<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type='text/xsl' href='/Content/StratML.xslt'?>
<PerformancePlanOrReport>
  <Name>Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command</Name>
  <Description>Our purpose is to achieve cyberspace superiority by seizing and maintaining the tactical and operational initiative in cyberspace, culminating in strategic advantage over adversaries. Our efforts will increase our freedom of maneuver, create friction for adversaries, and cause them to shift resources to defense. We will erode their belief that hostile activities in cyberspace against the United States and its allies are advantageous. We will meet the 2018 National Defense Strategy’s mandate to hold adversaries accountable for cyber-attacks</Description>
  <OtherInformation>Imperatives ~ The following imperatives support this guidance. Our imperatives are mutually supporting, with success in one enhancing success in the others. They dictate what we must do in order to retain the initiative in cyberspace. Attaining and sustaining these imperatives creates uncertainty for our adversaries and makes them hesitate to confront the United States. We must identify obstacles to achieving our goals, develop and implement plans to overcome those obstacles, and establish meaningful metrics to gauge our progress.</OtherInformation>
  <!--Strategic Plan Core-->
  <StrategicPlanCore>
    <Organization>
      <Name>US Cyber Command</Name>
      <Acronym>USCYBERCOM</Acronym>
      <Identifier>Organization_36a07488-901c-4dcf-8ab4-2de39e222335</Identifier>
      <Description>
      </Description>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>Defense Information Systems Agency (DISA)</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>U.S. Department of Defense</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Organization">
        <Name>National Security Agency (NSA)</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Military Departments</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Commanders</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Combatant Commands</Name>
        <Description>USCYBERCOM will contribute to our national strategic deterrence. We
will prepare, operate, and collaborate with combatant commands, services,
departments, allies, and industry to continuously thwart and contest hostile
cyberspace actors wherever found.</Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Policymakers</Name>
        <Description>We will keep policymakers and commanders apprised of cyberspace threats, the
operating environment, and changes needed in policies and processes to achieve
superiority.</Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Intelligence Community</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Military Allies</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>USCYBERCOM Partners</Name>
        <Description>We will attract new partners and strengthen ties with critical mission partners—particularly the Defense Information Systems Agency (DISA), the National Security Agency (NSA), and the rest of the Intelligence Community. We will enable and bolster our partners. We will share our insights in order to anticipate evolving cyberspace threats and opportunities.</Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Military Services</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Cyberspace Military Forces</Name>
        <Description>We will execute our new responsibilities that accompany elevation to
a Unified Combatant Command, emphasizing mission and operational outcomes
and enhancing the readiness of the nation’s cyberspace military forces.</Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Industry</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>USCYBERCOM Chief of Staff</Name>
        <Description>The USCYBERCOM Chief of Staff will oversee the assessment function, and all campaign plan assessments are to be reported to the USCYBERCOM Commander.</Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>Gen. Paul M. Nakasone</Name>
        <Description>Commander, USCYBERCOM</Description>
      </Stakeholder>
    </Organization>
    <Vision>
      <Description>Achieve and maintain superiority in the cyberspace domain to influence adversary behavior, deliver strategic and operational advantages for the Joint Force, and defend and advance our national interests.</Description>
      <Identifier>Vision_13b80064-653d-4a3c-8357-7b90e71c9722</Identifier>
    </Vision>
    <Mission>
      <Description>To achieve cyberspace superiority by seizing and maintaining the tactical and operational initiative in cyberspace, culminating in strategic advantage over adversaries.</Description>
      <Identifier>Mission_13b80064-653d-4a3c-8357-7b90e71c9722</Identifier>
    </Mission>
    <Value>
      <Name>Diplomacy</Name>
      <Description>The second risk is diplomatic. We recognize that adversaries already condemn US efforts to defend our interests and allies as aggressive, and we expect they will similarly seek to portray our strategy as “militarizing” the cyberspace domain. The Command makes no apologies for defending US interests as directed by the President through the Secretary of Defense in a domain already militarized by our adversaries.</Description>
    </Value>
    <Value>
      <Name>Oversight</Name>
      <Description>The USCYBERCOM Chief of Staff will oversee the assessment function, and all campaign plan assessments are to be reported to the USCYBERCOM Commander.</Description>
    </Value>
    <Value>
      <Name>Engagement</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Risk Management</Name>
      <Description>We are risk aware, not risk averse. | Risk Mitigation ~ The approach described in this document entails two primary risks.</Description>
    </Value>
    <Value>
      <Name>Information Sharing</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Perspective</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Change</Name>
      <Description>The FCP-CO is a living document requiring regular updates to reflect changes in priorities, doctrine, capabilities, and the operating environment.</Description>
    </Value>
    <Value>
      <Name>Resiliency</Name>
      <Description>The first concerns the employment of a high-demand, low-density maneuver force.
