Defence

Commanding the Trend—A Policy Analysis

Abstract:

This article seeks to define what an Internet Referral Unit (‘IRU’) is by examining different IRUs in various jurisdictions and discerning their functions. It also makes a policy argument with respect to the implementation of an IRU in an Australian domestic setting. It does so by analysing Anglo-Saxon norms with respect to censorship and determining the best means of implementing an IRU that would give effect to rational public policy. It does so to highlight, through a legal history perspective and policy success perspective, that cybersecurity often brings with it new challenges to age-old questions. The paper posits that the establishment of an IRU would be consistent with Anglo-Saxon practice, leading to the issue of what legal frameworks would need to be established.

Commanding the Trend—A Legal Analysis

Introduction

* This paper was first presented at the University of Lucerne, Switzerland by the first author and has benefited from the comments and questions posed by members of the conference.

Operating in the Dark: Cyber Decision-Making from First Principles

Abstract:

The future of cyber conflict will present an uncertain, insecure, and rapidly changing environment. Cyber security will prove to be increasingly important for the defence community, and cyber literacy will be necessary for an increasing number of decision-makers. To continue to achieve its mission, the defence community should rally around a doctrinal set of first principles.

South Korea’s Options in Responding to North Korean Cyberattacks

Abstract:

North Korea has increasingly mounted cyberattacks against South Korea. This paper first examines the dramatic differences between North and South Korea in cyberspace and the history of North Korean cyberattacks. Most of these attacks are easy to attribute for three reasons: they often come from addresses known to be used by North Korea; they often occur on Korean anniversaries; and they often use similar methods and attack code. In this article, the authors discuss possible responses by South Korea. Responses to these attacks begin with invoking  international  law  and  imposing  sanctions.  Next,  South  Korea  can  strengthen  its defences by improving coordination between the government and the private sector. Finally, South Korea could, justifiably, launch counterattacks.

Information Superiority & Support: Misplaced & Misunderstood

ABSTRACT

The Australian Defence Force has recently released "an important benchmark in [their] approach to harnessing the power and opportunity presented by the information age" (DoD, 2004, p i) and is seeking “active participation in the implementation and further refinement of the concept” " (DoD, 2004, p i).  Entitled "A Concept for Enabling Information Superiority & Support" (herein referred to as the IS&S Concept Paper), the document sets out to describe in detail how the Australian Defence Force will achieve the information related objectives of Network Centric Warfare (DoD, 2004) that will in-turn facilitate the conduct of Multi-Dimensional Manoeuvre  - The Australian Defence Force's Future Warfighting Concept.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com