Volume 1, Issue 1

Volume 1, Issue 1 Editorial

Stylized Image of the Word Editorial


It is with great pleasure that we present the first issue of the Journal of Information Warfare (JIW). It is an international journal created to share quality information to researchers and practitioners in the field. We hope that you will contribute as well as read this publication. The journal will cover the broad spectrum of issues associated with Information Warfare such as military, government, commerce, and education. Over the last decade, as the Information Society has evolved, the discipline has grown from purely being the concern of those in defence, to the whole of society. JIW will address this phenomenon, and intends to become the first point of call for contemporary commentary for Information Warfare. The editors of JIW intend to maintain a level of excellence in the papers presented. Each paper is blind-refereed by two people experienced in the field. Some contributions will be academic in nature, some statements of opinion, some experiential from practitioners. All are welcome. Standards will be kept high, but it is recognised that each type of paper has different means of assessing its value and significance. Also, we welcome letters to the editor. Please send them to my e-mail address below, as well as any suggestions for improvement to JIW.

Principles of Information Warfare


This paper examines the fundamental concepts needed to understand the broad spectrum of activities encompassed by the Information Warfare phenomenon. It provides a theoretical background to these activities, and examines the context in which these are most effective.

Implications and Challenges of Applied Information Operations


As the allied nations begin to operationalise the concepts of what has come to be termed Information Operations, it seems helpful to outline some of the key implications and challenges associated with the endeavour. Properly thought out, IO embodies a wide range of both traditional concepts and capabilities, as well as new ones. This article presents eight broad areas of concern, in an attempt to help frame the arguments and discussions that will take place in this new Journal over the coming years. It is not meant to be comprehensive in scope, but rather to outline a manageable number of key issues for examination, in hopes of generating beneficial debate on these and other relevant issues.

Information Operations – A Swedish View


This paper touches upon Swedish views of how to organize traditional domestic responsibilities to better catch up with emerging IT-related threats. This paper stresses the need for developed forms of public-private co-operation. It also discusses new ways of handling crises and conflicts, as well as of enforcing sanctions in the international arena.

A Systems View of Information Warfare


This paper is a conceptual discussion in system theory of information warfare as an open system, and sets new demands on how to approach and manage such systems. By arguing for an open system approach, such as Intuitive Battle Dynamics, it appears to be possible to understand and also to handle and manage a complex problem, such as information warfare. This could lead to Commanders changing their way of using systems with both physical and psychological components in order to master the information warfare concept in clever ways.

The Impact of Architecture and Interoperability on Information Warfare Systems


Interoperability of hardware, software systems, and data has been an issue since the inception of those terms. With the proliferation of, and our growing dependence upon Information Warfare (IW), Command and Control Warfare (C2W), and Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) systems, interoperability has become a significant concern and the subject of much debate. Interoperability is one of several well-defined attributes of information systems. But in order to produce a well-behaved system containing these attributes an architecture, and architectural concepts must first be developed and followed.

NIDH - Network Intrusion Detection Hierarchy A Model for Gathering Attack Intelligence


Internet proxy systems such as Squid exchange intelligence relevant to their function as caching proxy servers via a distributed and trusted hierarchy of machines. The required intelligence is broadcast based along the network based upon established trust relationships throughout the connected network via specific port and protocols of exchange. An intrusion detection system that incorporates this functionality for gathering attack intelligence could be a formidable foe even for the wiliest attacker.

Tracing Based Active Intrusion Response


Network-based intrusion has become a serious threat to today’s highly networked information systems, existing intrusion defense approaches such as intrusion prevention, detection, tolerance and response are “passive” in response to network-based intrusions in that their countermeasures are limited to being local to the intrusion target and there is no automated, network-wide counteraction against detected intrusions. While they all play an important role in counteracting network-based intrusion, they do not, however, effectively address the root cause of the problem – intruders.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.
















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455