Richard Stiennon discusses the evolution of network-centric warfare and how the military's overreliance on networked technology without proper security precautions has increased vulnerabilities. He outlines several past security failures in the military's use of IT and argues we could see a "cyber pearl harbor" if an adversary is able to gain information dominance by hacking networks and systems to disrupt communications and sensor grids during a future conflict. Stiennon warns that vulnerabilities in platforms like the F-35 could allow an enemy to subvert mission tasking and potentially achieve military defeat through cyber attacks.