Vol. 1 Issue 1
This issue is available as a free sample of the Journal. Please click to download the full PDF file
It is with great pleasure that we present the first issue of the Journal of Information Warfare (JIW). It is an international journal created to share quality information to researchers and practitioners in the field. We hope that you will contribute as well as read this publication. The journal will cover the broad spectrum of issues associated with Information Warfare such as military, government, commerce, and education. Over the last decade, as the Information Society has evolved, the discipline has grown from purely being the concern of those in defence, to the whole of society. JIW will address this phenomenon, and intends to become the first point of call for contemporary commentary for Information Warfare. The editors of JIW intend to maintain a level of excellence in the papers presented. Each paper is blind-refereed by two people experienced in the field. Some contributions will be academic in nature, some statements of opinion, some experiential from practitioners. All are welcome. Standards will be kept high, but it is recognised that each type of paper has different means of assessing its value and significance. Also, we welcome letters to the editor. Please send them to my e-mail address below, as well as any suggestions for improvement to JIW.
JIW is an independent journal, and has no allegiances to any organisation or opinion, and is prepared to publish opinions that are not necessarily shared by the editors.
This issue reflects the broad nature of JIW. The first paper is one suggested by the editorial board and is the chief editors’ concept of the nature of Information Warfare. It is their perception and maybe not shared by all readers. Dearth follows with a view of issues in Information Operations and its future. Nicander explains the Swedish experience of Information Operations. Friman, another author from the Swedish National Defence College, explains Information Warfare in terms of systems theory. The next papers are more specific in nature. Curts and Campbell investigate the relationship between Interoperability and Information Warfare. Valli becomes more technical, offering a model for gathering intelligence about network intrusions. Finally, Wang, Reeves, and Wu offer another model for identifying and apprehending intruders. JIW would like to thank all these contributors and encourage those who were not successful to submit again.
Lastly, I would like to thank all the editors and the Advisory Board: Winn Schwartau, Doug Dearth, and Phillip Taylor, for their support.
I hope you find JIW to be of value to you.
Table of Contents
Paper 1: Principles of Information Warfare
W. Hutchinson , M. Warren
Paper 2: Implications and Challenges of applied Information Operations
D. H. Dearth
Paper 3: Information Operations – A Swedish View
Paper 4: A Systems View of Information Warfare
Paper 5: The Impact of Architecture and Interoperability on Information Warfare Systems
R.J. Curts, D.E. Campbell
Paper 6: NIDH – Network Intrusion Detection Hierarchy
Paper 7: Tracing Based Active Intrusion Response
X. Wang, D.S. Reeves, S. F. Wu
About the Authors
Douglas E. Campbell, Ph.D, (USNR-R, Ret.) was born on May 9, 1954 in Portsmouth, Virginia, and is an American citizen. He graduated from Kenitra American High School, Kenitra, Morocco, in 1972. He received his Bachelor of Science degree in Journalism from the University of Kansas in 1976 and was immediately commissioned as an Ensign in the United States Navy. He joined the U.S. Naval Reserve Program as an Intelligence Officer in 1980 and was transferred to the Retired Reserves as a Lieutenant Commander on 1 June 1999. Dr. Campbell received his Master of Science degree from the University of Southern California in Computer Systems Management in 1986 and his Doctor of Philosophy degree in Computer Security from Southwest University in New Orleans, Louisiana, in 1990. Dr. Campbell is president and CEO of Syneca Research Group, Inc., a certified 8(a) and a certified Small & Disadvantaged Business entity under the U.S. Small Business Administration’s program.
