Volume 10, Issue 1

A Tribute to Professor Philip M. Taylor BA (Leeds), PhD (Leeds)

1954 – 2010

Phil Taylor is probably the closest thing that the Information Warfare (IW) community has to a founding father. His works on the “softer” side of IW involved Psychological Operations, Strategic Communications and Perception Management which in the mid 1990’s were disciplines that were being ignored in the rush to glorify Cyber Warfare. Yet Phil understood that it wasn’t technology that was the target of IW operations but instead it was the human mind, and he demonstrated this in his numerous books on the subject that included almost 100 articles and 14 books, including Routledge Handbook of Public Diplomacy (2008), Shooting the Messenger (2008), Munitions of the Mind (2003), British Propaganda in the >20th Century: Selling Democracy (1999), and Global Communications, International Affairs and the Media since 1945 (1997).

In addition, Phil had a sharp wit and contributed enormously to the early discourse on the path that IW would take in those early years. A prolific author, his works did much to shape and develop the IW community into the robust warfare area that it is today, with a wide variety of options available, to include both “soft” and “hard” capabilities. A well-respected lecturer, Phil addressed audiences all over the world including the European Commission in Brussels, the Prime Minister's Office in Malaysia, the Defence Intelligence and Security School (DISS) at Chicksands, Cranfield University, the Royal College of Defence Studies, the Royal United Services Institute (RUSI) in London, Sandhurst, the Joint Services Command Staff College (JSCSC) at Shrivenham, the UK Permanent Joint Force Headquarters at Northwood, the Supreme Headquarters Allied Powers Europe (SHAPE) in Mons, Belgium, the NATO School at Oberammergau, the HQ of the Allied Land Component Command in Heidelberg, the Norwegian Defence and Security School (NORDISS), the Norwegian Staff Defence College in Oslo, the Swedish Defence College in Stockholm, the Royal Danish Defence College in Copenhagen, the Finnish National Defence College in Helsinki, the Italian Air Force Academy in Naples, and the Mubarak Al-Abdullah College for Joint Command and Staff in Kuwait City.

A giant in the IW community, Phil will be sorely missed.

Dr Leigh Armistead, CISSP
Co-Editor, JIW
Series Chair, ICIW

Volume 10, Issue 1 Editorial

Stylized Image of the Word Editorial

April 2011

Welcome to the first issue of JIW for 2011 and the 28th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to Information Warfare. 

Assessment of Mission Risk: Role of Protection of Information and Communication Technology Resources

Abstract

The ability to assess risk to missions resulting from cyber incident is of paramount importance for command decision making. In this paper, a five step methodology to assess the risk to a mission resulting from cyber security breaches is presented. The methodology is based on modeling the activities of the mission and the impact of breaches of communications and information technology on the activities.

The Battle for Money Transfers: The allure of PayPal and Western Union over Familial remittance networks

Abstract

Informal Money Transfer systems continue to provide importunate loopholes in the global wrestle against terrorism. Radical cells, as well as broader criminal networks, maintain their use of Hawala systems, but do so in concert with other informal transfer systems, largely to sidestep the regulatory and administrative management of formally institutionalized worldwide money transactions. 

Stewarding Situational Awareness and Highly Perishable Information

Abstract

The aim is to examine the concept of ‘highly perishable information’, and how an individual security person (police, security guard or steward) in high-density crowds achieves situational awareness. The specific focus is on the perception level issues, identifying the typical barriers to achieving situational awareness for volunteer stewards.

A Process for the Identification of Security Risks from Critical Infrastructure Interdependencies

Abstract

Traditional security risk assessment takes a broad asset-based view of organizations. The risk identification process therefore focuses on well-known threats and vulnerabilities to static and discrete assets that fall within the scope of organizational boundaries under investigation. It does not offer a methodology or framework that systematically deals with risks that arise from the complex interdependencies1 among the critical infrastructures2. To support this proposition, this paper conducts a systematic analysis of the security risks resulting from logical, cyber, geographical and physical interdependencies between telecommunications and power infrastructures.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com