- Cyber Battle (7)
- Cyber Defense (13)
- Cyber Offense (9)
- Cyber Warfare (19)
- Deals (83)
- Economics (14)
- Education (24)
- Energy (7)
- Gadgets (25)
- Geekery (42)
- Greatest (1)
- IDC (26)
- Information Professional (26)
- Information Warfare (19)
- Inspiration (33)
- Intelligence (12)
- Mentorship (13)
- METOC (11)
- Military (66)
- Offense (1)
- Robotics (3)
- Space Cadre (13)
- Strategy (45)
- Technology (54)
- Uncategorized (9)