We need to find ways to passively and actively neutralize adversarial operations. This needs to be considered a primary option. We need to identify, disrupt, neutralize, penetrate and exploit adversaries. We need to utilize denial and deception activities. We need to manipulate and control messaging. We need to maintain information superiority against our adversaries.