The Journal of
Information Warfare

A primary subscription resource for professionals with an interest in Information Warfare. Access the latest thinking in Information Operations from the military, government, industry and educational perspective.

LATEST EDITION SUBSCRIPTIONS

Information Operations and Cyber Warfare

The aim of the Journal is to provide a definitive publication that makes available the latest thinking and research in the critical area of information warfare, information operations, cyber crime and cyber warfare. It is published four times a year in traditional hard copy and in electronic format via this web site. The first full publication occurred in September 2001. It is the intention that this journal will present the very best and latest thinking in the information warfare and information operations arena.

 

 

  • Volume 13, Issue 3 Editorial

    June was a tough month for the Information Warfare world. I am sad to announce that we lost Dr. Dan Kuehl to an aggressive form of cancer. An innovative and early advocate of IW, he was a long-term professor at the National Defense University in Washington, DC, who developed and taught strategic-level Information Operations (IO) classes starting in the late ...

    Read Abstract
  • Analysis and Categorical Application of LSB Steganalysis Techniques

    Abstract: Many tools and methods for steganalysis are prevalent in the research field. While no technique is 100% effective, combining multiple techniques is common practice. Techniques reliant on the same basis are often found to be less computationally efficient when used in combination as opposed to the combined use of techniques in separate categories. It is the goal of this ...

    Read Abstract
  • Non-State Cyber Power in ONG

    Abstract: The revelation of long-standing espionage operations by state actors against private entities over the past decade speaks to an application of cyber capabilities that shifts the focus from direct and ancillary use in high-intensity confrontations to indirect supply- chain attacks and economic warfare. By observing recent cyber-related events within the oil and gas industries, conclusions can be drawn on ...

    Read Abstract
  • To Catch a Thief in the Cloud: A Paradigm for Law Enforcement

    Abstract: Control over most of the world’s data including national security, criminal investigations, medical secrets, intellectual property, and a host of other important rights and responsibilities is governed by a paradigm that is conducted in the Internet ‘cloud’. Based on empirical research and an analysis of international and national legal regimes, case decisions, and forensic case analysis, this paper explores ...

    Read Abstract
  • On Operational-Level Cybersecurity Strategy Formation

    Abstract: An operational-level cybersecurity strategy formation reveals ways of figuring out an optimal sequence of the most efficient and effective actions that may lead to the success of a cyber operation. Unfortunately, it is not well explored. This paper proposes a new operational-level cybersecurity-strategy-formation framework, which is capable of linking various strategies together in a systematic and consolidated way so ...

    Read Abstract
  • Security in the Cloud

    Abstract: The possibility of accessing information related to an investigation at any time and from any place is getting increasingly important for security forces, especially the police. Thus, needs arise to store this information in a cloud, to protect these data from unauthorized access, and to allow access to only authorized persons—often only within a limited time period. The conceptual ...

    Read Abstract
  • Using Classified Intelligence to Defend Unclassified Networks

    Abstract: Intelligence services, such as the National Security Agency, have access to unique information about adversarial cyber-exploitation and -attack capabilities. Nations such as the United States should be employing this unique but sensitive information in the defense of national security, government, critical infrastructure, and other networks, but doing so may expose the sources and methods behind the intelligence. Once exposed, ...

    Read Abstract
  • Outmaneuvering Cyber Adversaries Using Commercial Technologies

    Abstract: NSA characterizes assurance as having confidence that United States Government (USG) missions and networks can withstand attacks from determined adversaries. By Presidential Directive Order, the Director of the National Security Agency (DIRNSA) is the authority for National Security Systems (NSS), and this authority is delegated to the Information Assurance Directorate (IAD) to determine standards and policies for the nation’s ...

    Read Abstract

 

The Journal of Information Warfare is a primary, and rapidly expanding, source of cyber security research, thinking and insight.

Read the Latest Editorial or Subscribe to JIW