General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

Cyber Dominance Theory, Dominance, General Dominance Theory

The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain.

Continue reading “General Dominance Theory, SECOND EDITION Released”

Your Local Supermarket Holds the Key to Defending Against Distributed Denial of Service Attacks

Your Local Supermarket Holds the Key to Defending Against Distributed Denial of Service Attacks

Cyber, Cyber Creativity

How can you defend your service from a distributed denial of service attack?  The Answer is at the grocery store.  Distribute your service to force your adversary to divide his forces or be ineffective.

The Challenge of Distributed Denial of Service Attacks

A Distributed Denial of Service attack (DDoS) aims to flood a computer providing a service (e.g. a web server) with so many requests from so many different sources that your server is overloaded and service is either degraded (i.e. very slow) or denied (by crashing the server).  This is similar to a website running slowly when it is being used a lot by legitimate users, except that the degradation is deliberate and intends to deny legitimate users access to the service temporarily or permenantly.

Distributed Denial of Service attacks are usually implemented by "botnets" of hacked computers that simultaneously overload your server with requests.
Distributed Denial of Service attacks are usually implemented by “botnets” of hacked computers that simultaneously overload your server with requests.

Continue reading “Your Local Supermarket Holds the Key to Defending Against Distributed Denial of Service Attacks”

CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory

CyberDominance.com is the home of Cyber Dominance Theory (CDT).

Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com.

Introduction to Cyber Dominance Theory

Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals.

  1. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain.
  2. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them.

General Dominance Theory -> Cyber Dominance Theory

General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we will need to do the following:

  1. Define the Cyber Domain and terms of cyber warfare
  2. Define the Six Critical Controls of Cyber Dominance (SCC-C)
  3. Translate the SCCC into a Cyber Warfare Framework

Dominance is what we want in the Cyber Domain, because being dominant means that if we don’t want to be hacked, we won’t get hacked.  If we want to hack, we can.  If we want to communicate, we can.  If we want to deny our adversary’s communications, we can.  Users have the access they need.

GDT defines Dominance as: the state in the battle space where a desired image of reality can be achieved completely despite the will of an adversary.  Therefore, Cyber Dominance is: the state in the Cyber Domain where a desired image of cyber reality can be achieved completely despite the will of an adversary.

The struggle for Cyber Dominance is cyber war, and the actions we take to win the war are all part of Cyber Warfare.  Cyber Warfare is the pursuit of Cyber Dominance.

Perception of Reality (POR) and Ability to Affect Reality (ATA) are required to achieve Dominance, therefore Perception of Reality in the Cyber Domain (POR-C) and Ability to Affect Reality in the Cyber Domain (ATA-C) are required to achieve Cyber Dominance.  Cyber Warfare is also the struggle against an adversary to achieve and retain a perfect ATA-C and POR-C:

According to Cyber Dominance Theory, Cyber Dominance is achieved when you have a perfect Ability to Affect the Cyber Domain (ATA-C) and Perception of the Cyber Domain (POR-C).
According to Cyber Dominance Theory, Cyber Dominance is achieved when you have a perfect Ability to Affect the Cyber Domain (ATA-C) and Perception of the Cyber Domain (POR-C).

Further Reading

The Cyber Dominance Theory page contains a thorough overview of CDT and links to other topics about CDT.  You can also find all CDT publications, tools, and diagrams from that page.

CyberDominance.com is the New Home of General Dominance Theory

CyberDominance.com is the New Home of General Dominance Theory

Dominance, General Dominance Theory

CyberDominance.com is the new home of General Dominance Theory (GDT).

GDT is the basis for Cyber Dominance theory.  It provides guidelines for how to achieve dominance in any domain, including Cyber.  Now all developments in GDT will be published and discussed on CyberDominance.com.

Introduction to General Dominance Theory

General Dominance Theory (GDT) was originally developed as a proposed way to help the US Navy make sense of the Information Domain, and to provide a roadmap on how dominance in the Information Domain (i.e. Information Dominance) could be achieved, and how warfighters could weaponized information.  GDT does not just describe the concept of dominance in the context of military warfare, but also any case where a person or group struggles to achieve their desires.  Business, politics, camping, learning – anything.

In war (or any struggle), our ultimate goal is to make a desired image of reality the actual reality.  We want to change “the way things are” into “the way we want them to be.”  This requires two things: (1) the ability to accurately perceive reality and (2) the ability to affect reality.  If we can do both of these things perfectly, then we can always achieve this goal, and we can always achieve our desires.

The fundamental apparent truth of General Dominance Theory: Success in War (or in any struggle) is ensured if you have a perfect Ability to Affect Reality and a perfect Perception of Reality.
The fundamental apparent truth of General Dominance Theory: Success in War (or in any struggle) is ensured if you have a perfect Ability to Affect Reality and a perfect Perception of Reality.

Further Reading

The General Dominance Theory page contains a thorough overview of GDT and links to other topics about GDT, including how to measure your progress towards dominance.  You can also find all GDT publications, tools, and diagrams from that page.

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Cyber, Cyber Creativity

Why must we live in fear of identity theft?  Why must we pay companies to mitigate the effects of identity theft?  Instead, we can beat cyber hackers and protect against identity theft by fundamentally changing the way we use information to authenticate users.  If hackers steal information because it is valuable, then devaluing that information could negate the threat.  In cases like identity theft, this could make some hacks not worth the effort and could have other social benefits because you can actually share your birthdate with your friends.

Continue reading “Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information”