Volume 20, Issue 1

Volume 20, Issue 1 Editorial

Stilized image of Word Editorial

Fall 2020

This issue celebrates the best papers from the International Conference on Cyber Warfare and Security (ICCWS) held last spring at Old Dominion University (ODU) in Norfolk, VA. As the dates for the conference neared (9-13 March 2020), the United States (and the world) was rapidly shutting down due to COVID-19. Even with 50+ delegates from all over the world already onsite, it was touch and go up to almost the very last moment as to whether the event was going to happen. Luckily, we were able to proceed with the conference, which might go down as one of the last academic conferences conducted in person in the U.S. before the lockdown. What is certain is that the conference was a great event, as evidenced by the papers here that represent the best of the best as rated by the conference stream chairs.

Evolution of Australia’s Cyber Warfare Strategy

Abstract: 

Since 2000, Australia has re-positioned itself from a country having scant recognition of cyber warfare to a nation with limited offensive and defensive capability facing increasing cyber incidents from at least one state-based actor (informally attributed as China). The dominance of a continental defence culture hindered the early development of a robust cyber warfare capability, resulting in a limited focus towards national infrastructure security. 

Enhancing the European Cyber Threat Prevention Mechanism

Abstract: 

This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centres create challenges.

Mini-Drone Swarms: Their Issues and Potential in Conflict Situations

Abstract:

Drones are currently used for a wide range of operations, such as border surveillance, general surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting, and armed attacks.

Human Rights and Artificial Intelligence: A Universal Challenge

Abstract:

As artificially intelligent systems benefit citizens around the globe, there remain many ethical questions about the intrusion of AI into every aspect of our private and professional lives. This paper raises awareness of the unprecedented challenge that governments and private industry face in managing these complex systems that include regulators, markets, and special interests. 

Channel-PUFs: AI-Assisted Channel Estimation for Enhanced Wireless Network Security

Abstract: 

Next Generation Mobile Networks (NGMNs) are entering existing and future (industrial) wireless networks, associated with advantages such as higher data throughput, low latency, operation in almost real-time, and the microcell approach. However, this development also comes with drawbacks in the form of new attack vectors and security threats.

Enlisting Propaganda for Agenda Building: The Case of the Global Times

Abstract:

This article uses agenda building theory to examine how the People’s Republic of China is using propaganda in the form of news to build an agenda within global news media as part of their Three Warfares Strategy. This qualitative content analysis of the English language version of the Global Times revealed that the PRC is building an offensive news agenda to directly challenge the credibility and legitimacy of its rivals. It is obsessively preoccupied by receiving blame for COVID-19-related mistakes and threats of economic decoupling.

Offensive Cyberspace Operations and Zero-days: Anticipatory Ethics and Policy Implications for Vulnerability Disclosure

Abstract:

This article addresses the question under which circumstances zero-day vulnerabilities should be disclosed or used for offensive cyberspace operations. Vulnerabilities exist in hardware and software and can be seen as a consequence of programming errors or design flaws. The most highly sought are so-called zero-day-vulnerabilities. These vulnerabilities exist but are unknown and, when exploited, enable one way of entry into a system that is otherwise not thought possible. Therefore, from an anticipatory ethics perspective, it is important to understand in what cases zero-days should be disclosed or not.

Fitting the Artificial Intelligence Approach to Problems in DoD

Abstract: 

Emerging and disruptive technologies, due to advances made over the last couple of decades, have become the centrepiece of Department of Defense (DoD) concerns about national security. The technologies are unique because they can both benefit and hinder the DoD from its mission. Artificial Intelligence (AI) is revered in DoD circles as one of the most important of these technologies because of its potential as an absolute ‘gamechanger’ in cybersecurity operations. In this study, the focus is on the DoD fitting the Artificial Intelligence approach to its problems in a time of limited and diminishing resources.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    21 North Broad Street
    Suite 2-H
    Luray, VA 
    22835 
  • 757.581.9550
  • JIW@ArmisteadTec.com