It’s a battlefield scenario: two Air Force pilots have intercepted an enemy aircraft. One pilot transmits a command to engage the hostile aircraft through encrypted data link communication with minimal voice communication. The second pilot responds through the same data link, complying with the