The purpose of the National Military Strategy of the United States of America (2011) is “to provide the ways and means by which our military will advance our enduring national interests as articulated in the 2010 National Security Strategy (NSS) and to accomplish the defense objectives in the 2010 Quadrennial Defense Review (QDR)” released by then Chairman, Joint Chiefs of Staff Admiral Mike Mullen.
Much of the National Military Strategy is based on the 2010 National Security Strategy (NSS).
The points that stick out to this Cyber Fellow are:
- Identifies Cyberspace as a global domain required for military operations.
- The ability to operate in an anti-access and area-denial (A2AD) are key capabilities both tactically and strategically. The threat from state conducting and condoning cyber intrusions continues to grow along with the difficulty of attribution.
- Retain the global leadership role and national interest of a strong, innovative and growing U.S. economy in an open international economic system that promotes opportunity and prosperity (Defense Industrial Base (DIB) Partnership). This requirement is sited from the 2010 National Security Strategy.
- Assist in shaping the Future Force.
- Assure access to the global connected domains and cyberspace for the Joint Force.
- Enable Combatant Commanders (COCOM) to operate effectively across all domains. Via Strategic Command and Cyber Command collaborate with U.S. Government agencies to develop new cyber norms, capabilities, organizations, and skills. Enable effective action in cyberspace.
- Work with Department of Homeland Security (DHS), particularly the Coast Guard, to improve cyberspace awareness. In response to cyber incident provide planning command and control, to the Department of Homeland Security, state and local governments, and non-governmental organizations (NGO).
- Secure Joint the ‘.mil’ domain; require a resilient DoD cyberspace architecture that employs a combination of detection, deterrence, denial, and multi-layered defense. Improve cyberspace capabilities to achieve significant and proportionate effects at less cost and lower collateral impact.
The impact to the U.S. Navy Information Dominance Corps is:
- To ensure they are able to operate in an A2AD environment;
- Assist the DoD in executing the DIB partnership program;
- Utilize Information Technology to achieve cost and manning efficiencies;
- Assure access to the Naval portion of the ‘.mil’ domain.
The strength of this document is the recognition of cyberspace as one of the global domains. It provides backing and importance not previously seen focused on the network, the transport layer and information within the network.
The weakness in the National Military Strategy is the fiscal environment. I would stipulate that the goals are all achievable. However they become a much greater task when faced with a major reduction in budgets as we’ve seen recently.
Incoming search terms:national military strategy 2012, a2ad environment, national military strategy 2011, The National Military Strategy of the United States of America 2011, 2011 national military strategy, a2ad cyber, strengths and weaknesses of the 2011 National Military Strategy, what are the weaknesses of the national military strategy
Follow A Cyber Fellow on Twitter!
@smart_cctv_ yes, when I can!
How Much Of Your Income Should You Save? http://t.co/B5Oc2Q92Ro
9 Facts About Computer Security That Experts Wish You Knew http://t.co/dvwCtiP6Lp
Google Tests First Error Correction in Quantum Computing - IEEE Spectrum http://t.co/JETHsPSTyE
FREAK Vulnerability Forces Weaker Encryption | Security Intelligence Blog | Trend Micro http://t.co/iQaETPEqlw