The latest update to General Dominance Theory was released last week. This is the first major update since the original work was published in 2014, and includes improvements to terminology and introduces the concept of the Desired End State Space, a tool to help cyber warfighters focus time and money on goals that will lead to success in the cyber domain.
Other improvements include:
- Improved graphics and figures
- Introduction of the Desired End State Space and Desired End State Space Diagram, tools for helping you determine your own desired end state, the desired end state of your adversary, and for helping you quantify how close you are to achieving dominance
- An update on the author’s assessment of the state of the US Navy’s Information Warfare Community
- The phrase “desired image of reality” was replaced with the more concise and relatable term, “desired end state.”
General Dominance Theory is the basis for Cyber Dominance Theory (CDT). It demystifies cyber warfare and the information domain, and prescribes ways to structure organizations so that achieving the organization’s desired end state is more natural and deliberate.
The author, Jacob F. Davis, aims to influence the US Navy and US military forces currently stuck in the “storming” phase of a more than $15 Billion dollar effort to get a handle on cyber warfare as a military competency. Davis also points out that GDT is applicable to more than just warfare: any effort involving a struggle against an opponent can benefit from the ideas developed in GDT.
How to get the second edition
The introduction to General Dominance Theory has been updated with these terminology changes and is available at CyberDominance.com. A PDF of General Dominance Theory and Applications to Information Dominance: A Paradigm for Success in War SECOND EDITION is available for direct download with the previous hyperlink and also at CyberDominance.com.
Jacob Foster Davis is the founder of CyberDominance.com. He is a systems integrator and jack-of-all-trades. He specializes in leading teams of rivals to solve “impossible” challenges. He’s a former Adjunct Professor of Cyber Security at the U.S. Naval Academy and has a background in complex adaptive systems, space operations, performance arts, military operations, and iOS development.