<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="part2stratml.xsl"?>
<PerformancePlanOrReport xmlns="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

 xsi:schemaLocation="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport http://stratml.us/references/PerformancePlanOrReport20160216.xsd" Type="Strategic_Plan"><Name>NATIONAL STRATEGY for CRITICAL AND EMERGING TECHNOLOGIES</Name><Description>The National Strategy for C&amp;ET, in accordance with the National Security Strategy (NSS), unifies the United States Government effort to maintain worldwide C&amp;ET leadership with our allies and partners. The United States will lead in the highest-priority C&amp;ET areas, contribute as a peer with allies and partners in high-priority C&amp;ET areas, and manage technology risk in other C&amp;ET areas. Worldwide C&amp;ET leadership will be maintained by promoting our NSIB and protecting our technology advantage.</Description><OtherInformation>UNITED STATES GOVERNMENT CRITICAL AND EMERGING TECHNOLOGIES LIST -- The Critical and Emerging Technologies (C&amp;ET) list reflects the 20 technology areas that United States Government Departments and Agencies identified to the National Security Council staff as priorities for their missions. The list will be reviewed and updated annually via the interagency process coordinated by the National Security Council staff. The technology areas are arranged alphabetically.
* Advanced Computing
* Advanced Conventional Weapons Technologies
* Advanced Engineering Materials
* Advanced Manufacturing
* Advanced Sensing
* Aero-Engine Technologies
* Agricultural Technologies
* Artificial Intelligence
* Autonomous Systems
* Biotechnologies
* Chemical, Biological, Radiological, and Nuclear (CBRN) Mitigation Technologies
* Communication and Networking Technologies
* Data Science and Storage
* Distributed Ledger Technologies
* Energy Technologies
* Human-Machine Interfaces
* Medical and Public Health Technologies
* Quantum Information Science
* Semiconductors and Microelectronics
* Space Technologies</OtherInformation><StrategicPlanCore><Organization><Name>President of the United States</Name><Acronym>POTUS</Acronym><Identifier> _90e51e86-bcc3-40fb-9a48-6480d35f44aa</Identifier><Description/><Stakeholder><Name/><Description/></Stakeholder></Organization><Vision><Description>The United States, with its allies and partners, continues to be the world leader in critical and emerging technologies (C&amp;ET)</Description><Identifier>_2e4e92ec-41b2-11eb-97c3-54b41b83ea00</Identifier></Vision><Mission><Description>To unify the United States Government effort to maintain worldwide C&amp;ET leadership with our allies and partners</Description><Identifier>_2e4e94ea-41b2-11eb-97c3-54b41b83ea00</Identifier></Mission><Value><Name>Technology</Name><Description/></Value><Value><Name>Innovation</Name><Description/></Value><Value><Name>Leadership</Name><Description>Technology Leader -- The United States will lead in the highest-priority technology areas to ensure its national security and economic prosperity. Technology leadership will require forecasting, prioritization due to limited resources, coordination with allies and partners, appropriate investments early in the development cycle, and periodic re-evaluation as technologies mature.</Description></Value><Value><Name>Partnership</Name><Description>Technology Peer -- As leadership is achieved or maintained in the highest-priority technology areas, the United States will remain a technology peer with its allies and partners in other high-priority technology areas. The United States will work with its allies and partners to advance C&amp;ET based on a foundation of mutual benefit, teamwork, security, and proportional investment. The United States can share its talents and capabilities with allies and partners, and mutually benefit from access to the full breadth of C&amp;ET available within the trusted community.</Description></Value><Value><Name>Risk Management</Name><Description>Technology Risk Management -- Some emerging technologies are globally diffuse or are too early in the R&amp;D phase to have clearly identified implications for United States national security. In those cases, a risk management approach will be applied to gauge national security implications, inform investments, and monitor development. In managing risk, the United States Government will first identify, evaluate, and prioritize its technology risks, followed by a coordinated response to avoid, reduce, accept, or transfer risk.</Description></Value><Goal><Name>National Security</Name><Description>PROMOTE THE NATIONAL SECURITY INNOVATION BASE</Description><Identifier>_2e4e95da-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>PILLAR I</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Promoting the NSIB requires a sustained, long-term investment in all aspects of the NSIB, from science, technology, engineering, and mathematics (STEM) education; an advanced technical workforce; and early-stage R&amp;D to innovation-friendly regulations; venture capital; collaboration between government, academia, and the private sector; and working with allies and partners.
