Is Cyber Warfare a Just Warfare?

Is Cyber Warfare a Just Warfare?

Cyber, Cyber Creativity, Cyber Dominance
What moral obligations does the United States have with regards to Cyber Warfare?  While major religions and dominant philosophies should be studied, this article provides a brief introduction to the Catholic perspective on this question. The Ethics of Electrics What is the morality of cyber warfare?  The Atlantic poses that question and suggests that answering this question now - when cyber is emerging - provides an opportunity to "get it right" from the start. It is clearly a very important question, as the article describes thoroughly.  The article identifies several important principles of just warfare (principles such as proportionality and distribution) and applies them to cyber warfare. Cyber warfare is often conducted behind the scenes, it sometimes falls into the category of espionage, which poses further moral challenges. Before directly…
Read More
My Cybersecurity Website Just Got Hacked.  I Didn’t Flinch.

My Cybersecurity Website Just Got Hacked. I Didn’t Flinch.

Case Studies, Cyber, Cyber Dominance, Dominance
The best get hacked; it happens.  It's not about being unhackable, it's about rolling with the punches and being resilient.  Learn the story of the most recent hack affecting CyberDominance.com.  It's a story about how doing the simple things well can save you a lot of anguish - and how you can always achieve Cyber Dominance. (more…)
Read More
Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Information Warfare is Fleet Business: It is no longer what goes on behind the green door

Cyber Dominance, Dominance
We are behind.  The U.S. military requires a cultural change to reconcile institutional aversion toward non-lethal information warfare. To aggressively shape, influence, control, and manipulate information, change is needed in U.S. military attitudes toward information warfare.  [We have a choice.] This can be realized through better training and education, and deliberate integration of information operations across the military services during planning and operations[1] - and the College of Maritime Operational Warfare can help deliver this outcome.   (more…)
Read More
Ukraine as a NATO Centre of Excellence: Information Warfare

Ukraine as a NATO Centre of Excellence: Information Warfare

Cyber Dominance
In response to Russia’s increasingly aggressive actions, NATO ought to expedite the Ukraine’s application for member status and, simultaneously, the Ukraine ought to open up an Information Warfare Centre of Excellence in the Ukraine. Russia:  Hybrid Warfare The Russian invasion of “Crimea served as a proving ground for Russian information operations, as well as the larger applications of cyber warfare.  It brought the cyber domain to light among the masses and showed social media to the world as a potent weapon system.”[1] Since 2014, Russia has been conducting military operations in the Ukraine.  At this point “seven percent of Ukrainian territory is now under Russian control. Approximately four and a half million citizens are in areas that are either Russian controlled, Russian occupied, or Russian annexed.”[2] Unlike historic military invasions, Russia…
Read More
Achieve Cyber Dominance: The Six Critical Controls

Achieve Cyber Dominance: The Six Critical Controls

Cyber Dominance, Cyber Dominance Theory
Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls of Cyber Dominance Theory. Dominance: It's About Control. Why do we fight in the Cyber Domain? Cyber Dominance Theory answers: so that you can get what you want, when you want it. You want secure data? Done. You want a website with no downtime? You got it. You want Cyber Dominance. The daily struggle to achieve Cyber Dominance is Cyber Warfare. Whether or not you wanted to join the fight, you are a part of it. So prepare to defend yourself - or prepare to be a casualty of the war. Every battle of the Cyber War is about one thing: control. He who has control gets what he wants,…
Read More
Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

Dominate the Information Domain: Synchronize Strategy and Cyber Efforts

Cyber Dominance, Cyber Dominance Theory
The U.S. is falling behind in the cyber war.  We need to quickly synchronize our national strategy and our cyber efforts - including expanding to Information Cyberspace Operations; only then can the U.S. dominate in the Information Domain.  This article explains the context of this fight and proposes a new type of cyberspace operation: the Information Cyberspace Operation. (more…)
Read More
General Dominance Theory, SECOND EDITION Released

General Dominance Theory, SECOND EDITION Released

Cyber Dominance Theory, Dominance, General Dominance Theory
The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain. (more…)
Read More
CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory
CyberDominance.com is the home of Cyber Dominance Theory (CDT). Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com. Introduction to Cyber Dominance Theory Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them. General Dominance Theory -> Cyber Dominance Theory General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we…
Read More