

This paper explores the challenges of attaining Command and Control (C2), required for success in military, defense, and humanitarian assistance and disaster relief (HA/DR) operations in current information environment (IE). It presents definitions of C2 and IE followed by a summary of Information age-trends that impact these operations. It then surveys some IE technological tools and how they have been exploited by adversaries. An examination of how the North Atlantic Treaty Organization (NATO) has evolved to adapt its C2 architecture to varying crises ensues. Policy recommendations include: 1) adjustments to existing C2 architectures; 2) harnessing the role of transnational corporations; 3) recognizing a new theoretical paradigm wherein all actors can collaborate, compete, and conflict simultaneously on different topics; 4) developing networks, despite different security priorities; 5) developing a networked, interdisciplinary, information threat sharing center; 6) advocating digital fluency, digital literacy, cyber hygiene, and IE-awareness; 7) encouraging definitions and thresholds at national, regional, and NATO levels; 8) utilizing social network analysis cautiously to prevent data biases; 9) encouraging training and exercising at local, national, and international levels; and 10) applying other national and regional solutions.