The prioritization of highly capable states and violent extremists means the Command will devote comparatively fewer resources and less attention to other cyber actors. The Command will seek to mitigate this risk indirectly by increasing resiliency in DOD systems against all threats in order to render most malicious activity inconsequential, and directly by sharing intelligence and operational leads with partners in law enforcement, homeland security (at the federal and state levels), and the Intelligence Community.</Description>
    </Value>
    <Value>
      <Name>Effectiveness</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Integration</Name>
      <Description>We champion integrated, scalable solutions.</Description>
    </Value>
    <Value>
      <Name>Communication</Name>
      <Description>Each Service cyber component, Joint Force headquarters, and staff directorate should embrace this guidance, communicate it to the workforce, work to implement it, and ensure all personnel understand their role and functions—all the while providing direct feedback on the effectiveness of its execution.</Description>
    </Value>
    <Value>
      <Name>Empowerment</Name>
      <Description>We empower our workforce.</Description>
    </Value>
    <Value>
      <Name>Unification</Name>
      <Description>Mitigation of these primary risks will occur in parallel with the Command’s assumption of unified combatant command status and, if directed, its conditions-based approach to termination of the current dual-hat command relationship with the NSA.</Description>
    </Value>
    <Value>
      <Name>Foresight</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Strategic Advantage</Name>
      <Description>WE SUSTAIN
STRATEGIC
ADVANTAGE BY
INCREASING
RESILIENCY,
DEFENDING
FORWARD, AND
CONTINUOUSLY
ENGAGING OUR
ADVERSARIES.</Description>
    </Value>
    <Value>
      <Name>Unity</Name>
      <Description>We are one cyber enterprise.</Description>
    </Value>
    <Value>
      <Name>Principles</Name>
      <Description>THE FOLLOWING
PRINCIPLES
GUIDE US CYBER
COMMAND</Description>
    </Value>
    <Value>
      <Name>Civil Liberties</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Continuity</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Explanation</Name>
      <Description>We will also explain to oversight entities and the public the nature of threats in cyberspace, the threatening conduct of our adversaries, the limitations of passive defenses, and our scrupulous regard for civil liberties and privacy.</Description>
    </Value>
    <Value>
      <Name>Continuous Improvement</Name>
      <Description>The FCP-CO Assessment is the process for assessing implementation, and for discovering, validating, and approving changes to drive continuous improvement.</Description>
    </Value>
    <Value>
      <Name>Cooperation</Name>
      <Description>To the maximum extent possible, we will operate in concert with allies and coalition partners.</Description>
    </Value>
    <Value>
      <Name>Sustainability</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Scalability</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Feedback</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Implementation</Name>
      <Description>Implementation ~ This guidance informs our operations, structure, and resource requirements. The Functional Campaign Plan for Cyberspace operations (FCP-CO) constitutes the implementation plan for this guidance.</Description>
    </Value>
    <Value>
      <Name>Competition</Name>
      <Description>We compete by employing a long-term, campaign mindset.</Description>
    </Value>
    <Value>
      <Name>Assessment</Name>
      <Description>The key to success is execution, and everyone has a part in this effort.</Description>
    </Value>
    <Value>
      <Name>Reach</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Seamlessness</Name>
      <Description>WE WILL OPERATE
SEAMLESSLY,
GLOBALLY, AND
CONTINUOUSLY.</Description>
    </Value>
    <Value>
      <Name>Privacy</Name>
      <Description>
      </Description>
    </Value>
    <Value>
      <Name>Synergy</Name>
      <Description>Regardless of whether, when, or how the “dual hat” terminates, however, we will adopt a comprehensive risk management approach to maintain synergy between operational objectives and the intelligence required to inform and sustain effective cyberspace operations.</Description>
    </Value>
    <Goal>
