Volume 4, Issue 3

Volume 4, Issue 3 Editorial

Stylized Image of the Word Editorial

December 2005

The final issue of JIW for 2005 includes four very different papers.  The first by Duczynski investigates the application of Effects Based Operations and uses a technique called Field Anomaly Relaxation to illustrate the issues involved.  Pierce, Warren and Corray have written a more technology based paper that examines penetration testing. In the third paper, Lubbers has written an interesting case study of that examines a real world corporate espionage case in which she was personally involved.  The last paper is slightly unusual for JIW in that it covers ground that is not directly within the scope of the journal. However, the reviewers were quite enthusiastic about this opinion piece, and as it was thought it would interest the readership, it was included.

Getting to Purposeful Information Operations: The Application of Effects-Based Approaches

ABSTRACT

The literature on Effects–Based Operations (EBO) continues to be dominated by theory, with limited evidence of (successful) practical application reported.   This situation is entirely acceptable in the early formative stages of any new concept, as first hesitant steps are taken and the authority of a shared idea gradually develops. EBO is now a global phenomenon.    The effects must have primacy in shaping the actions that are taken. EBO practitioners, particularly those within the information operations domain, need those hands-on executable actions that can be taken to solve problems in the real world.  Furthermore, these executable actions can only be enabled through the possession of specific capabilities.   The paper offers a systems approach that includes a problem space, a solution space and a design space that may bring the necessary totality to the subject, guarding against premature use of means that appear to fit well with the context – a fixation with efficiency rather than effectiveness.   The paper argues that an examination of the systemic interactions amongst factors may deepen planners’ or policy-makers’ understanding of why a region or area of interest behaves the way it does, before they attempt to change it. A method is detailed that couples effects statements and means and highlights capability requirements. A case study example is provided using North Korea. 

In Pursuit of a Standard Penetration Testing Methodology

ABSTRACT

Penetration testing has gained great momentum commercially, but there is limited methodological research in the literature.  A methodology is important for penetration testing if it is to maintain a degree of separation between the security profession and wanton attacks.  The methodological approaches to security posture testing are explored; using tactics adopted from crackers themselves; and, look particularly at a small body of literature. The surveyed methodologies are compared and contrasted, extrapolating the major trends and features into a hybrid, and conclude with directions for future research. In general, it was found that the methodologies to converge on reconnaissance, attack and escape.

The Threat Response Spy Files: A Case Study about an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators

ABSTRACT

British Aerospace paid a private intelligence company to spy on CAAT, the Campaign Against Arms Trade. Daily reports on activists’ whereabouts were sent to Britain’s largest arms dealer by Evelyn le Chêne, a woman with a well-known record in intelligence work. Analysing the original spy documents, this paper will address two sets of questions. One involves the implications for grassroots work, the other raises the issue of appropriate research methodologies.

Is NATO in need of a renewed Security Concept?

ABSTRACT

The necessity of a renewed concept of security for NATO policy and actions is a fact. Since NATO’s last security concept of 1999, security policy has evolved largely in part to the well-known security instability variable. Accordingly, this has produced an unstable changing security environment. The key component of focus is the necessity of a renewed security concept: the threat of asymmetries. NATO needs to face these new challenges. As such, this paper addresses these challenges and provides the reason and need of NATO’s continuity but also calls for an increased request for swifter transformation than the already existing one, which should be led by the creation of pro-active movements for a renewed concept to face all current and future threats.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com