Volume 24, Issue 1

Book Review by W. Hutchinson (January, 2025)

Author: Dr. Steve Tatham
Publisher: Howgate Publishing Limited (10 May 2024)
ISBN-10 : 1912440474
ISBN-13 : 978-1912440474

After reading a book called Losing Arab Hearts and Minds by the same author in 2008, and Behavioral Conflict in 2011, the emphasis on ‘knowing the enemy’ was refreshing. This new text is equally well worth reading. It is rare to find a text which covers this approach to information warfare, psychological operations, influence operations, and so on. No matter what term one uses, it is about knowing one’s enemy as well as one’s own ambitions. Tatham has extensive experience with Information Operations (IO) in the Royal Navy and NATO generally. The book starts with a basic introduction to the ‘information space’ with definitions of the various areas and a potted history of Information Operations in Britain and the U.S. The book continues with examinations of Iraq, Afghanistan, Russia, Ukraine, North Korea, and China. There is an interesting chapter on understanding audiences. Other chapters are on conspiracy theories, previous IO campaigns, and the importance of psychology to IO practice. Also, he includes a chapter about the Cambridge Analytics affair, showing how IO has spread somewhat from the military arena.

This book is of its time and I would highly recommend it. If readers want an understanding of the contemporary approach to the use of data and information in combative environments, then this should be read. The limitations (in my opinion) are that it is NATO centric. This is not a criticism but does make its ‘worldview’ limited. As such, I wonder if our IO misses changes in other areas leading to future surprises. Also, IO seems to emphasize knowing the attitudes of opponents but not why they have them.

This book is well worth reading.

Volume 24, Issue 1 Editorial

Winter 2025

Truth is the first casualty in war…and often in peace. As the Journal of Information Warfare (JIW) embarks on its 24th year, we live in very interesting times as domestic politics, international conflict, and the rise of Artificial Intelligence (AI) make it harder than ever before to determine exactly what is the truth. This is where a proven double-blind, peer-reviewed (DBPR) publication, such as the JIW, can prove its value with our deeply researched papers from academics across the globe. Shown below is the latest tranche of outstanding research that we bring to you across a diverse range of topics:

A Proposed Bitcoin Blockchain Investigation Methodology: Based on a Case Study Approach

Abstract:

Criminal investigations involving cryptocurrencies are still premature with no standard investigative process to follow. This paper proposes a high-level methodology using open-source and analysed data to perform such investigations. It focuses on situations where Bitcoin is involved, but where other similar blockchains are concerned, the technical investigator should apply this methodology only after careful consideration. A case study approach is used to illustrate a cryptocurrency scamming platform, a giveaway scam, and divorce fraud. In all the cases, one needs to follow or trace the funds on the blockchain, referred to as on-chain analysis. The end goal of on-chain analysis is to find a destination address linked to identifiable information obtained from open-source data platforms—such as websites, social media, or a cryptocurrency exchange. Law enforcement can then be engaged to instruct the exchange to reveal all personal and transactional information linked to the address through a subpoena. A successful investigation will result in criminal prosecution and a potential recovery of funds. To maintain familiar investigation processes, the researchers looked at traditional (or non-technical) as well as technical investigation techniques.

Everything Is Awesome! Chinese Propaganda Framing about China

Abstract:

The Chinese Communist Party (CCP) has made public opinion warfare a key plank in its grand three warfares strategy of achieving a soft power victory against adversaries before it needs to commit hard combat power. Information warriors from nations opposed to the expansion of the CCP’s tyrannical political control must aggressively counter attack this public opinion warfare. China’s state-controlled media is a major asset in waging public opinion warfare in the international media environment. An essential question is what public image or narratives about itself is the CCP trying to sell foreign audiences? This study attempts to understand how China frames itself to foreign audiences. It was discovered that the international broadcasters emphasized economic goals while systematically avoiding both problems and their causes facing China and its population. Counter frames and counter narrative strategies are offered for information warriors.