      <Name>Capabilities</Name>
      <Description>Achieve and sustain overmatch of adversary capabilities.</Description>
      <Identifier>Goal_93110f10-c6e1-44e3-a2ee-d98830426e4a</Identifier>
      <SequenceIndicator>1</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Cybersecurity Personnel</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Technology</Name>
        <Description>Anticipate and identify technological changes, and exploit and operationalize emerging technologies and disruptive innovations faster and more effectively than our adversaries.</Description>
        <Identifier>Objective_d9c2ab8a-4fc0-464d-9fa0-099bbcef2c84</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Scalability &amp; Transfer</Name>
        <Description>Rapidly transfer technologies with military utility to scalable operational capabilities.</Description>
        <Identifier>Objective_05570f41-686d-4a4b-927f-f41ce6e9d53d</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Empowerment</Name>
        <Description>Enable our most valuable assets—our people—in order to gain advantages in cyberspace.</Description>
        <Identifier>Objective_1086d3c2-df98-483a-a52a-058abcc46731</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Readiness</Name>
        <Description>Ensure the readiness of our forces.</Description>
        <Identifier>Objective_07afc166-3ad4-4158-ab71-ffd7296a1c50</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Cybersecurity Personnel</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Operations</Name>
      <Description>Create cyberspace advantages to enhance operations in all domains.</Description>
      <Identifier>Goal_a41edcec-cc97-4b82-8f9f-70b8aca5e00e</Identifier>
      <SequenceIndicator>2</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Preparation &amp; Execution</Name>
        <Description>Develop advantages in preparation for and during joint operations in conflict, as well as below the threshold of armed conflict.</Description>
        <Identifier>Objective_38a59b77-9b28-4d52-8842-36f7f1aa8361</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Plans &amp; Operations</Name>
        <Description>Integrate cyberspace capabilities and forces into plans and operations across all domains.</Description>
        <Identifier>Objective_8e5f31fc-de94-487b-80e7-0b214de4b26a</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Information &amp; Impact</Name>
      <Description>Create information advantages to support operational outcomes and achieve
strategic impact.</Description>
      <Identifier>Goal_12bda9ce-7170-4c10-8c8f-369d28233a82</Identifier>
      <SequenceIndicator>3</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Joint Force Commanders</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Warfare</Name>
        <Description>Enhance information warfare options for Joint Force commanders.</Description>
        <Identifier>Objective_d6aaed02-10a0-40d8-aefc-179c77799453</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Joint Force Commanders</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Operations</Name>
        <Description>Integrate cyberspace operations with information operations.</Description>
        <Identifier>Objective_6dab1f35-bb41-4335-b6da-91739417c771</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Unification &amp; Motivation</Name>
        <Description>Unify and drive intelligence to support cyberspace operations and information operations.</Description>
        <Identifier>Objective_81ceb451-f338-45a9-85a9-2015384470c9</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Capabilities &amp; Products</Name>
        <Description>Integrate all intelligence capabilities and products to improve mission outcomes for the Joint Force and the nation.</Description>
        <Identifier>Objective_81d31e03-c319-4dfa-8ccc-7757779a1373</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Battlespace</Name>
      <Description>Operationalize the battlespace for agile and responsive maneuver.</Description>
      <Identifier>Goal_c023fb16-88b4-457a-894f-94a3c825c22d</Identifier>
      <SequenceIndicator>4</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Speed &amp; Agility</Name>
        <Description>Facilitate speed and agility for cyberspace operations in policy guidance, decision-making processes, investments, and operational concepts.</Description>
        <Identifier>Objective_4965e686-696f-42a1-80e5-861892150480</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Alignment</Name>
