Volume 3, Issue 3

Volume 3, Issue 3 Editorial

Stylized Image of the Word Editorial


This issue of JIW consists of papers predominantly from Australian contributors. There has been a special issue from the Naval Postgraduate School at Monterey, and the intention is that further issues will highlight research in the United Kingdom, and the National Defense University in Washington. Most issues are generic but special issues do give a forum to display research from specific sources.

Understanding the Application of Deception in Network Security


Deception techniques are often employed as part of a proactive and preventative measure of security. However, its application in security has seldom been expressed with a defining explanation of the actual deception. This paper will present a discourse on the existence of deceptions in nature to construct a model that has application to network deceptions. A model of deception will be developed with the intention of applying the delineated actions of deceit, deception, and deceiving to a wireless honeypot. In a future experiment, a research goal will be to establish associations between deceptions deployed and the attainment of network defense goals through implementation of the model of deception.

Reflections on Information Age Air Warfare


The information age has produced some profound shifts in military power, and nowhere has this been more apparent than in the domain of air power. A digitized air force represents the most pronounced case study of the impact of information technology and networking on achievable combat effect. This paper will explore the defining relationships in information age air warfare, from the dual perspectives of function and resistance to an opponent’s use of information warfare strategies. The importance of Moore’s Law and sensor apertures in information gathering is discussed, the relationship between Boyd’s OODA loop, Metcalfe’s Law and Amdahl’s Law is explored for large military systems, and the relationships between the linear and lateral evolutionary potential of combat aircraft and their future utility is studied.

On the Importance of Protecting Critical Infrastructure related Engineering Descriptor Information (CIEDI)


The international security situation has lead to increased concern regarding malicious attacks against critical infrastructure (CI). CI encompasses a number of essential services some of which are water, electricity, and gas supply. For all such service-based assets there exists engineering information that includes architectural blueprints, structural composition data, and layout schema of key facilities. Such information exists within electronic systems and on paper as well. This paper argues that CIEDI must be recognized as part of the overall national CI as access to such information may assist attack on the CI itself. This paper proposes a definition of CIEDI and suggest CIEDI be addressed as part of the overall organizational security lifecycle with emphasis on maintaining uniform standards across physical and cyber media.

An Analysis of Current 802.11 Wireless Network Layer One and Two Attacks and Possible Preventative Measures


The last 2 years has seen a major increase in the number of users of wireless networks, for both public and private use. Initially, there were a number of problems with data security, such as WEP, that made wireless networks vulnerable to attack. While data security has been increased through the use of tougher encryption and other methods, newer attacks based on lower levels are emerging. Layer 1 is the physical medium used to send the signal, in this case radio frequency, with connection and management handled by the MAC sub-layer of layer 2. Tools such as Airjack and Void11 can be used to launch DDoS and man-in-the-middle attacks against layer 2 of wireless networks, with jamming attacks used against the Physical layer.

Anonymity Enhancing Technologies (AET): Opportunities and Threats


Privacy of Web surfers nowadays is frequently compromised by eavesdroppers. The threat applies to surfers’ identities, the World Wide Web (hereafter: the Web) site being browsed, and their association. This article provides a comprehensive review of AET for the Web. First, the article examines the nature of threats to anonymity. Next, theoretical and practical solutions for protecting surfers’ anonymity are presented and their capabilities are extracted. The solutions are then analyzed and mapped with regards to their performance and the degree of anonymity they cater for. The analysis clearly demonstrates the inherent trade-off between performance and anonymity provided by AET.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.
















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455