Ukraine as a NATO Centre of Excellence: Information Warfare

Ukraine as a NATO Centre of Excellence: Information Warfare

Cyber Dominance
In response to Russia’s increasingly aggressive actions, NATO ought to expedite the Ukraine’s application for member status and, simultaneously, the Ukraine ought to open up an Information Warfare Centre of Excellence in the Ukraine. Russia:  Hybrid Warfare The Russian invasion of “Crimea served as a proving ground for Russian information operations, as well as the larger applications of cyber warfare.  It brought the cyber domain to light among the masses and showed social media to the world as a potent weapon system.”[1] Since 2014, Russia has been conducting military operations in the Ukraine.  At this point “seven percent of Ukrainian territory is now under Russian control. Approximately four and a half million citizens are in areas that are either Russian controlled, Russian occupied, or Russian annexed.”[2] Unlike historic military invasions, Russia…
Read More
Achieve Cyber Dominance: The Six Critical Controls

Achieve Cyber Dominance: The Six Critical Controls

Cyber Dominance, Cyber Dominance Theory
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls of Cyber Dominance Theory. Dominance: It's About Control. Why do we fight in the Cyber Domain? Cyber Dominance Theory answers: so that you can get what you want, when you want it. You want secure data? Done. You want a website with no downtime? You got it. You want Cyber Dominance. The daily struggle to achieve Cyber Dominance is Cyber Warfare. Whether or not you wanted to join the fight, you are a part of it. So prepare to defend yourself - or prepare to be a casualty of the war. Every battle of the Cyber War is about one thing: control. He who has control gets what he wants,…
Read More
Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

Cyber Dominance, Cyber Dominance Theory
The U.S. is falling behind in the cyber war.  We need to quickly synchronize our national strategy and our cyber efforts - including expanding to Information Cyberspace Operations; only then can the U.S. dominate in the Information Domain.  This article explains the context of this fight and proposes a new type of cyberspace operation: the Information Cyberspace Operation. (more…)
Read More
General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

Cyber Dominance Theory, Dominance, General Dominance Theory
The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain. (more…)
Read More
CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory
CyberDominance.com is the home of Cyber Dominance Theory (CDT). Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com. Introduction to Cyber Dominance Theory Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them. General Dominance Theory -> Cyber Dominance Theory General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we…
Read More