Welcome to first issue of volume three of the journal. Many excellent articles have been published since the journal was first introduced at InfoWarCon in Washington a week before that fateful day on September 11th, 2001. The range of papers presented in the previous issues illustrates the holistic nature of information warfare and information operations disciplines. This issue is no exception with topics as diverse as data mining, propaganda, critical infrastructure protection, and mobile and network security being represented.
The final issue of JIW for 2005 includes four very different papers. The first by Duczynski investigates the application of Effects Based Operations and uses a technique called Field Anomaly Relaxation to illustrate the issues involved. Pierce, Warren and Corray have written a more technology based paper that examines penetration testing. In the third paper, Lubbers has written an interesting case study of that examines a real world corporate espionage case in which she was personally involved. The last paper is slightly unusual for JIW in that it covers ground that is not directly within the scope of the journal. However, the reviewers were quite enthusiastic about this opinion piece, and as it was thought it would interest the readership, it was included.
Volume 5 starts with a special series on the network security topic of digital security. There are three special papers on this topic. Valli examines the ability of malicious attackers to control machines remotely, Bhuyan examines how honeypots can be use to identify botnets, whilst Yek examines the use of fingerprinting by honeypots.
This issue is slightly different than normal. The papers have been selected from those submitted to the Third World Information Security Education Conference held at the Naval Postgraduate School, Monterey, California in late June, 2003. The papers were chosen by the conference organizers – Cynthia Irvine (Naval Postgraduate School, Monterey, California) and Helen Armstrong (Curtin University, Western Australia), and were re-written for the journal. The theme for this edition of JIW is Information Security Education.
Welcome to the fourteenth issue of JIW. It starts with Ryan’s paper on the use of information sharing as a weapon, and then leads to three technical papers. Clarke and Furnell discuss authentications for mobile devices, whilst Kamel et al examine the use of profiling in psychological operations; lastly Lim et al consider the tracking of criminal and terrorist activity using visualisation tools. Finally, Williams and Mahncke examine the important topic of security in medical records systems.
In many modern business environments, even the short-term, temporary interruption of Internet / e-mail connectivity can have a significantly disruptive effect, forcing people to revert to other forms of communication that are now viewed as less convenient. Imagine, then, the effect if the denial of service was over the longer term and also affected the IT infrastructure in general.
Welcome to the second volume of JIW. The journal was launched a year ago in September 2001 and has gone from strength to strength. The quality of the papers presented for review has generally been excellent. This issue not only reflects this high standard but also the variety of topics covered by the Information Warfare area. They range from the technologically oriented to those more concerned with social aspects.
The last issue for 2006 includes a paper on propaganda, two on deception and another on the state of Belgian intelligence agencies. Taylor starts by outlining and critiquing the West’s propaganda effort after illustrating its past. A renowned expert in this area, it would be interesting to see some comments about his assertions from readers. In the first paper on deception Yuill, Denning, and Feer posit a model for deceptive hiding. The second paper on this topic is by Brumley, Kopp, and Korb who examine the orientation stage of the OODA loop and its relationship to deception and self-deception. Vanhorenbeeck closes this issue with an evaluation of Belgian and European intelligence services.
Welcome to the first issue in the sixth year of JIW. As in previous issues, there are a variety of issues examined. The first paper by Hutchinson, Huhtinen and Rantapelkonen explores the idea that the perspective taken of a particular problem or conflict fundamentally effects the tactics and strategies used in it, and so the consequent outputs. Gray and Martin explain the consequences of actions in terms of an interesting concept ‘backfires’ and their relationships to types of propaganda.
Welcome to the second issue in the sixth volume of JIW. The papers show the depth and variety if the Information Operations discipline. The first paper by Shorer-Zeltser and Ben-Israel examines the web presence of three Diasporas, whilst Webb examines the equally modern phenomenon of Information Operations by terrorist groups. Edge et al. then examine the concept of ‘protection trees’ on the risk analysis of a system. The next paper by Kuusisto et al. looks at the implications of information flow priorities for inter-organizational crisis management. Al Mannai and Lewis propose a new definition of network risk, and this issue concludes with Maule and Gallup illustrating a simulation of the US Department of Defense supporting civilian authorities in time of crisis.
Welcome to the last issue of 2007. Next year will be the seventh year of publication for JIW so any suggestions to improve the service to the readers will be gratefully received. We are always looking for quality papers so if you feel you want to contribute please send your work in. Most papers are of an academic nature and follow the rigorous process of peer review and need to stick to accepted practice. However, we also welcome papers with opinions on relevant topics from knowledgeable persons – these do not require such rigorous analysis by peers.