Raymond J. Curts, Ph.D, (USN, Ret.) was born December 2, 1946 in Philadelphia, Pennsylvania and is an American citizen. He graduated from Vandalia Community High School, Vandalia, Illinois in 1965. He earned his Bachelor of Science in Aeronautical and Astronautical Engineering from the University of Illinois in 1970 and was commissioned as an Ensign in the United States Navy. In December, 1972 he earned his wings as a Naval Aviator and was assigned to the U.S. Naval Base at Guantanamo Bay, Cuba. Returning to the continental United States in 1976, he served as an instructor pilot in the Navy’s Advanced Jet Training Command in Beeville, Texas where he earned a Master of Arts degree in Management and Business Administration from Webster College of St. Louis, Missouri. After tours of duty in Norfolk, Virginia; Rota, Spain; and Key West, Florida, he was stationed at the Space and Naval Warfare Systems Command (SPAWAR) in Washington, DC where he spent five years as the U.S. Navy’s Electronic Warfare Architect. During this time he earned a Ph.D. in Information Technology from George Mason University. Dr. Curts is the President of Strategic Consulting, Inc.
Douglas H. Dearth is Course Director and Senior Instructor at both the Joint Military Intelligence Training Center in Washington, DC, and the Defence Intelligence and Security School at Chicksands, United Kingdom. He is contributing co-editor, with Alan D. Campen, of the Cyberwar book series published by AFCEA International Press. He lectures on national security issues in the North America, the United Kingdom, and Western Europe. Mr. Dearth is a Board Member of the Journal on Information Warfare.
Henrik Friman, Ph.D, is researcher and Project Manager at the Swedish National Defence College, Department of Operational Studies, Stockholm, Sweden. The Department of Operational Studies specializes in command and control research of military science. His professional background is in strategic management, time research, futurology, and command and control systems. Today he works with a project named Operational Functions in the future, with responsibility to study the development of operational functions in a context of decision-making.
William Hutchinson Ph.D, is an Associate Professor at the School of Management Information Systems at Edith Cowan University, Perth, Western Australia. He has 20 years experience in information systems in government, the oil and finance industries and academia in Australia and the United Kingdom. Bill has published numerous papers in the area of Information Warfare, and is co-author of Information Warfare: Corporate Attack and Defence in the Digital Age. He is a member of the Australian Computer Society and the Australian Institute for Professional Intelligence Officers.
Lars Nicander is the director for the National Office of IO/CIP studies at the Swedish National Defense College. He is also since 1997 appointed Secretary of the Cabinet Working Group on Defensive Information Operations. Mr Nicander is a political scientist and has served in various positions within the Swedish national security environment. He has been for many years an elected member of the Institute of Strategic Studies in London (IISS) and also a Fellow of The Royal Swedish Academy of War Sciences.
Douglas S. Reeves Ph.D, is a Professor of Computer Science at N.C. State University. He received the Ph.D. in Computer Science from Pennsylvania State University in 1987. His research interests include quality of service issues for packet networks, and network security.
Craig Valli is a member of the School of MIS at Edith Cowan University where he lectures in E-commerce Security and Risk Management. He is currently completing a DBA and is pursuing a thesis in the area of Network Security. Mr Valli’s professional background is in network and security management. His research interests are in active network monitoring, defensive deception, intrusion detection, social engineering and trust.
Xinyuan Wang received his B.S. in Computer Science from Peking University (PR China) and M.S. in Computer Science from Beijing Institute of Information Control (PR China). He is currently pursuing Ph.D. in Computer Science at North Carolina State University, USA. His primary research interest is in network security, especially real-time intrusion tracing and source identification, active intrusion response and active network security.
Matt Warren Ph.D, is a senior information systems lecturer in the Department of Computing & Mathematics, Deakin University, Victoria, Australia. He specializes in computer security and information warfare. He is a member of Australian Standards Committee IT/12/4 Security Techniques and is the Australian Representative on IFIP 11 WG11 – Security Management. Matthew has published numerous pages in the area of Information Warfare and is co-author of Information Warfare: Corporate Attack and Defence in the Digital Age.
S. Felix Wu Ph.D, received his PhD in Computer Science from Columbia University in 1995, and he is currently an Associate Professor of Computer Science of University of California at Davis, USA. His research focuses on computer security, specifically intrusion detection and protection for network protocols, detection and identification of the source of Denial of Service (DoS) attacks, automatic response to faults and intrusions, and intrusion tolerance and extended transaction management.