Priority Actions -- The following actions will be considered or undertaken to promote C&amp;ET development, and are not listed in any particular order: </OtherInformation><Objective><Name>S&amp;T Workforce</Name><Description>Develop the highest-quality science and technology (S&amp;T) workforce in the world</Description><Identifier>_2e4e968e-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.A</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>S&amp;T Workforce</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Inventors &amp; Innovators</Name><Description>Attract and retain inventors and innovators</Description><Identifier>_2e4e972e-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.B</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Inventors</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Innovators</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Capital &amp; Expertise</Name><Description>Leverage private capital and expertise to build and innovate</Description><Identifier>_2e4e97c4-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.C</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Private Sector</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Inventions &amp; Innovations</Name><Description>Rapidly field inventions and innovations</Description><Identifier>_2e4e9922-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.D</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Regulations, Policies &amp; Bureaucracy</Name><Description>Reduce burdensome regulations, policies, and bureaucratic processes that inhibit innovation and industry growth</Description><Identifier>_2e4e99cc-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.E</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Norms, Standards &amp; Governance</Name><Description>Lead the development of worldwide technology norms, standards, and governance models that reflect democratic values and interests</Description><Identifier>_2e4e9a8a-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.F</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>National Security Innovation Base</Name><Description>Support the development of a robust National Security Innovation Base (NSIB), to include academic institutions, laboratories, supporting infrastructure, venture funding, supporting businesses, and industry</Description><Identifier>_2e4e9b7a-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.G</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Academic Institutions</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Laboratories</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Infrastructure Providers</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Venture Capitalists</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Businesses</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Industry</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>R&amp;D Budgets</Name><Description>Increase priority of research and development (R&amp;D) in developing United States Government budgets</Description><Identifier>_2e4e9c2e-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.H</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Advanced Applications</Name><Description>Develop and adopt advanced technology applications within government and improve the desirability of the government as a customer of the private sector</Description><Identifier>_2e4e9cd8-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.I</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Private Sector</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Public-Private Partnerships</Name><Description>Encourage public-private partnerships</Description><Identifier>_2e4e9dd2-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.J</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Ally Partnerships</Name><Description>Build strong and lasting technology partnerships with like-minded allies and partners and promote democratic values and principles</Description><Identifier>_2e4e9e7c-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.K</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Allies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Partners</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Messaging</Name><Description>With the private sector, create positive messaging to increase public acceptance of critical and emerging technologies (C&amp;ET)</Description><Identifier>_2e4e9f26-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.L</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Private Sector</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>The Public</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>State &amp; Local Governments</Name><Description>Encourage state and local governments to adopt similar actions</Description><Identifier>_2e4e9fda-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>I.M</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>State Governments</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Local Governments</Name><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Technology</Name><Description>PROTECT TECHNOLOGY ADVANTAGE</Description><Identifier>_2e4ea08e-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>PILLAR II</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>A second way to maintain and improve American leadership in C&amp;ET is to protect our technology advantage both domestically and in conjunction with likeminded allies and partners.  The United States does not tolerate intellectual property theft, the exploitation of open scientific norms, or economic aggression regarding C&amp;ET. Relationships will be rooted in fairness, reciprocity, and faithful adherence to agreements. Protecting the United States technology advantage includes strengthening rules where gaps exist, enforcing agreements, and working with like-minded allies and partners to ensure our common principles prevail. Another part of protecting the United States technology advantage is defending our NSIB, which requires domestic and international collaboration between companies, industries, universities, and government agencies. The United States will also stand with allies and partners to oppose attacks on their respective NSIBs.
Priority Actions -- The following actions will be considered or undertaken to protect C&amp;ET technology advantage, and are not listed in any particular order:</OtherInformation><Objective><Name>IP, Research &amp; Technologies</Name><Description>Ensure that competitors do not use illicit means to acquire United States intellectual property, research, development, or technologies</Description><Identifier>_2e4ea142-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.A</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Security</Name><Description>Require security design early in the technology development stages, and work with allies and partners to take similar action</Description><Identifier>_2e4ea200-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.B</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Allies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Partners</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Research Security</Name><Description>Protect the integrity of the R&amp;D enterprise by fostering research security in academic institutions, laboratories, and industry, while balancing the valuable contributions of foreign researchers</Description><Identifier>_2e4ea2be-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.C</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Academic Institutions</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Laboratories</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Industry</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Foreign Researchers</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Export Controls</Name><Description>Ensure appropriate aspects of C&amp;ET are adequately controlled under export laws and regulations, as well as multilateral export regimes</Description><Identifier>_2e4ea37c-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.D</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Processes</Name><Description>Engage allies and partners to develop their own processes similar to those executed by CFIUS</Description><Identifier>_2e4ea444-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.E</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Allies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Partners</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>CFIUS</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Private Sector</Name><Description>Engage with the private sector to benefit from its understanding of C&amp;ET as well as future strategic vulnerabilities related to C&amp;ET</Description><Identifier>_2e4ea50c-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.F</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Private Sector</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Policies, Capabilities &amp; Trends</Name><Description>Assess worldwide S&amp;T policies, capabilities, and trends, and how they are likely to influence, or undermine, American strategies and programs</Description><Identifier>_2e4ea5ca-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.G</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Supply Chains</Name><Description>Ensure secure supply chains, and encourage allies and partners to do the same</Description><Identifier>_2e4ea75a-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.H</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Allies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Partners</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Messaging &amp; Assistance</Name><Description>Message to key stakeholders the importance of protecting technology advantage and offer practical assistance whenever possible</Description><Identifier>_2e4ea82c-41b2-11eb-97c3-54b41b83ea00</Identifier><SequenceIndicator>II.I</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal></StrategicPlanCore><AdministrativeInformation><StartDate>2020-10-31</StartDate><EndDate/><PublicationDate>2020-12-18</PublicationDate><Source>https://www.whitehouse.gov/wp-content/uploads/2020/10/National-Strategy-for-CET.pdf</Source><Submitter><GivenName>Owen</GivenName><Surname>Ambur</Surname><PhoneNumber/><EmailAddress>Owen.Ambur@verizon.net</EmailAddress></Submitter></AdministrativeInformation></PerformancePlanOrReport>