Volume 24, Issue 3

KUDOS TO ALEXIA DILIBERTO AND ILAHA CHIRAGOVA!!!!

The Journal of Information Warfare would like to thank Alexia and Ilaha for their outstanding service to the journal over the years. They have been consistent and reliable reviewers who helped shape the journal in this dynamic field. We appreciate their continued support.

CMDR Alexia Di Liberto graduated school in 2000 and commenced her career in Human Resources before joining the Royal Australian Navy in 2004 as a Communications and Information Systems (CIS) Sailor.

During the initial stages of her career, she posted to HMAS Newcastle and deployed on Operation CATALYST, SLIPPER, RESOULTE, QUICKSTEP and SOLANIA. She achieved the rank of Leading Seaman by 2007 before gaining her Commission in 2009. CMDR Di Liberto commenced training as a Maritime Warfare Officer (MWO) at HMAS Watson and was one of three Australian naval officers to achieve their Bridge Watchkeeping Certificate with the Royal New Zealand Navy on board HMNZS Canterbury.

Her subsequent postings include: Divisional Officer at the Australian Defence Force Academy (ADFA) from 2015-16; Staff Officer to Director General Navy Intelligence & Information Warfare and O3 Staff Officer within the Directorate of Navy C3 at the Navy Intelligence & Information Warfare Branch in 2017-18. On promotion to Lieutenant Commander in 2019, she assumed the role of O4 Staff Officer in the Joint Effects Directorate at Headquarters Joint Operations Command. During this posting, she was awarded the Chief of Staff Award for her efforts as Deputy President of the Mess Committee. In 2021, she was selected to assist in the establishment of the new Information Warfare Officer workgroup, earning a Silver Commendation. From 2022 to 2023, CMDR Di Liberto was the Career Manager for the Intelligence & Information Warfare workgroup and was promoted to Commander in November 2023. CMDR Di Liberto is an Information Warfare Officer and is currently the Deputy Director Intelligence & Information Warfare Workforce Development.

CMDR Di Liberto attended the Communications and Information Warfare Officers Course in 2016, holds a Graduate Certificate in Organisational Change, and is currently studying Military Studies at the Australian Command and Staff College. CMDR Di Liberto has a daughter & forms a blended family, comprised of her partner and his two adult sons. Together, they enjoy outdoor activities, cooking, gin, and the occasional cheese platter. 

 

Ilaha Chiragova is a PhD student and researcher, whose intellectual pursuits are primarily concentrated on security politics, Artificial Intelligence, and cybertechnologies.

Her academic credentials include a Bachelor’s degree in Regional Studies of the Caucasus and Master’s degree in International Relations and Diplomacy from Baku State University (Azerbaijan), alongside a Master of Arts in International Relations and Regional Studies from the University of Tartu (Estonia). Currently, she is pursuing a PhD in National Security and Military Sciences at National Defense University of Azerbaijan, where her doctoral research delves into Artificial Intelligence and cybertechnologies. Complementing her formal education, she has augmented her technical acumen with certificates in IT engineering from the Network Training Center and advanced policy insights from Chatham House's Programme on Inclusive Cybercrime Policymaking.

Chiragova previously served as a leading adviser at the Center of Analysis of International Relations (AIR Center), and as a research fellow at Azerbaijani National Academy of Science. Her pedagogical experience includes lecturing at Baku State University, and she has held editorial responsibilities as an assistant editor for the Caucasus International Journal.

Currently, she is a research fellow at Topchubashov Center, a Baku-based independent think-tank. Chiragova serves as an Editorial Board Member for the esteemed Journal of Information Warfare, review editor for the Caucasus Strategic Perspectives Journal, and contributes to the peer review process for the Common Ground Research Networks. Her output includes authorship of more than twenty academic papers and co-authorship of a book.

Chiragova speaks Azerbaijani (mother tongue), English (Advanced), Russian (native), Turkish (advanced), and French (elementary).

Volume 24, Issue 3 Editorial

Styled Image of the work Editorial

Summer 2025

Welcome to the Summer 2025 edition of the Journal of Information Warfare (JIW). I write this editorial from Kaiserslautern, Germany where the 24th European Conference on Cyber Warfare and Security (ECCWS) is occurring. This conference and the sister event, specifically the International Conference on Cyber Warfare and Security (ICCWS), run by Academic Conferences International Limited, www.academic-conferences.org, are great events to help researchers get published as well as to meet fellow colleagues who are researching similar topics. Shown below are the locations for these future conferences, with the call for papers for ICCWS ’26 already on the street.

Eight Conditions for the Success of Psychological Warfare (Part 1)

Abstract:

The question of what makes psychological warfare successful has never been addressed in a methodological, systematic, and clear manner in the existing PSYWAR literature. To identify these conditions, this study scanned the key works on psychological warfare, backed by sources in the fields of military history, strategy, psychology, and communication science. The conditions presented in this study are eight in total, ranging from the need for military victories to the targeted use of violence, from control of the information space to credibility. In the second part of this study, to illustrate the implementation of these conditions in a real military operation, the eight conditions are used to assess the performance of Russian online psychological operations against Ukraine and the Hamas online psychological campaign against Israel. Findings reveal how the model’s eight conditions explain the success/failure of these two psychological campaigns.