        <Description>Ensure every process aligns to the cyberspace operational environment.</Description>
        <Identifier>Objective_0346587a-063f-4f4d-ad18-f0faedda9973</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>Ensure every process—from target system analysis to battle damage assessment, from requirements identification to fielded solutions, and from initial force development concepts to fully institutionalized force-management activities—aligns to the cyberspace operational environment.</OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
    <Goal>
      <Name>Partnerships</Name>
      <Description>Expand, deepen, and operationalize partnerships.</Description>
      <Identifier>Goal_e708ab71-9660-4be2-ad82-1d8452dc13c8</Identifier>
      <SequenceIndicator>5</SequenceIndicator>
      <OtherInformation>
      </OtherInformation>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Military Services</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Private Sector</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Government Agencies</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Academia</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Allies</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Government Agencies</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Generic_Group">
        <Name>Private Sector</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Stakeholder StakeholderTypeType="Individual">
        <Name>unnamed stakeholder</Name>
        <Description>
        </Description>
      </Stakeholder>
      <Objective>
        <Name>Talents, Expertise &amp; Products</Name>
        <Description>Leverage the talents, expertise, and products in the private sector, other agencies, Services, allies, and academia.</Description>
        <Identifier>Objective_a2ac5f15-0b12-4894-ae94-bca24a8b8dba</Identifier>
        <SequenceIndicator>1</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Academia</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Private Sector</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Military Services</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Government Agencies</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Allies</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Advances</Name>
        <Description>Rapidly identify and understand cyberspace advances wherever they originate and reside.</Description>
        <Identifier>Objective_8c59a888-bdc6-4604-9898-222344740d33</Identifier>
        <SequenceIndicator>2</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Threats</Name>
        <Description>Increase the scope and speed of private sector and interagency threat
information sharing, operational planning, capability development, and joint exercises.</Description>
        <Identifier>Objective_9d12dd17-6e4a-4942-9a71-6d1e3dea874f</Identifier>
        <SequenceIndicator>3</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Private Sector</Name>
          <Description>
          </Description>
        </Stakeholder>
        <Stakeholder StakeholderTypeType="Generic_Group">
          <Name>Government Agencies</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
      <Objective>
        <Name>Empowerment</Name>
        <Description>Enable and bolster our partners.</Description>
        <Identifier>Objective_a944504f-995e-4367-af10-889eb3cc1ecd</Identifier>
        <SequenceIndicator>4</SequenceIndicator>
        <OtherInformation>
        </OtherInformation>
        <Stakeholder StakeholderTypeType="Individual">
          <Name>unnamed stakeholder</Name>
          <Description>
          </Description>
        </Stakeholder>
      </Objective>
    </Goal>
  </StrategicPlanCore>
  <!--Administrative Information-->
  <AdministrativeInformation>
    <Identifier>StrategyPlan_13b80064-653d-4a3c-8357-7b90e71c9722</Identifier>
    <StartDate>
    </StartDate>
    <EndDate>
    </EndDate>
    <PublicationDate>2025-12-23</PublicationDate>
    <Source>https://www.stratnavapp.com/StratML/Part2/13b80064-653d-4a3c-8357-7b90e71c9722/Styled</Source>
    <Submitter>
      <Identifier>Submitter_13b80064-653d-4a3c-8357-7b90e71c9722</Identifier>
      <GivenName>Owen</GivenName>
      <Surname>Ambur</Surname>
      <PhoneNumber>
      </PhoneNumber>
      <EmailAddress>
      </EmailAddress>
    </Submitter>
  </AdministrativeInformation>
</PerformancePlanOrReport>