Cyber Power

Digital Technologies and Security: Towards a Recomposition of the Strategic Field of Information Warfare?

Abstract:

Digital technologies are often described as transforming security and war, yet their strategic effects remain contested. This article argues that cyber capabilities and related digital infrastructures are better understood as recomposing the strategic field rather than inaugurating a discrete Revolution in Military Affairs. Drawing on large-N datasets of interstate cyber incidents, illustrative case studies, and policy and doctrinal documents, it traces how digital tools reshape instruments of coercion, diversify relevant actors beyond states, and blur domestic and external spaces of security. The analysis highlights governance dilemmas for deterrence, alliance coordination, and the regulation of platform power.

Set Your Drones to Stun: Using Cyber-Secure Quadcopters to Disrupt Active Shooters

Abstract:

This paper will examine pairing the autonomous precision-flight capabilities of Micro- Unmanned Aerial Vehicles (UAVs) with the growing capability of Artificial Intelligence (specifically AI based on neuromorphic computing systems) to field cyber-secure, active-shooter response systems to counter the active-shooter threat to civilian ‘soft targets’, such as schools or train stations. This paper proposes a pilot to demonstrate the feasibility of disrupting terrorist attacks with a micro-UAV, armed with less than lethal weapons, for instance, a stun gun, where such a ‘stun-drone’ is part of an emergency-response system that is trustworthy and correctly engages only active shooters.

What Are the Metrics of Cyber Warfare? How Does One Measure Success?

ABSTRACT

This paper continues the process of laying the groundwork for a new comprehensive academic theory on Cyber Macht (Cyber Power). In this particular paper, the authors focus on trying to determine the metrics of cyber operations; in other words, how does one measure success? The ability to measure and validate success is always a crucial metric in the performance of a task; and in this case, the conduct of IO campaigns is no different.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS
ICT

M

N

NEC
NSA
NSS

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com