View the Executi" /> Maintaining Information Dominance in Complex Environments

Text Browser Navigation Bar: Main Site Navigation and Search | Current Page Navigation | Current Page Content

U.S. Army War College >> Strategic Studies Institute >> Publications >> Maintaining Information Dominance in Complex Environments

Login to "My SSI" Contact

U.S. Army War College >> Strategic Studies Institute >> Publications >> Details

Maintaining Information Dominance in Complex Environments

Authored by Dr. John A. S. Ardis, Dr. Shima D. Keene.

Maintaining Information Domina... Cover Image
  • Added October 03, 2018
  • Type: Monograph
  • 85 Pages
  • Download Format: PDF
  • Cost: Free

  • Share |

Brief Synopsis

View the Executive Summary

There are many risks to the U.S. Army’s command and control (C2) operations and to its intelligence and information warfare (IW) capabilities. The challenges include: significant uncertainty; sudden unexpected events; high noise and clutter levels in intelligence pictures; basic and complex deceptions exercised through a variety of channels; the actions of hidden malign actors; and novel forms of attack on U.S. and allied command, control, communications, computers, information/intelligence, surveillance, targeting acquisition, and reconnaissance (C4ISTAR) systems.

If the U.S. Army is to secure and maintain information dominance in all environments, it must exploit complexity and uncertainty in the battlespace and not simply seek to overcome it. Innovation requires that new ideas are considered, and that old ideas should be robustly challenged. To achieve and maintain information dominance, the U.S. Army will also require a significant injection of innovation, a robust and resilient C2 and intelligence capability, novel technologies and an accelerated information operations capability development program that is broad, deep, sustained and well-coordinated. Furthermore, once information dominance is achieved, maintaining it will demand continuous change and development.

You may also be interested in the following titles:

Survey: Maintaining Information Dominance in Complex Environments

1. How would you rate the writing and overall quality? (5 best - 1 Worst)

2. Is the content relevant for influencing present and future debates?

Also by the Authors/Editor:

Extremist Migration: A Foreign Jihadist Fighter Threat Assessment
Silent Partners: Organized Crime, Irregular Groups, and Nation-States
Exit Strategy: Rule of Law and the U.S. Army
Corruption, Legitimacy, and Stability: Implications for the U.S. Army
Lethal and Legal? The Ethics of Drone Strikes
The Effective Use of Reserve Personnel in the U.S. Military: Lessons from the United Kingdom Reserve Model
Operationalizing Counter Threat Finance Strategies

View other pubs in the following categories:

Military Change and Transformation
Military Strategy and Policy
War and Society

  • Download it Now!

    • Download Format: PDF
    • PDF File Size: 2.97MB
  • Hardcopies

    • Study is: Available via Download Only
    • For out of stock or digital only publications, refer to the new GPO on-demand site. For a small fee, receive many prior publications. Click here to visit.
    • All materials on our website are available as a free download.