(A) Within 30 days of the date of this memorandum, the NSA shall review CNSS Policy 15 and provide to CNSS any updates or modifications regarding the approved list of commercial national security algorithms (CNSA).
(i) systems that facilitate the support or conduct of military, intelligence, or sensitive law enforcement activities where the head of the agency determines that implementation of these requirements is not practicable or is contrary to national security;
(c) Nothing in this memorandum confers the authority to interfere with or to direct a counterintelligence, personnel, criminal, or national security investigation, arrest, search, seizure, or disruption operation or to alter a legal restriction that requires an agency to protect information learned in the course of a counterintelligence, personnel, criminal, or national security investigation.
The NWC mission is to educate future leaders of the Armed Forces, Department of State, and other civilian agencies for high-level policy, command and staff responsibilities by conducting a senior-level course of study in national security strategy.
A National Security Strategy Primer provides students with a common point of reference for material covered in the National War College curriculum. We use the Primer as a point of departure for discussions about strategy, and as a principal tool for understanding and achieving core course learning objectives. The Primer specifically addresses the concept of national security strategy and an approach for developing it, one that should be studied closely. In addition to using current joint and service-specific doctrine, extant procedures, and existing policy guidance, A National Security Strategy Primer uses the literature on national security strategy found in academia, the business sector, and elsewhere. While the Primer is geared towards the National War College core curriculum, it can also serve as a useful tool for interagency practitioners charged with designing or assessing national security strategies.
The importance of defending the nation against cyber threats is critical to national and homeland security. The magnitude of current and emerging cyber threats is equal to and may in actuality surpass traditional threats. The asymmetrical nature of cyber provides to minor nation-state enemies and even lone wolf actors the ability to inflict great harm to a great military power like the United States. Criminals do and will continue to exploit cyber to their advantage rendering many aspects of traditional crime prevention ineffective or obsolete. Stopping and preventing foreign threats at the border has been and always will be a key element in protecting the nation and its people. Adapting and evolving our definition of the border to define a national cyber border will help deny this pathway for foreign threats into our country.
As a cybersecurity professional, you will work with a team on the frontlines of defense against cyber adversaries. We need cybersecurity professionals with technical expertise and a driving desire to remain at the forefront of their field. Help protect national security interests as part of the world's most advanced team of cyber professionals.
Illegal drug activities and crime continue. After the murder of Arizona rancher Robert Krentz on March 27, 2010, the day after the Border Patrol seized 290 pounds of marijuana near his ranch,9 there have been calls for increased security along the border.10 The governors and adjutants general of Arizona, California, New Mexico, and Texas requested that the Obama Administration create a new federal border mission along the lines of Operation Jump Start from 2006.11 Following the murder of Krentz, Governor Bill Richardson of New Mexico ordered the National Guard to patrol the border in order to ensure the safety of New Mexico citizens.12 And while Governor Jan Brewer of Arizona has requested federal troops to protect the border, she has not invoked her authority, as Governor Richardson did, citing Arizona's troubled finances as prohibiting such an act.13 Additionally, Members of Congress have called for the deployment of National Guard troops along the southern border to "combat illegal immigration, drug and alien smuggling, and violent activity."14
In 2004, Congress passed another law that could arguably provide federal funding for National Guard personnel conducting border security operations under Title 32.40 In the event of a "homeland defense activity," Chapter 9 of Title 32 of the U.S. Code authorizes the Secretary of Defense to provide federal funding at his discretion to a state, under the authority of the governor of that state, for the use of its National Guard forces if their participation is "necessary and appropriate."41 A "homeland defense activity" is statutorily defined as "an activity undertaken for the military protection of the territory or domestic population of the United States ... from a threat or aggression against the United States."42 Although a deployment of National Guard troops for border security purposes could arguably be an activity "undertaken for the military protection" of a "domestic population," it is unclear whether the porous nature of the border or illegal entry of aliens is the type of "threat" or "aggression" that would be "necessary and appropriate" for National Guard troops.
State of New Mexico, "Governor Bill Richardson Orders National Guard to Patrol the Mexican Border," press release, March 31, 2010, available at -statement/495232/governor-bill-richardson-orders-national-guard-to-patrol-the-mexican-border#.ULy-6lHVtOU.
Mickey McCarter, "National Guard To Shift Support To Border Patrol From Ground to Air," HSToday.us, December 12, 2011, available at -news/single-article/national-guard-to-shift-support-to-border-patrol-from-ground-to-air/ce6261d012f629471dc83d01a590ffaf.html.
DOD Directive 3160.01, Homeland Defense Activities Conducted by the National Guard (August 25, 2008), implementing Sections 901-908 of Title 32, does not provide additional guidance as to the question of whether border security operations could be considered homeland defense activities and thus eligible for DOD funding to the States.