Jennifer McArdle
![](https://csbaonline.org/uploads/images/Victory_Domains_270-342_pdf_Cover.jpg)
It is impossible to deny an adversary's ability to shape aspects of the information environment, to include spoofing and sabotaging ICT-based warfighting systems. The U.S. military's goal should instead be to sustain military operations in spite of a denied, disrupted, or subverted information environment. This requires a paradigm shift away from information assurance to mission assurance. U.S. warfighters should be trained to fight in and through an increasingly contested and complex battlespace saturated by adversary cyber and information operations. This report engages in a detailed analysis of current and future cyber and informationized training for the non-cyber warfighter. It provides initial recommendations as to how training systems, scenarios, models, and simulations can evolve to better reflect the complexities of a rapidly changing information-rich combat environment.
No comments:
Post a Comment