Advanced search Help
Searching for terms: EXACT: "National Technology Strategy" in: series
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
21st Century Science, Technology, and Innovation Strategy for America's National Security
"Leadership in science and technology has been the foundation of American national security since World War II. This leadership--coupled with America's capacity for innovation and the ability to translate new ideas into deployable weapons, systems, and concepts of operation--has long ensured the Nation's military advantage. […] A new generation of threats and opportunities has emerged, moreover, which will continue to evolve in unprecedented ways. The United States must continue to lead in developing science and technology solutions to effectively address global problems, such as infectious disease and climate change, which will ultimately affect U.S. national security. The U.S. national security ST&I [Science, Technology, and Innovation] enterprise must continue to evolve to meet these emerging threats and challenges. America's national security research and development system is structured to respond to the military threats and economic opportunities of the last century. Recognizing the crucial role of technology in the Second World War, postwar America created an extensive infrastructure for national security science and technology that provided the foundation for the nuclear triad, the intelligence gathering infrastructure, and an array of other military capabilities and advanced tools to meet the threats of the Cold War era. This enterprise nurtured transformative technologies, including stealth technology, integrated command and control, and precision-guided munitions, all designed to counter peer adversaries in large-scale military conflicts. […] This document […] lays out the needs, opportunities, and challenges facing America's national security ST&I enterprise and sets forth a vision for its health and sufficiency enterprise in four critical areas: (1) workforce; (2) facilities and infrastructure; (3) governance roles and responsibilities; and (4) innovative capacity to transform ideas into working technology."
United States. White House Office
2016-05
-
National Strategy for Civil Earth Observations
"Each year, Federal agencies invest billions of dollars in civil Earth observations. Through these investments, the U.S. government ensures that the Nation's decision makers, businesses, first-responders, farmers, and a wide array of other stakeholders have the information they need about climate and weather, disaster events, land-use change, ecosystem health, natural resources, and many other characteristics of the planet. Taken together, Earth observations provide the indispensable foundation for meeting the Federal Government's long-term sustainability objectives and advancing U.S. social, environmental, and economic well-being. As the Nation's Earth-observation capacity has grown, however, so has the complexity of this endeavor. Today, U.S. Earth-observation efforts are distributed among more than 100 programs under the purview of Federal agencies and non-Federal entities that both produce and use these data. The National Strategy for Civil Earth Observations, developed in response to congressional direction, is designed to maximize interagency coordination, increase efficiency and efficacy of future Earth-observation efforts, and promote environmental and economic sustainability."
National Science and Technology Council (U.S.)
2013-04
-
Digital Government: Building a 21st Century Platform to Better Serve the American People
"Mission drives agencies, and the need to deliver better services to customers at a lower cost--whether an agency is supporting the warfighter overseas, a teacher seeking classroom resources or a family figuring out how to pay for college--is pushing every level of government to look for new solutions. Today's amazing mix of cloud computing, ever-smarter mobile devices, and collaboration tools is changing the consumer landscape and bleeding into government as both an opportunity and a challenge. New expectations require the Federal Government to be ready to deliver and receive digital information and services anytime, anywhere and on any device. It must do so safely, securely, and with fewer resources. To build for the future, the Federal Government needs a Digital Strategy that embraces the opportunity to innovate more with less, and enables entrepreneurs to better leverage government data to improve the quality of services to the American people. Early mobile adopters in government--like the early web adopters--are beginning to experiment in pursuit of innovation. Some have created products that leverage the unique capabilities of mobile devices. Others have launched programs and strategies and brought personal devices into the workplace. Absent coordination, however, the work is being done in isolated, programmatic silos within agencies. Building for the future requires us to think beyond programmatic lines. To keep up with the pace of change in technology, we need to securely architect our systems for interoperability and openness from conception. We need to have common standards and more rapidly share the lessons learned by early adopters. We need to produce better content and data, and present it through multiple channels in a program and device-agnostic way. We need to adopt a coordinated approach to ensure privacy and security in a digital age."
