1. Protect the U.S. homeland and critical bases of operation;
2. Deny enemies sanctuary;
3. Protect and sustain power in access-denied areas; 4. Leverage information technology to connect troops and their operations;
5. Improve and protect information networks from attack;
6. Enhance space operations.
|