Countermeasure Effectiveness of Chinese Influence at United States and Australian Universities

Abstract:

This study aims to determine the effectiveness of U.S. and Australian efforts to counter Chinese influence at their universities. The study reviews Chinese influence cases at U.S. and Australian universities using open-source data and examines the alignment and effectiveness of each country’s countermeasure efforts. The analysis reveals that China uses the same organizations and tactics in both countries and that universities’ dependence on Chinese money is foundational to the People’s Republic of China’s efforts. Additionally, U.S. countermeasure legislation has shown a more observable impact than Australia’s, but that the Australian government and university sectors are more integrated than the U.S.’s respective sectors.

Enhancing Cybersecurity Measures against URL Phishing in E-Banking: A Machine Learning Approach

Abstract:

This paper explores the use of machine learning to improve cybersecurity measures against phishing attacks targeting e-banking platforms. By analysing a comprehensive dataset of phishing and legitimate URLs, machine learning models were developed and evaluated for their effectiveness in detecting phishing threats. This study highlights the potential of using the XGBoost machine learning algorithm in the development of applications with a focus on the identification of malicious URLs. The results of the Phishing URL Detection Model (PUDM) developed in this paper using XGBoost demonstrates a significant enhancement in detection accuracy and response times. An application that includes this model for the identification of malicious URLs will support users using e-banking applications as it will reduce the chances of user's connecting to a malicious URL that will result in the stealing of their sensitive financial information. Using this algorithm in applications will provide proactive defences in the ongoing battle against cyber threats.

New Jersey Voter ID Numbers Reconfigured with Shift Cipher

Abstract:

This study examines New Jersey voter identification numbers for hidden algorithmic attributes, following similar findings in New York, where algorithms could track certain illegal records. Analysis reveals complex obfuscation patterns in New Jersey, including shift ciphers, in these public-facing numbers. The purpose of such obfuscation in accessible data is unclear, raising transparency concerns. Approximately 102,854 potentially erroneous or falsified records were discovered, indicating serious integrity issues. While no direct link was found between these problematic records and the algorithmic modifications, their coexistence is concerning. The ability to algorithmically track illegal records, as seen in New York, suggests a potential for misuse. These findings have significant implications for election integrity and data management practices.

Analyzing Disk-Minimal Malware in Phishing Attacks: A Forensic Methodology for Modern Cyber Threats

Abstract:

Today’s cyber threat landscape is characterized by advanced methodologies and attacks that inflict monumental damage on educational and financial institutions, healthcare systems, and information infrastructures. Among these threats, phishing remains the most effective initial vector for system compromise. The authors provide comprehensive insights into the evolving threat landscape and introduce an updated definition of fileless malware, referred to as disk-minimal malware. They propose a methodology for forensic examiners to identify and analyze the attack lifecycle of disk-minimal malware delivered through phishing attacks.

Cyber Mobilisation 2.0: Capitalisation and Instigation of Hacktivists and Vigilantes in Future Conflicts

Abstract:

Participation in contemporary cyber warfare can be as simple as playing a game or just allowing your computer to perform Distributed Denial of Service (DDoS) attacks. In the future, hacktivists and vigilantes could potentially act as an outsourced cyber force that is dispersed around the world in a constant state of readiness. In this article the authors discuss how nation states might capitalise and instigate hacktivists and vigilantes in future conflicts. Firstly, the authors revisit the concepts of ‘hacktivism’, ‘vigilantism’, and ‘cyber proxy’, and aim to define the novel concept of ‘cyber mobilisation’. Secondly, the role of hacktivists and vigilantes in the ongoing Russo-Ukrainian war is explained and the cyber mobilisation practices of both countries are described. Thirdly, the authors discuss how hacktivists and vigilantes justify their behaviour to themselves. Fourthly, the authors explore the elements and techniques of potential future cyber mobilisation. And finally, the risks and challenges related to worldwide cyber mobilisation and the individual participation in global cyber warfare are discussed.

Artificial Intelligence Accelerated Cyber Operations: A Systematic Literature Review

Abstract:

Societies’ increasing dependence on digitised services makes them vulnerable to cyber threats. Artificial Intelligence (AI) has been utilised in threat detection since the 1990s, and its use is expanding as the technology advances. However, the role of AI in cyber operations has not been studied systematically. This study provides a comprehensive understanding of how AI can accelerate both defensive and offensive cyber operations. Using the systematic literature review method, 22 practical use cases were identified and mapped onto different phases of cyber operations. The results indicate that cyber operations leaders’ AI acceleration has not been sufficiently researched.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com