Volume 2, Issue 2

Volume 2, Issue 2 Editorial

Stylized Image of the Word Editorial


In many modern business environments, even the short-term, temporary interruption of Internet / e-mail connectivity can have a significantly disruptive effect, forcing people to revert to other forms of communication that are now viewed as less convenient. Imagine, then, the effect if the denial of service was over the longer term and also affected the IT infrastructure in general.

Cyber Terrorism: An Examination of the Critical Issues


This paper examines the critical issues relevant to Cyber terrorism. A review of the literature indicates that incidences of computer crime and cyber terrorism are increasing. The cyber attacks on the U.S.’s critical infrastructure are no longer random, but rather are coordinated and precise. The types of attacks are discussed and documented instances are examined. Lastly, policy recommendations are discussed that to further assist the U.S. in defending its critical infrastructures and essential operations.

Combating Cyber Terrorism: Improving Analysis and Accountability


This paper will attempt to assess issues and strategies related to Cyber Terrorism. It examines the missions/objectives, resources, threats, systemic issues and policies related to combating the problem. The paper suggests possible measures to improve the ability to deal with Cyber Terrorism. One is to improve coordination between existing independent resources toward the goal of creating a CYBERINT Analysis Center. Another is to improve accountability and identification of Internet users.

The Law and Cyber Terrorism


The paper investigates the use of the Internet. by terrorist and dissident groups for publicity, propaganda, and fund raising. It examines the new anti-terrorism legislation passed in the last few years (especially the UK Terrorism Act), and its impact in the Internet presence of proscribed groups.

Cyberterrorism: The Story So Far


This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same. The contention here is not that cyberterrorism cannot happen or will not happen, but that, contrary to popular perception, it has not happened yet.

Is Task Force Smith Rushing To An Electronic Pearl Harbor?


The United States of America remains ill prepared against cyberattack in spite of years of well-documented and well-publicized warnings by governmental and non-governmental organizations. The result is the extreme vulnerability of the U.S. to attack in cyberspace by its opponents with severe consequences to the U.S. infrastructure and economy. This paper examines why the ill preparedness of the U.S. to cyberattack is a serious problem, a brief history of this problem with an emphasis on the recent three years, the on-going measures to solve this problem, recommended solutions, and a conclusion.

A Methodology for the Assessment of the Capability of Threat Agents in an Information Environment


The proliferation in the use of information and communications technologies over the last three decades has resulted in significant changes in the level and type of threat that is posed to the information environment that we have come to rely on. The way in which the threat that is posed to an information environment is assessed has not advanced at the same rate as the technology. As a result, there is, at the present time, no way in which the threats that are posed to information systems can be either modeled or quantified in any meaningful or repeatable manner. This paper will investigate a number of methodologies in order to attempt to identify one that will provide an accurate representation of the threat to information systems in a range of scenarios.

International Coordination to Increase the Security of Critical Network Infrastructures


‘All our infrastructures are increasingly dependent on information and communications systems that criss-cross the nation and span the globe. That dependence is the source of rising vulnerabilities…’ (PCCIP, 1997). Improving the security of these infrastructures requires coordination within and among organizations and nations. In this paper, we discuss five areas that demonstrate the value of international coordination: standardization, information sharing, halting attacks in progress, legal coordination, and providing aid to developing nations. International approaches to coordination in these areas should be matched with appropriate national strategies to secure network-connected infrastructures more effectively.

An Investigation Into the Application of Defence In Depth Theory to Electronic Information Protection


This paper discusses an investigation into the application of traditional Defense in Depth theory to digital electronic information protection. Defense in Depth is firstly discussed in a physical security context, where deterrence, detection, delay and response are shown to be achieved by psychological, electronic, physical and procedural barriers. The Electronic Information Attack Model is then proposed, which comprises a hierarchical structure defining different aspects of electronic information and ways of attacking its confidentiality, integrity and availability. The final component then proposes that the four Defense in Depth functions can provide electronic information protection by layering barriers at various levels in the Electronic Information Attack Model.

A Denial of Service and Some IPsec-Implementations


IP security (IPSec) is in global use for example in corporate Virtual Private Networks. It is also intended for the protection of nodes in the third generation (3G) mobile networks. Denial of Service (DoS) is a threat especially in 3G networks where availability requirements are very strict. This thesis is about identifying those threats and presenting methods for analyzing IPSec implementations and their vulnerabilities to certain Denial of Service attacks.

Shannon, Hypergames and Information Warfare


Shannon’s Information Theory provides a robust and quantifiable model for explaining the fundamental paradigm of Information Warfare. This paper reviews the four canonical strategies of Information Warfare, in the context of Shannon’s models and further extends these models into the domain of hypergame theory.

The Image of Unanimity: The Utility of the Promotion and Disparagement of Cultural and Social Unanimity as a Form of Context Manipulation in Information Warfare in the Aftermath of the Attacks of September 11, 2001


In this paper we examine the use of context manipulation as an offensive information warfare strategy with particular reference to the specific strategies related to assertions of cultural unity or disunity in the aftermath of the September 11, 2001 terrorist attacks in New York City. The competing rhetoric of the Bush administration and Osama bin Laden’s organization is studied. Success criteria are proposed for context manipulation through assertions of unity and disunity. Examples of successful and failed attempts to manipulate information context are studied to verify the proposed criteria.

e-Democracy – an invitation to i-Warfare?


e-Democracy, which is the latest development in the in the relentless role out from the intellectual production line of Internet and Web applications, is going to increase the opportunity for Information Warfare (i-Warfare) a hundred fold. This new set of ideas and concepts is believed in some circles to be even more important to our society than e- Commerce and e-Business.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.
















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455