Our Cyber Warfare Ranges are designed to allow maximum flexibility for experimentation. It is not at all an Information Technology (IT) environment. IT requires strict controls and documented practices. IT rules are highly restrictive and stifle innovation. One can simply look into "shadow IT" and see that the IT world has spun out of control with its restrictions.
That said, our Cyber Warfare Ranges are controversial. They are controversial because we are giving away what others charge large sums for. Additionally, we are controversial because the very same entities that would charge money for what we do are producing a significantly lower-quality cyber warrior. The discrepancy often appears to be an existential threat. Their rules and requirements would never allow them to operate in a permissive environment like ours.
What enables us to be so permissive and flexible is our core technologies. We had to build them ourselves and repeatedly stress tested them ourselves a process which continues. Nothing exists that does what our technologies do when operating together and nothing has shown as much resilience as what we have made. Since we are unique in the world, it is reasonable that such a situation exists. We will continue to maintain our technologies to adapt to new needs and the ever-changing technology world.
Our technologies are crafted from well over a decade of experience. The school of "hard knocks" has taught us a lot. Nearly every technology is homegrown. Every aspect of how they functioned required a fundamental rewrite of the Internet's core functionality. Servers like Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) operate completely differently when using our methods. Our identity system, Itatem, protects us as a universal, privacy-focused, global privacy regulation-compliant, and immune to fundamental threats to other identity systems. Our technologies all work together and are coordinated through a cloud management system we designed. All of which enables our missions and protects our people.
Using our range technologies is essential to our continued success.
We believe our technologies, leaders, environments, and minimal structure enable the creation of the world's very best cyber warriors. We thrive unlike other organizations because we are space to develop experiences: for people to try things, break things, and fix things together. By helping each other fix mistakes as they naturally occur or help people accomplish what they want, the range becomes a shared learning space for people with diverse skills. We believe that creating a competent cyber warrior is more than technical skills alone: it is grounded in technical competency but augmented by social skills, business knowledge and understanding, and a vibrant, supportive, and loving community of volunteers.
Our founder and the leaders of our organization know that there will always be forces trying to tear us down and block our progress. Everyone and every form of power has tried to stop us... and failed.
We thrive: not through friends in high places, financial influence, or force. We thrive because we are doing what nobody else can do, with knowledge and resources nobody else has, with our tribe of volunteers who feel the call to serve our country while also serving their own interests. Working together with what we have is unstoppable. We are an immovable rock.
We use our power: not for personal agendas, or political outcomes, but for the good of ourselves, everyone in our tribe, our country, and rest of the friendly world.
Our missions are:
1) to build the most competent cyber warriors in the world
2) to create a vibrant, supportive, and prosperous community of volunteers. Those who hear the call and are willing to work together to achieve our mutual goals
3) to change the fates and trajectories of our country and friendly world against a dedicated, well-resourced set of foes who seek our total destruction
4) to build and expand our ecosystem to make our missions accessible to everyone who hears the call and is inspired to help us
5) to enable innovation and the learning of critical cybersecurity skills via a lightly controlled technology environment
Every decision made was carefully considered, explored, and learned from. Our technologies operate the way that they do to enable all that we do and hope to do. Our rules of the road are small and simple. Everything is the way it is for a reason. We are a nexus of the cybersecurity world: we bring together noobs and experts, specialists from many fields, and people from every walk of life who are passionate about succeeding. Despite our diversity, we share one goal that unites us: to do what we love better than anyone else. We remain flexible and will continue to innovate ourselves. However, we are not an IT shop.
We are the Cyber Warfare Range and the National Cyber Warfare Foundation.