In a changing operational environment, where command posts are increasingly vulnerable, intent can serve as a stealth enabler. A communicated commander’s intent can serve as a way to limit electronic ...