Volume 3, Issue 1

Volume 3, Issue 1 Editorial

Stylized Image of the Word Editorial


Welcome to first issue of volume three of the journal. Many excellent articles have been published since the journal was first introduced at InfoWarCon in Washington a week before that fateful day on September 11th, 2001. The range of papers presented in the previous issues illustrates the holistic nature of information warfare and information operations disciplines. This issue is no exception with topics as diverse as data mining, propaganda, critical infrastructure protection, and mobile and network security being represented.

A Tale of Two Cities: Approaches to Counter-Terrorism and Critical Infrastructure Protection in Washington, DC and Canberra


All nations undertake a variety of activities to protect their citizens from the threat posed by terrorism. In the last decade, the requirements of effective counter- terrorism (CT) policy have become more demanding as the result of the changing nature of global terrorism, and the challenges posed by the requirement to protect vulnerable critical national infrastructures (CNI). (Since the events of 11 September 2001, of these policies has taken on an unprecedented importance.) But the approaches taken by different nations regarding national CT and critical infrastructure protection (CIP) policies have varied considerably. In this paper, the authors will examine the approaches to CT and CIP policies adopted by two nations – the United States and Australia – both before and after 11 September 2001. The paper concludes by proposing explanations for the different approaches in CT and CIP policies adopted by the United States and Australia.

Using Data Mining Techniques for Detecting Terror-Related Activities on the Web


An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (‘profile’) of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system to perform real-time detection of users suspected of being engaged in terrorist activities. The Receiver-Operator Characteristic (ROC) analysis shows that this methodology can outperform a command- based intrusion detection system.

A Critique of Coalition Propaganda Before the Second Gulf War


This paper investigates and critiques the propaganda emanating from the main players in the ‘Coalition of the Willing’ (USA, UK, and Australia) in the three months before the invasion of Iraq. It outlines the US-led information campaign and analyses its successes and failures.

Mobile Web Service Security


Web services are a new technology that gained much attention from service providers that provide web-based applications. Web services are so popular, because they are, as XML (eXtensible Markup Language) based services, very flexible, easy to deploy, fast to process and can be used for automated process as well as for user-oriented systems. The discussion on the deployment of web services is always connected to the security of this technology. For mobile web services this problem becomes even more imminent, since mobile clients do not have the security capabilities of a PC-based web service client. The threats to mobile web services and deployment of possible protection technologies will be discussed. The concept of a security gateway will be introduced in the context of a mobile web service security concept. This security gateway shall offer security support for mobile clients.

A Case Study in the Security of Network-enabled Devices


It is becoming increasingly common for appliances and other electronic devices to be network-enabled for usability and automation purposes. There have been fears that malicious users can control such devices remotely. Since the installation base of such network-enabled household devices is still relatively small, we examine the types of vulnerabilities that another such appliance has, the network-enabled printer, which is commonly found in the education and business sector. In this paper we analyze the source of the vulnerabilities and present detailed threat scenarios. In addition, we examine four organizations in Australia and Europe. Based on the results of the case study, we draw conclusions on the effects of an information warfare attack using network-enabled devices as the medium.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.
















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455