Information Exploitation

New Century’s Information Exploitation model gives law enforcement and military commanders in counterinsurgency environments an operational methodology with which to build the capacity to degrade and defeat adversaries. Enemy information systems and decision making can be influenced, disrupted, corrupted or usurped with this programme, which also helps protect partner nation information systems. This model is currently providing extensive support to operations in the information battle against the so-called Islamic State.

2017-11-01T17:30:12+00:00