Welcome to the first edition of JIW for 2008. This year, as Bill Hutchinson is on leave, I have taken on the editorship and I wish to thank Bill for his continuing guidance and valuable advice.
William Sousan and his colleagues from the KEWI Research Group at the University of Nebraska investigate open source intelligence using a tailored information delivery service system, whilst Andy Luse, Anthony Townsend and Kevin Scheibe from Iowa State University present a new method for secure message transmission. In addition, we have three papers from authors who presented at the 7th European Conference on Information Warfare in Plymouth, UK, in June of this year. The first of these papers by Andrea Cullen and Ian Mann presents an interesting industry/academic perspective on balancing a layered approached in security to counteract social engineering. Linda Finch and Richard Vaughan from General Dynamics UK Limited then propose an engineering ‘fit for purpose’ security system which seeks to create flexibility in adapting to changing resource and information sharing requirements in the military. Lastly, Chris Flaherty argues that information deception is a core component of three dimensional tactics, which seeks to develop spherical security protection, particularly in the context of terrorist attacks.
Welcome to the second issue of JIW. The journal was launched at InfoWarCon in Washington early in September, despite some problems with the delivery of the hard copies.
This issue contains eleven papers. Four of them (Armstrong; Furnell; Fawcett and Sowerbutts; Busuttil and Warren) were selected from those presented at the 2nd Australian Information Warfare and Security conference in Perth, Western Australia (November, 2001). We are also privileged to have three eminent information warfare experts (Schwartau; Dearth; Tyrell) offer position papers. Another excellent paper from Noel et al examines anomaly detection, Chirathamjaree and Gururajan look at threat to wireless systems. Broucek and Turner delve into the expanding area of Forensic Computing whilst Davey and Armstrong give us an approach to teaching cyber warfare. I hope you find this a diverse and interesting issue.
It is with great pleasure that we present the first issue of the Journal of Information Warfare (JIW). It is an international journal created to share quality information to researchers and practitioners in the field. We hope that you will contribute as well as read this publication. The journal will cover the broad spectrum of issues associated with Information Warfare such as military, government, commerce, and education. Over the last decade, as the Information Society has evolved, the discipline has grown from purely being the concern of those in defence, to the whole of society. JIW will address this phenomenon, and intends to become the first point of call for contemporary commentary for Information Warfare. The editors of JIW intend to maintain a level of excellence in the papers presented. Each paper is blind-refereed by two people experienced in the field. Some contributions will be academic in nature, some statements of opinion, some experiential from practitioners. All are welcome. Standards will be kept high, but it is recognised that each type of paper has different means of assessing its value and significance. Also, we welcome letters to the editor. Please send them to my e-mail address below, as well as any suggestions for improvement to JIW.
Chief Editor Bill Hutchinson asked us some months ago to lead the effort to produce a special issue of this Journal dedicated to the overarching topic of Perception Management. As members of the Journal’s Advisory Board, we were happy to do so, despite the fact that major new projects rarely arise at the most opportune times. In addition to our own contributions, we have assembled an international team of exceptional theorists and practitioners from the United Kingdom, the United States, Australia, and Sweden.
This final edition of JIW for 2008 covers vulnerability in IPSec tunnels, malware analysis, wireless deployment in the defence forces, and a discussion of the lessons that could be learnt from modern military conflict.
Welcome to the first issue of JIW for 2009. Firstly, Yin looks at the use of the Internet in the 2000-2008 Intifada. This is followed by Baines who examines the use of fear in information operations campaigns and compares this with research on marketing communications. Next Sentse and Jansen examine the use of fusion cells in counter-insurgency. Finally, Veerasamy proposes a high level framework for contextualising cyber-terrorism.
Welcome to the 23rd edition of the Journal of Information Warfare. As usual there are a variety of topics covered in the papers. In the first paper, Ramluckan and Niekerk explore the relationship between the media and terrorism. This is followed by Flaherty, who compares the difference between two and three dimensional tactics and their relevance to counter-terrorism. Then Ma investigates the use of Extended Evolutionary Games Theory and research into strategic information warfare. This issue closes with Sloggett and Sloggett giving their opinion on the changes in the narrative surrounding the ‘Global War on Terrorism’.
Welcome to the 24th issue of JIW and the last that I will be Editor in Charge. I will be retiring at the end of the year so wish you all well and thank you for all your contributions over the last eight years. The organisation of the journal will be changed somewhat with Professors Matthew Warren and Craig Valli, and Dr. Leigh Armistead sharing the editorial load which should make better management of the content.
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.