Volume 23, Issue 2

Volume 23, Issue 2 Editorial

Styled image of the word Editorial

Spring 2024

These are exciting times for the Journal of Information Warfare (JIW). As this issue goes to press, the European Conference on Cyber Warfare and Security (ECCWS), is being held at the University of Jyväskylä, Finland. This is our second visit to this wonderful area in the last 12 years and I am sure that we will get some outstanding papers that we can publish soon. We are also looking forward to the next International Conference on Cyber Warfare and Security (ICCWS) to be held at the College of William & Mary (Williamsburg, VA, US) in March of 2025.

Simulation of Radar Modulation Estimation Using Curvelet Transform for EW Applications

Abstract:

State-of-the-art distributed system development with low power specifications is especially required for different applications. Ultra-wideband radar (UWB), Multi Input Multi Output radar (MIMO), and cognitive-based radar technology are the current trends in modern radar systems. Current EW systems are developed with digital receiver technology using Nyquist Sampling. Radar modulation recognition and correct radar identification are essential requirements for EW receiver systems. The radar signal acquisition through compressed sensing and reducing the number of samples using sub-Nyquist sampling play a vital role in EW systems. Random Modulator pre-integrator (RMPI) is a current concept for extracting waveforms with dominant base vectors. RMPI explores the structural and geometrical properties of the signal apart from traditional time and frequency domain analysis for improved identification. The Curvelet transform-based RMPI methodology is an inverse problem with exceptionally fewer measurements.

Navigating the First Year of the Ukrainian Battlefield: Machine Learning vs. Large Language Models

Abstract:

In an era marked by impressive technological developments, conflicts persist and are rooted in complex historical and socioeconomic dynamics, also manifesting through social media platforms. While the war in Ukraine garnered global attention and prompted humanitarian and strategic responses, more efforts are necessary to understand its dynamics and implications directly by analysing the discourses of Ukrainian people in raising unconventional social media platforms like Telegram and TikTok. Accordingly, this research deploys a Data Science approach for building a set of Machine Learning and Large Language Models for analysing discourses and sentiments of Ukrainian users in the first year of war.

Foreign Influence in the 2022 U.S. Midterm Elections—A Case Study in Foreign Interference and Election Meddling

Abstract:

This article investigates how both Russia and the People’s Republic of China (PRC) seek to influence the shape of electoral debates in a target country. While previous research has examined presidential election years, this research captures efforts to shape American attitudes when the chief foreign policy maker is not under consideration. It examines evidence of coordination between foreign influencers using data from the 2022 U.S. midterm elections on Twitter using computational methods to support two theoretical conclusions. First, it finds some evidence of either coordination or convergence between Russian and PRC influence objectives. Second, it relates these influence efforts to distinct pressure points in political systems.

Cognitive Centric Warfare: Modelling Indirect Approach in Future Warfare

Abstract:

With the development of science and technology, warfare has become a multi-domain operation that includes land, sea, air, space, cyber, electromagnetic waves, and human cognition. Nonetheless, existing research has not examined the relationship between each of these domains and the cognitive domain. Hence, this paper explores how cognitive influence on adversaries can be exerted from multiple domains. This paper analyses the case of the war in Ukraine in which the latest science and technology were used. This article finds that attacks on human cognition are exerted from all domains and provides a comprehensive model of cognitive influence on the adversary.

The Geopolitics of Disinformation in a Continued Cold War: A Study of Russia’s Cyber Information Operations Strategy (2022-2023)

Abstract:

This study seeks to explore patterns in Russia’s disinformation operations strategy during the war in Ukraine and discuss them in the context of its geopolitical interests across the world. The data for this research spans from the beginning of the invasion in February 2022 to July 2023 and is collected from the EUvsDisinfo database in the form of articles where disinformation was discovered (N=1906).

Combating Trust Erosion: Discerning Fake News and Propaganda on Social Media in the Era of AI

Abstract:

This paper introduces a model to combat fake news and propaganda spread on social media, derived from a systematic literature review of 28 articles. It outlines the model based on seven key themes: scepticism, AI detection, fact checking, media literacy, ethical technology use, digital manipulation, and community verification. This comprehensive model aims to bolster individuals’ and communities’ abilities to critically assess information, emphasising its application in research, policy, and education. By advocating a multi-layered strategy, the model seeks to foster a discerning global community equipped to navigate the complexities of discerning fake news and propaganda.

Validation of the Enhanced Model for Efficient Development of Security Audit Criteria

Abstract:

Cyberattacks have grown in importance to become a matter of national security. Security criteria are important tools for defensive capabilities of critical communications and information systems. An enhanced model for efficient development of security audit criteria has been proposed. This paper provides evidence in support of the validation of the proposed model. The model is validated through case study observations from two criteria development projects that utilised the model during criteria development. The results indicate that the model is useful for criteria development and provides efficiency to such processes. The results also suggest minor improvements for development of the model.

ClausewitzGPT Framework: A New Frontier in Theoretical Large Language Model- Enhanced Information Operations

Abstract:

In an epoch where cyberspace is the emerging nexus of geopolitical contention, the juncture of Information Operations and Large Language Models (LLMs) heralds a paradigm shift, replete with immense opportunities and difficult challenges. This paper puts forth a framework for navigating this brave new world using the “ClausewitzGPT” set of equations for framing measurement of AI-augmented information operations. By breaking down the parts of a typical digital information operation into variables, these novel formulae not only seek to quantify the risks inherent in machine-speed LLM-augmented operations but also highlight the vital role of autonomous AI agents in addressing the technical shortcomings and architectural issues of LLMs. These agents, embodying ethical considerations, emerge as indispensable components, ensuring that, as the human race goes forward, it does not lose sight of its moral compasses and societal imperatives.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com