Obama’s Security Strategy Features Robust Leadership, Limitations

Obama’s Security Strategy Features Robust Leadership, Limitations

The President’s second, and final, national security strategy focuses on limiting how much the United States can shape world events

President Obama’s second national security strategy will lay out a blueprint for American leadership during his remaining tenure in office as well as recognize the limitations of the United States in terms of shaping world events, according to reports. This will be his final security strategy while in office.

His strategy will defend the handling of crises like those in the Middle East and Ukraine while noting the need for balance with focus on challenges such as climate change, global health and cyberattacks.

“On all these fronts, America leads from a position of strength,” says his statement. “But this does not mean we can or should attempt to dictate the trajectory of all unfolding events around the world. As powerful as we are and will remain, our resources and influence are not infinite. And in a complex world, many of the security problems we face do not lend themselves to quick and easy fixes.”

This plan has garnered backlash from the opposing party, suggesting that the president should be more assertive in dealing with immediate threats such as ISIS.

President Obama’s first national security strategy, which was released in 2010, focused on ending the wars in Afghanistan and Iraq, rebuilding ties with Russia and reviving the world economy.

The new strategy lists eight top risks to the United States, starting with a catastrophic attack at home while also including climate change, disruptions in the energy market and significant problems caused by weak or failing states.

The strategy calls on the United States to increase its efforts to shape global norms and practices, not only online but also in space and on the seas, where the administration fears that China is trying to dominate lanes of traffic and keep the United States and others at bay.

About the Author

Matt Holden is an Associate Content Editor for 1105 Media, Inc. He received his MFA and BA in journalism from Ball State University in Muncie, Indiana. He currently writes and edits for Occupational Health & Safety magazine, and Security Today.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3