Volume 8, Issue 3

Volume 8, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2009

Welcome to the 24th issue of JIW and the last that I will be Editor in Charge. I will be retiring at the end of the year so wish you all well and thank you for all your contributions over the last eight years. The organisation of the journal will be changed somewhat with Professors Matthew Warren and Craig Valli, and Dr. Leigh Armistead sharing the editorial load which should make better management of the content.

The Future Roles of Electronic Warfare in the Information Warfare Spectrum

ABSTRACT

As the concept of the battlefield changes and the focus shifts towards the dominance of the 'Info-sphere', the role of information and information systems becomes more prominent. As an ever-increasing proportion of the information and communications technology is becoming wireless, electronic warfare (EW) may find new roles and 'targets.' This paper will explore the future roles that EW could play as a discipline within the Information Warfare (IW) construct, and examines possible 'relationships' and influence EW will have on other functional areas of IW, by analysing technological trends in conflicts.

An Emergent Security Risk: Critical Infrastructures and Information Warfare

ABSTRACT

This paper examines the emergent security risk that information warfare poses to critical infrastructure systems, particularly as governments are increasingly concerned with protecting these assets against attack or disruption. Initially it outlines critical infrastructure systems and the notion of information warfare. It then discusses the potential implications and examining the concerns and vulnerabilities such cyber attacks would pose, utilising exemplar online attack occurrences. It then examines the current Australian situation before suggesting some considerations to mitigate the potential risk that information warfare poses to critical infrastructure systems, and by association: government, industry and the wider community.  

Cyber Terrorism Awareness within the New Zealand Critical Infrastructure

ABSTRACT

Dependence on computers has transformed information technology into a potential terrorist target. Prevention of Cyber terrorism should be part of holistic national security policy. This paper analyses the results of a study that indicates New Zealand’s critical infrastructure is not ready for a cyber terrorist attack and gives some recommendations.

Use of a Secure Portable Application Device as a Component of Network Centric Operations

ABSTRACT

Network Centric Operations (NCO) allows an organisation to structure its people, processes and technology to gather and process information to ensure the right information gets to the right person at the right time in and the right form. NCO enables an organisation to achieve information superiority, and hence gain a competitive advantage.

Developing an Academic Curriculum in Information Operations: The First Steps

ABSTRACT

Increasingly the realm of Information Operations (IO) and Cyber Warfare are seen as crucial to the success of the Department of Defense’s ability to conduct military missions, yet the training and education efforts associated with these areas are often disjointed and uncoordinated. Whilst a large number of universities have developed more specialized Information Assurance (IA) or computer security programs, the broader aspects of IO are still not seen as worthy of study by the academic community.  In this paper, the authors outline the need for an academic response to develop a better methodology of an Information Operations Education program, to include research and recommendations for future efforts to develop standards and metrics in the IO training and education realm.

NATO’s Security Operations in Electronic Warfare: The Policy of Cyber Defence and the Alliance’s New Strategic Concept

ABSTRACT

The North Atlantic Treaty Organisation (NATO) is evolving, both militarily and politically. In April of 2009, Allied member-states agreed to a renewed Strategic Concept to be presented in 2010. There will be a requirement of technological update against any forms of asymmetrical threats that includes electronic attacks. NATO is steadily unfolding a policy of Cyber- Defence. This paper provides the reader with the appropriate information, on what has been accomplished up to this date, in relation to NATO's network operational preparations. It examines and evaluates existing policies and recommends new ones to counter 21st century electronic warfare attacks.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com