The latest update to General Dominance Theory was released last week.  This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain.

Other improvements include:

  • Improved graphics and figures
  • Introduction of the Desired End State Space and Desired End State Space Diagram, tools for helping you determine your own desired end state, the desired end state of your adversary, and for helping you quantify how close you are to achieving dominance
  • An update on the author’s assessment of the state of the US Navy’s Information Warfare Community
  • The phrase “desired image of reality” was replaced with the more concise and relatable term, “desired end state.”
General Dominance Theory’s Desired End State Space Diagram. This illustrates the four categories of the Desired End States between two adversaries in a given Domain. The blue circle on the left represents the whole of our Desired End State. The red circle on the right represents the whole of the adversary’s Desired End Space.

General Dominance Theory is the basis for Cyber Dominance Theory (CDT).  It demystifies cyber warfare and the information domain, and prescribes ways to structure organizations so that achieving the organization’s desired end state is more natural and deliberate.

Cyber Dominance is achieved when you have a perfect Ability to Affect the Cyber Domain (ATA-C) and Perception of the Cyber Domain (POR-C).
Cyber Dominance is achieved when you have a perfect Ability to Affect the Cyber Domain (ATA-C) and Perception of the Cyber Domain (POR-C).

The author, Jacob F. Davis, aims to influence the US Navy and US military forces currently stuck in the “storming” phase of a more than $15 Billion dollar effort to get a handle on cyber warfare as a military competency.  Davis also points out that GDT is applicable to more than just warfare: any effort involving a struggle against an opponent can benefit from the ideas developed in GDT.

How to get the second edition

The introduction to General Dominance Theory has been updated with these terminology changes and is available at  A PDF of General Dominance Theory and Applications to Information Dominance: A Paradigm for Success in War SECOND EDITION is available for direct download with the previous hyperlink and also at

Jacob Foster Davis is the founder of He is a systems integrator and jack-of-all-trades.  He specializes in leading teams of rivals comprised of widely-varying specialties. He’s a former Adjunct Professor of Cyber Security at the U.S. Naval Academy and has a background in complex adaptive systems, space operations, performance arts, military operations, and iOS development.

Related Articles: is the Home of Cyber Dominance Theory is the home of Cyber Dominance Theory (CDT).
Achieve Cyber Dominance: The Six Critical Controls Want to achieve Dominance in the Cyber Domain? Learn to control yourself and your opponent with the Six Critical Controls of Cyber Dominance Theory.

Leave a Reply

Your email address will not be published. Required fields are marked *