Video: The Changing Nature of Warfare and Cyber Education

Video: The Changing Nature of Warfare and Cyber Education

Cyber, Cyber Creativity
In this video, I describe how to meet the challenge of the changing nature of warfare in the information age. The United States needs to organize for intellectual rigor using existing frameworks and by utilizing a coordinating authority to integrate these frameworks. See my presentation in the YouTube video embedded below, or access it directly by visiting the video directly on YouTube.com. https://youtu.be/1QMo5CO2y7I Cyber Operations are changing the nature of warfare and present a new concern for national security.  As the nation tries to wrestle with the implications of this new reality, we should realize that this is not the first time our Nation has been challenged by a change in warfare and we can learn from our history. In the past, lots of good people were doing good things…
Read More
CyberDominance.com is the Home of Cyber Dominance Theory

CyberDominance.com is the Home of Cyber Dominance Theory

Cyber Dominance, Cyber Dominance Theory
CyberDominance.com is the home of Cyber Dominance Theory (CDT). Cyber Dominance Theory is an application of General Dominance Theory.  It provides guidelines for how to achieve dominance in the Cyber Domain.  All developments in CDT will be published and discussed on CyberDominance.com. Introduction to Cyber Dominance Theory Cyber Dominance Theory is the guide to achieving Cyber Dominance.  At the core, it combination of two concepts: General Dominance Theory, and Cyber Security Fundamentals. General Dominance Theory. GDT, originally developed for Navy Information warfare, is a guide for achieving dominance in any domain. Cyber Security Fundamentals. The topical technical knowledge related to computer and network security, and the behavior of the people who use them. General Dominance Theory -> Cyber Dominance Theory General Dominance Theory (GDT) can be applied to any domain.  To apply it to the cyber domain, we…
Read More
Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Beat Cyber Hackers: Protect Against Identity Theft by Devaluing Information

Cyber, Cyber Creativity
Why must we live in fear of identity theft?  Why must we pay companies to mitigate the effects of identity theft?  Instead, we can beat cyber hackers and protect against identity theft by fundamentally changing the way we use information to authenticate users.  If hackers steal information because it is valuable, then devaluing that information could negate the threat.  In cases like identity theft, this could make some hacks not worth the effort and could have other social benefits because you can actually share your birthdate with your friends. (more…)
Read More