United States. White House Office
2012-05-23
-
International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World
"The foundation of the United States' international cyberspace policy is the belief that networked technologies hold immense potential for our Nation, and for the world. Over the last three decades we, the United States, have watched these technologies revolutionize our economy and transform of our daily lives. We have also witnessed offline challenges, like exploitation and aggression, move into cyberspace. As we adapt to meet those challenges, we will lead by example. The United States will pursue an international cyberspace policy that empowers the innovation that drives our economy and improves lives here and abroad. In all this work, we are grounded in principles essential not just to American foreign policy, but to the future of the Internet itself. [...] Our policies flow from a commitment to both preserving the best of cyberspace and safeguarding our principles. Our international cyberspace policy reflects our core commitments to fundamental freedoms, privacy, and the free flow of information."
United States. White House Office
2011-05
-
National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security and Privacy
"A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase our productivity, as a platform for innovation, and as a venue in which to create new businesses 'Our digital infrastructure, therefore, is a strategic national asset, and protecting it--while safeguarding privacy and civil liberties--is a national security priority' and an economic necessity. By addressing threats in this environment, we will help individuals protect themselves in cyberspace and enable both the private sector and government to offer more services online As a Nation, we are addressing many of the technical and policy shortcomings that have led to insecurity in cyberspace Among these shortcomings is the online authentication of people and devices: the President's Cyberspace Policy Review established trusted identities as a cornerstone of improved cybersecurity In the current online environment, individuals are asked to maintain dozens of different usernames and passwords, one for each website with which they interact The complexity of this approach is a burden to individuals, and it encourages behavior--like the reuse of passwords--that makes online fraud and identity theft easier At the same time, online businesses are faced with ever-increasing costs for managing customer accounts, the consequences of online fraud, and the loss of business that results from individuals' unwillingness to create yet another account Moreover, both businesses and governments are unable to offer many services online, because they cannot effectively identify the individuals with whom they interact Spoofed websites, stolen passwords, and compromised accounts are all symptoms of inadequate authentication mechanisms."
United States. White House Office
2011-04
-
National Strategy to Combat Identity Theft
"Identity theft has swiftly become a serious issue for victims, police, and prosecutors, and is a problem that is requiring an increased commitment of resources by private enterprise. The Major Cities Chiefs Association (MCCA) recognized the severity of this problem in 2003 and surveyed its members to explore police-related identity theft issues. Survey results demonstrated that deterring identity theft was impeded for the most part because police departments were functioning in isolation from each other and other parts of the criminal justice system. The MCCA concluded that new levels of prevention, response, and collaboration were needed to stop this rapidly increasing crime. To gain greater insight into the challenges facing police in responding to the identity theft problem, the MCCA and the DPSL conducted two surveys to obtain a broad base of information from police and others on the problem and potential solutions. The project also organized two focus groups comprising police, prosecutors, federal officials, victim assistance professionals, and representatives from the private sector. The first focus group discussed the problem in detail, shared experiences, and provided the background needed to develop the surveys. The second focus group discussed the survey results, framed recommendations for a national response to identity theft, and identified best practices. Participants are listed in Appendix B. This report, A National Strategy to Combat Identity Theft, describes the components of a national strategy, the interrelationships of the components, and best practices to illustrate each component."
United States. Department of Justice. Office of Community Oriented Policing Services
2006-05
-
National Strategy to Secure Cyberspace
The Nation's critical infrastructure includes hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables known as cyberspace. The National Strategy to Secure Cyberspace outlines the United States' national strategy to combat the increasing vulnerability of cyber attacks. The strategic objectives run consistent with the National Strategy for Homeland Security: to prevent cyber attacks against America's critical infrastructures; to reduce national vulnerability to cyber attacks; and to minimize damage and recovery time from cyber attacks that do occur. The National Strategy to Secure Cyberspace explains the five national priorities for cyberspace security: (1) a national cyberspace security response system; (2) a national cyberspace security threat and vulnerability reduction program; (3) a national cyberspace security awareness and training program; (4) Securing governments' cyberspace; and (5) national security and international cyberspace security cooperation. Moreover, the stated purpose of this document is "to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact."
United States. White House Office
2003-02
1