{"id":441,"date":"2024-11-26T18:34:23","date_gmt":"2024-11-26T18:34:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/?page_id=441"},"modified":"2024-11-26T18:53:06","modified_gmt":"2024-11-26T18:53:06","slug":"2017-national-security-strategy-policy-analysis","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/2017-national-security-strategy-policy-analysis\/","title":{"rendered":"Policy Analysis"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">2017 National Security Strategy Policy Analysis<\/span><\/h1>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Hamza Demirel<\/h1>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">CYSE425W<br>Edwin Wells IV<br><br><\/h1>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The strategy that I have chosen to analyze this semester is the National Security Strategy of the United States of America from December of 2017. In President Trumps Strategy he \u201clays out a strategic vision for protecting the American people and preserving our way of life, promoting our prosperity, preserving peace through strength, and advancing American influence in the world\u201d (NSS, 2017, p. II). This strategy was developed with the intention of strengthening the American power set and sovereignty to protect the four national interests listed previously. In establishing this America first strategy and reciprocal relations with other countries \u201cAmerica will catalyze conditions to unleash economic success for America and the world\u201d (NSS, 2017, p. 4).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; With the direction and national goals set in place by President Trump the Department of State (DOS), the Department of Defense (DOD), and the Department of Homeland Security (DHS) are the most affected federal organizations (Weaver, 2018). The National Security Strategy serves as guidepost for these organizations to create their own plans and strategies to execute the national interest. Issuing such a strategy early in President Trump\u2019s term \u201cbodes well for the interagency process of strategy formulation\u201d (Ashford et al., 2017, p. 4). The plans made by these organizations also \u201cserve two primary purposes. First, they serve as marching orders for these mammoth actors, and secondly are used to help in the setting of priorities when preparing budget requests and their subsequent executions\u201d (Weaver, 2018, p.63).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Not only does the National Security Strategy affect domestic policy makers it also affects foreign policy as well. President Trump\u2019s strategy differs from previous presidencies which \u201crejects Obama\u2019s internationalism, Bush\u2019s transformational agenda, and Clinton\u2019s embrace of globalization. In its place is a full-throated commitment to maintaining primacy and unbinding the US from multilateral obligations\u201d (Ettinger, 2018, p. 475). In doing so the strategy guides us back to an older approach for US foreign economic policy of reciprocity. The National Security Strategy \u201creflects a program to supplant the post-World War II system of international trade rules with bilateral economic relations that in almost every case would be dominated by the US\u201d (Ettinger, 2018, p. 479).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The National Security Strategy guides domestic and foreign policy making but how does it relate to and guide the field of cyber security? The priority actions listed in the strategy for cyber security are identify and prioritize risk, build defensible government networks, deter and disrupt malicious cyber actors, improve information sharing and sensing, and deploy layered defenses (NSS, 2017). While these are classic and well-deserved practices, Ashford et al. (2017) finds the strategy to be lacking and missed opportunities to further explanation or development.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Three main national security questions are identified by the author:<\/p>\n\n\n\n<p class=\"has-text-align-left\">First, how can America deter adversaries, particularly Russian hackers emboldened by their successful interference in the 2016 election, from acting similarly again? Second, how can it defend American electoral networks from foreign penetration? And third, how can it manage the clear and present threat of information operations enabled in part by hacking, a danger that strikes at the very heart of the democratic process? (Ashford et al., 2017, p. 36)<\/p>\n\n\n\n<p>These questions raise the point that new and emerging threats and vectors of attack are emerging every day. The National Security Strategy may not specifically list out how to deal with these areas but perhaps this will give domestic departments the room and goal to develop their own plans.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; President Trump in his first year of term announced the National Security Strategy that gives guidance for the development, coordination, and goals for the United States. The pillars described are to protect American way of life, promote prosperity, promote peace, and the increase America\u2019s influence. This document guides domestic departments with developing their plans. Most affected are the DOS, DOD, and DHS. Internationally the document sets the tone for trade agreements and relations with other countries. The security threats addressed in the document are viewed as traditional approaches in a new digital era. However, departments that work closely with the threats have the opportunity to develop their own plans within the guidance of the National Security Strategy of 2017.<\/p>\n\n\n\n<p><strong><u>References<\/u><\/strong><\/p>\n\n\n\n<p>Ashford, E., Itzkowitz Shifrinson, J. R., Hill, A., Buchanan, B., Cooper, Z., Rapp-Hooper, M., Medina, C., McGrath, B., &amp; Deptula, D. A. (2017, December 21). <em>Policy roundtable: What to make of Trump\u2019s National Security Strategy<\/em>. Texas National Security Review. https:\/\/tnsr.org\/roundtable\/policy-roundtable-make-trumps-national-security-strategy\/#essay2<\/p>\n\n\n\n<p>Ettinger, A. (2018). Trump\u2019s National Security Strategy: \u201cAmerica first\u201d meets the establishment. <em>International Journal: Canada\u2019s Journal of Global Policy Analysis<\/em>, <em>73<\/em>(3), 474\u2013483. https:\/\/doi.org\/10.1177\/0020702018790274<\/p>\n\n\n\n<p><em>NSS booklayout fin 121917 &#8211; the white house<\/em>. Trump Whitehouse. (2017, December 18). https:\/\/trumpwhitehouse.archives.gov\/wp-content\/uploads\/2017\/12\/NSS-Final-12-18-2017-0905.pdf<\/p>\n\n\n\n<p>Weaver, J. (2018). The 2017 national security strategy of the United States. <em>Journal of Strategic Security<\/em>, <em>11<\/em>(1), 62\u201371. https:\/\/doi.org\/10.5038\/1944-0472.11.1.1655<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2017 National Security Strategy Policy Analysis Hamza Demirel CYSE425WEdwin Wells IV &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The strategy that I have chosen to analyze this semester is the National Security Strategy of the United States of America from December of 2017. In President Trumps Strategy he \u201clays out a strategic vision for protecting the American people and preserving our&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/2017-national-security-strategy-policy-analysis\/\">Read More<\/a><\/div>\n","protected":false},"author":25223,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/441"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/users\/25223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/comments?post=441"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/441\/revisions"}],"predecessor-version":[{"id":468,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/441\/revisions\/468"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/media?parent=441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}