Volume 11, Issue 3

Volume 11, Issue 3 Editorial

Stylized Image of the Word Editorial

NOVEMBER 2012

In this final issue for 2012, we again welcome our colleagues from South Africa who have contributed five papers that illustrate the variety of topics covered by Information Warfare. The first paper by Maasdorp and Du Plessis proposes a model to illustrate the relationship between Electronic Warfare, Information Warfare, Cyber Operations, Net-Centric Warfare, and Information Operations.

Using a layered model to place EW in context within the information sphere

ABSTRACT

In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper proposes a three-layer model in an attempt to provide a new perspective on this discussion. Each layer is defined and the roles and relationships between EW, IW, and IO are explained accordingly. Using this approach is extremely powerful as it emphasises the complementary natures these fields should have, rather than the rivalry which is often the present. An attack on an 802.11g (WiFi) wireless link is used as an example to display the value this layered approach can offer.

A Prologue to Estimating the Intent of a Potential Rhino Poacher

ABSTRACT

A dramatic increase in rhino poaching, if allowed to continue at current rates, is threatening South Africa's rhino population with extinction. The available detection and prevention systems are not sufficient in solving this crisis. Targets are detected, but their intent is unknown, thus a system is proposed that fuses the available data and infers a potential poacher's intent. A mixture of behaviour modelling and intent estimation, coupled with a suitable computational intelligence technique will address the problem of how to infer whether a person is a rhino poacher. This article sheds some light on the current systems that are in place and we offer a formulation of the rhino poacher problem in the Kruger National Park (KNP).

Social Recruiting: a Next Generation Social Engineering Attack

ABSTRACT

Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.

A Review of IPv6 Security Concerns

ABSTRACT

This study focus on the security concerns of IPv6. A broad introduction to IPv6 is made then briefly the differences between the IPv6 and IPv4 protocols are looked at, their known vulnerabilities and this identifies some security concerns when implementing IPv6. Even after 13 years, IPv6is still considered a new network protocol. With this in mind not much is known about IPv6. Since the IPv4 address space will be used up within the next few months, IPv6 should finally become more mainstream.

Protecting E-mail Anonymity with an Anonymizer Bouncer

ABSTRACT

Communication between people has always been a part of society. In the past, people could omit the return address from a letter to keep the sender’s identity private. The problem is that it is not as easy to achieve anonymity when sending and receiving e-mails. This paper discusses ways of achieving anonymity when using e-mail as communication for instance, in lodging complaints to a grievance department. Anonymity is defined as hiding the identity and personal information of an individual. The proposed model uses an anonymous re-mailer to show how the sender of an e-mail’s identity can remain anonymous.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com