Cyber Warfare: The General's Take
Inside U.S. Cyber Command: An Interview with Lt. Gen. Charlie Moore
In a world increasingly defined by digital conflict, few voices are better positioned to speak on cyber warfare than Lt. Gen. (Ret.) Charlie Moore. In this episode of Gula Tech Adventures, Ron Gula sits down with Moore, a former F-16 pilot and deputy commander of U.S. Cyber Command, for a candid conversation on cyber defense, digital offense, and the evolving role of cyber in national security.
From running Red Flag exercises at Nellis Air Force Base to commanding some of the most classified cyber operations in modern warfare, Moore shares how his unique background in air combat helped shape his perspective on digital operations—and why the future of national defense is increasingly cyber-first.
From Fighter Pilot to Cyber Warrior
Moore’s journey into cyberspace began not at a keyboard, but in the cockpit of an F-16. As the commander of the 57th Wing and an aggressor pilot, he trained U.S. forces to simulate adversary tactics. His move into cyber came unexpectedly while serving on the Joint Staff. Tasked with overseeing global operations, Moore found himself immersed in cybersecurity—at a time when the Department of Defense was still defining its cyber strategy.
“I spent over two years focused almost entirely on cyber,” Moore says. “That work got me noticed by Admiral Mike Rogers, who asked me to lead operations at Cyber Command as it transitioned to a full combatant command.”
Operationalizing Cyberspace
One of Moore’s central themes is “operationalizing” the cyber domain—treating cyberspace not just as a realm of intelligence collection, but as a full-fledged warfighting domain, akin to land, air, sea, and space.
“Cyber is fast. It’s global. It doesn’t respect borders,” Moore explains. “In many ways, it has more in common with the air domain than the others.”
He draws clear parallels between cyber and air operations:
Global reach: Both can strike targets across the globe within seconds.
Speed: While air strikes are measured in minutes, cyber effects occur in microseconds.
Precision and scalability: Just as air power offers varying degrees of force, cyber effects can be fine-tuned—from silent manipulation to outright destruction.
What Cyber Command Actually Does
Moore breaks down Cyber Command’s three presidentially assigned missions:
Defend DoD networks (DODIN): Keeping military systems operational and secure.
Defend the nation from significant cyberattacks: Mostly conducted outside U.S. borders in “red space,” as Cyber Command doesn’t operate on domestic private networks.
Support other combatant commands: Delivering cyber capabilities as part of joint military operations globally.
Cyber Command became a standalone combatant command in 2018 and now operates with joint service members, executing missions at global scale.
Offense vs. Defense in Cyberspace
Most people associate cyber operations with flashy offensive hacks. But Moore is quick to point out that defense is where the bulk of the work happens—and where the toughest challenges lie.
“Offense is sexy,” Moore jokes, “but defense is patching bugs, asset management, detection response—it’s complex, ongoing, and unglamorous.”
Still, offensive cyber operations are critical—and legally complex. Under current U.S. law, only uniformed military personnel can conduct cyber operations that cause effects (like degrading infrastructure or disrupting communications). While private companies provide tools and access, the final “trigger pull” remains in government hands.
The Role of Private Sector and the Danger of Escalation
As Moore explains, one of the biggest debates in national security is whether private companies should conduct offensive cyber ops. His answer: it’s a dangerous line.
“We can’t have private companies running their own cyber wars,” he warns. “There are legal issues, yes—but more importantly, geopolitical ones. If a nation-state sees a private U.S. company causing cyber effects, it may view that as state-sponsored and retaliate accordingly.”
However, Moore sees immense potential for the private sector to support cyber operations by:
Providing access or infrastructure
Building tailored tools
Supporting intelligence and attribution work
The Power of Manipulation Over Destruction
When asked about cyber’s classic pillars—confidentiality, integrity, and availability—Moore emphasizes an often-overlooked concept: manipulation.
“Destroying data is obvious. But manipulation—subtly changing information, altering perception—is far more powerful,” he says. “It’s harder to detect and can shape decisions without the adversary even realizing it.”
AI, Public Engagement, and Strategic Vision
Moore expresses cautious optimism about the current administration’s early focus on AI policy and streamlining regulatory burdens that slow innovation. He supports a national AI strategy aligned with U.S. allies, grounded in efficiency, job creation, and fairness.
Still, he stresses the need to engage the broader public on cybersecurity.
“Cybersecurity today is a national imperative,” Moore says. “It’s like WWII’s concept of ‘total war’—everyone in society has a role to play. This can’t just be up to the military or government.”
He advocates for:
Greater cybersecurity education in schools
Public-private collaboration
Regular testing of cyber resilience (patch speed, detection, containment, and recovery)
What Business Leaders Should Do
For companies, Moore offers practical advice:
Think beyond posture. Focus on resilience.
Regularly test response and recovery times.
Use red teams or pentesters to simulate attacks.
Measure key time-based metrics: time to patch, detect, contain, and recover.
He urges leaders not to assume they're too small to be targeted—and to treat cyber readiness like business continuity.
Closing Thoughts: The Need for a Cyber Top Gun
As a former F-16 pilot, Moore knows how media shapes perception. He believes we need a “Top Gun” for cybersecurity—something to inspire, educate, and galvanize a new generation.
“Cyber operations may not be as visually exciting as flying an F-16,” he admits, “but in terms of national security? It’s even more important.”
Final Note:
This episode also features the animated comedy short Newton’s Law of Cyber Offense, blending sharp satire with real-world cyber ops themes. From zero-day exploits to call signs like “Zero Cheddar,” it pokes fun at the bureaucracy, secrecy, and absurdities of offensive cyber—delivering laughs while making you think.