Predicting the Success of Psychological Warfare (Part 2): Testing the Model in Two Case Studies

Abstract:

The previous study (See Part 1), attempted to identify the conditions for the success or failure of psychological warfare, based on a systematic scan of the literature and sources in the fields of military history, strategy, psychology, and communication science. This scan resulted in eight predictors, ranging from the need for military victories to the targeted use of violence, from control of the information space to credibility. In the second part of this study, to illustrate the implementation of these conditions in a real military operation, the eight conditions are used to assess the performance of Russian online psychological operations against Ukraine and the Hamas online psychological campaign against Israel. The eight conditions model provides a good explanation of the differences in these two campaigns’ effectiveness.

Evidence of Sophisticated ID Assignment Algorithm in Harris County Voter Registration System: A Security Analysis

Abstract:

This study examines algorithmic patterns in Harris County, Texas (U.S.) voter registration data, revealing a sophisticated base-8 modular algorithm controlling ID assignment for 2.3 million voters. Analysis of 18 million state records shows this algorithm employs bifurcated distribution patterns that deviate from standard practices and mirror patterns identified in Ohio. Comparative analysis with Tarrant County confirms Harris County’s patterns represent deliberate implementation rather than natural database behavior. The algorithm enables covert record attribution while providing no legitimate benefits in public databases. These findings raise concerns under the National Voter Registration Act of 1993’s transparency requirements and meet SEC materiality standards, affecting more than 5% of records with engineered modifications that would alter integrity assessments. This research shows how information warfare may target democratic institutions through seemingly benign database management practices.

Military Deception in Focus: A Quantitative Reassessment

Abstract:

Deception has long been regarded as a potent yet paradoxical tool in warfare, historically yielding strategic advantages while often being underappreciated. This study examines the frequency of deception in military operations using a random sample of 40 historical battles. Findings reveal that deception is employed in 30-53% of military operations, challenging prior estimates of over 80%. By clarifying deception’s prevalence, this research offers new insights to enhance military strategies and to refine the integration of deception into contemporary operations.

Politics by Other Memes: Ukrainian Memetic Warfare after the Russian Full-Scale Invasion

Abstract:

This article explores Ukraine’s use of memes as a tool of operations in the information environment (OIEs) during the Russo-Ukrainian War. Employed by a decentralized, civic-driven network, Ukrainian memes boosted morale, countered Russian propaganda, and shaped international narratives. Divided into categories of popularization of Ukrainian heroism, mockery of Russians, and self-reflective irony, these memes exemplify the strategic utility of memetic warfare. Despite challenges in control and predictability, their viral success underscores their efficiency as an OIE tool. The Ukrainian case highlights the growing importance of memes in modern conflicts and calls for integrating memetic warfare into broader information operations strategies.

Engineering Behaviour: A Novel Approach Based on Applied Behaviour Analysis for Strategic Communication

Abstract:

This paper introduces a novel approach to Strategic Communication (Strat Com) by integrating Applied Behaviour Analysis (ABA) principles, aiming to achieve sustained behavioural change within target audiences. By applying the MO-ABC framework, the study systematically designs influence operations and evaluates their impact on behaviour in case studies, including Ukraine’s communication and mobilisation campaign and the British Army’s recruitment effort. The findings demonstrate that effective StratCom requires not only persuasive messaging but also the design of environmental contingencies that reinforce target behaviours. This approach offers a robust framework for future influence operations in complex information environments.

A Case for Active Information Defence: Why Shoot the First Cyber-Bullet?

Abstract:

As hybrid actors increasingly exploit misinformation for tactical purposes, responding effectively to informational attacks has become a critical challenge. Determining the optimal timing for such responses presents a dilemma: reacting too early may inadvertently amplify the attack, while responding too late risks ceding strategic initiative to the adversary.

To address this issue, the cognitive biases at stake in decision making in these contexts is analysed. A novel game-theoretical model to conceptualise the problem of response timing is then introduced. This model is applied to two case studies, from which practical insights for the implementation of an active informational defence strategy are drawn.

Analysis of Wisconsin Voter Rolls Reveals Evidence of Exploited Systemic Vulnerabilities

Abstract:

This analysis investigates whether Wisconsin’s voter registration database exhibits structural vulnerabilities or evidence of exploitation. Findings reveal three significant deviations from standard practice: systematic duplication of voter identifiers affecting over 874,000 records; mathematically precise interlaced ID patterns with statistically impossible distributions; and dual ID systems where one functions as a hidden identifier. Documentation shows these vulnerabilities have been exploited, with 141 confirmed cases of duplicate voting in the analysed subset. These characteristics suggest deliberate implementation rather than accidental error, enabling covert record classification and compromised election integrity consistent with non-kinetic information warfare methods.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com