The future operating environment compels us to exhaust all possibilities to protect our C2 and information networks while simultaneously exploiting networking to put ourselves into position to gain all the possible advantages thereof. This includes operating with ruthless prioritization of information sharing between the various command echelons while being prepared to operate with imperfect information. We must take into account the role of signature in offense and defense to mitigate the enemy’s targeting of our network and exploit enemy C2 vulnerabilities. We must shorten the kill chain by networking for rapid/precise fires and pushing processing power to the tactical edge. Lastly, we must utilize an enhanced concept of intelligence to rapidly sense, make sense of, and act upon information.