Cyber Warfare and War in Ukraine


Today cyberspace is a one military domain. The new cyber capacities of armed forces create new possibilities to achieve the goals of war. These new and advanced cyber capabilities are a part of the new non-kinetic environment where cyber operations are used in combination with information warfare (IW) and electronic warfare (EW). These non-kinetic operations are used with lethal weapons systems to produce an operational advantage. This article is a preliminary review of cyber operations in the Ukraine conflict. The article reviews the balance between defense and offense in cyberspace, the utility of offensive cyber operations, and the requirements for effective cyber defence.

Extending the ‘Attribution Problem’: Why Who-Based Attribution Is Insufficient to Deterring Cyberattacks


Current scholarship explains the shortcomings of cyber deterrence through the difficulty involved in proving who launched an attack—what scholars refer to as the ‘attribution problem’. This paper identifies an additional intelligence-centric impediment to cyber deterrence. Cyberattacks yield effects in a manner that is indirect, while offensive cyber operations are multi-stage and multipurpose. 

Defending the Cyber Sea: Legal Challenges Ahead


New technologies are creating a massive concern for the shipping industry as cyberat-tacks on board ships and in ports continue to rise. More than 90% of world trade is carried by the shipping industry; and, as of 2018, there are more than 53,000 merchant ships sailing the cyber seas. At the same time, these systems are very vulnerable to cyberattacks. Through empirical research, this paper explores the global maritime cybersecurity legal landscape and advances recommendations for policy and legal frameworks essential to ensure safety and security on the cyber sea.

Assessing Cyber Security Threats and Risks in the Public Sector of Greece


Organisations having to cope with new threats and risks are increasing their focus and looking at novel ways to improve their cyber security assurance. As critical national infrastructures are becoming more vulnerable to cyberattacks, their protection becomes a significant issue for EU member states. The National Cyber Security Authority of Greece (NCSA) takes all necessary steps towards a secure Greek cyberspace.

South Africa and the Cyber Security Dilemma


With the rise of cyberattack as an instrument of state power, researchers are translating the international relations theory of the Security Dilemma into the cyber-domain, referred to as the Cyber Security Dilemma. Currently South Africa is expanding its national cyber-security posture under the mandate of the National Cybersecurity Policy Framework and the Cybercrimes Bill, which involve the growth of cyber-security capabilities for the military. 

Enabling Successful Artificial Intelligence Implementation in the Department of Defense


The Pentagon sees Artificial Intelligence (AI) as a key enabler of future military operations. However, to secure the potential promise of AI, the Department of Defense (DoD) must address a number of challenges including technological diversity, cultural silos, and insufficient skillsets. The onset of what is perceived to be the next global ‘arms’ race will position ’the winner’ as the top superpower that could define and dictate future directions and priorities across the globe. 

DDoS Attack Simulation to Validate the Effectiveness of Common and Emerging Threats


Distributed Denial of Service (DDoS) attacks are a persistent cyber threat and a growing concern in computer security. This paper seeks to analyse DDoS attacks and the technologies that have been developed in an attempt to combat their effectiveness. This paper includes results from a DDoS simulation using commercial hardware appliances to both demonstrate and measure the effectiveness of DDoS attacks on a targeted victim. The simulation validates the relevance of these hardware appliances in identifying and reducing network vulnerabilities. This paper also provides insight on the current impact of DDoS attacks globally and the threat that these attacks pose in the future.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.















Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455