Vulnerabilities of Multi-Domain Command and Control (Part 2)
Part 2 of the series focuses on how a peer adversary may leverage cyber, space, and EW threats against command and control capabilities, and how these effects may be mitigated through the distribution of authorities to smaller teams.
Read more