Editorial

Volume 3, Issue 3 Editorial

Stylized Image of the Word Editorial

OCTOBER 2004

This issue of JIW consists of papers predominantly from Australian contributors. There has been a special issue from the Naval Postgraduate School at Monterey, and the intention is that further issues will highlight research in the United Kingdom, and the National Defense University in Washington. Most issues are generic but special issues do give a forum to display research from specific sources.

Volume 3, Issue 2 Editorial

Stylized Image of the Word Editorial

SPRING 2004

Last November, the Editor-in-Chief of JIW, William Hutchinson, invited the Naval Postgraduate School in Monterey, California to put together a special issue of papers representing some of the research at NPS. We agreed and offer the five papers included in this issue. All of the papers underwent the normal JIW review process before final acceptance and publication.

The papers reflect but a small sample of the IW-related research at NPS. There are approximately 40 permanent faculty and research staff at NPS working in some area of IW, and an even larger number of graduate students who have passed through our programs and completed theses. Many of these people are affiliated with the Center for Information Systems Security Studies and Research (CISR), which was among the first federally designated Centers of Academic Excellence in Information Assurance Education and participants in the Scholarship for Service Program. Others are affiliated with the Cryptologic Research Center, which enjoys significant participation by members of the Department of Electrical and Computer Engineering, the Information Warfare program, the Center for Homeland Defense and Security, or the Center for Terrorism and Irregular Warfare (CTIW). NPS is also in the process of establishing the new Department of Defense Center of Excellence in Information Operations. The new IO center will join CISR and CTIW as components of the Cebrowski Institute for Information Innovation and Superiority. For more information about our programs, we invite the reader to visit the NPS website at www.nps.edu.

Volume 3, Issue 1 Editorial

Stylized Image of the Word Editorial

WINTER 2004

Welcome to first issue of volume three of the journal. Many excellent articles have been published since the journal was first introduced at InfoWarCon in Washington a week before that fateful day on September 11th, 2001. The range of papers presented in the previous issues illustrates the holistic nature of information warfare and information operations disciplines. This issue is no exception with topics as diverse as data mining, propaganda, critical infrastructure protection, and mobile and network security being represented.

Volume 4, Issue 3 Editorial

Stylized Image of the Word Editorial

December 2005

The final issue of JIW for 2005 includes four very different papers.  The first by Duczynski investigates the application of Effects Based Operations and uses a technique called Field Anomaly Relaxation to illustrate the issues involved.  Pierce, Warren and Corray have written a more technology based paper that examines penetration testing. In the third paper, Lubbers has written an interesting case study of that examines a real world corporate espionage case in which she was personally involved.  The last paper is slightly unusual for JIW in that it covers ground that is not directly within the scope of the journal. However, the reviewers were quite enthusiastic about this opinion piece, and as it was thought it would interest the readership, it was included.

Volume 5, Issue 1 Editorial

Stylized Image of the Word Editorial

May 2006

Volume 5 starts with a special series on the network security topic of digital security. There are three special papers on this topic. Valli examines the ability of malicious attackers to control machines remotely, Bhuyan examines how honeypots can be use to identify botnets, whilst Yek examines the use of fingerprinting by honeypots.

Volume 2, Issue 3 Editorial

Stylized Image of the Word Editorial

AUGUST 2003

This issue is slightly different than normal. The papers have been selected from those submitted to the Third World Information Security Education Conference held at the Naval Postgraduate School, Monterey, California in late June, 2003. The papers were chosen by the conference organizers – Cynthia Irvine (Naval Postgraduate School, Monterey, California) and Helen Armstrong (Curtin University, Western Australia), and were re-written for the journal. The theme for this edition of JIW is Information Security Education.

Volume 5, Issue 2 Editorial

Stylized Image of the Word Editorial

August 2006

Welcome to the fourteenth issue of JIW. It starts with Ryan’s paper on the use of information sharing as a weapon, and then leads to three technical papers. Clarke and Furnell discuss authentications for mobile devices, whilst Kamel et al examine the use of profiling in psychological operations; lastly Lim et al consider the tracking of criminal and terrorist activity using visualisation tools. Finally, Williams and Mahncke examine the important topic of security in medical records systems.

Volume 2, Issue 2 Editorial

Stylized Image of the Word Editorial

FEBRUARY 2003

In many modern business environments, even the short-term, temporary interruption of Internet / e-mail connectivity can have a significantly disruptive effect, forcing people to revert to other forms of communication that are now viewed as less convenient. Imagine, then, the effect if the denial of service was over the longer term and also affected the IT infrastructure in general.

Volume 2, Issue 1 Editorial

Stylized Image of the Word Editorial

OCTOBER 2002

Welcome to the second volume of JIW. The journal was launched a year ago in September 2001 and has gone from strength to strength. The quality of the papers presented for review has generally been excellent. This issue not only reflects this high standard but also the variety of topics covered by the Information Warfare area. They range from the technologically oriented to those more concerned with social aspects.

Volume 5, Issue 3 Editorial

Stylized Image of the Word Editorial

November 2006

The last issue for 2006 includes a paper on propaganda, two on deception and another on the state of Belgian intelligence agencies. Taylor starts by outlining and critiquing the West’s propaganda effort after illustrating its past. A renowned expert in this area, it would be interesting to see some comments about his assertions from readers. In the first paper on deception Yuill, Denning, and Feer posit a model for deceptive hiding. The second paper on this topic is by Brumley, Kopp, and Korb who examine the orientation stage of the OODA loop and its relationship to deception and self-deception. Vanhorenbeeck closes this issue with an evaluation of Belgian and European intelligence services.

Volume 6, Issue 1 Editorial

Stylized Image of the Word Editorial

MARCH 2007

Welcome to the first issue in the sixth year of JIW. As in previous issues, there are a variety of issues examined. The first paper by Hutchinson, Huhtinen and Rantapelkonen explores the idea that the perspective taken of a particular problem or conflict fundamentally effects the tactics and strategies used in it, and so the consequent outputs. Gray and Martin explain the consequences of actions in terms of an interesting concept ‘backfires’ and their relationships to types of propaganda.

Volume 6, Issue 2 Editorial

Stylized Image of the Word Editorial

AUGUST 2007

Welcome to the second issue in the sixth volume of JIW. The papers show the depth and variety if the Information Operations discipline. The first paper by Shorer-Zeltser and Ben-Israel examines the web presence of three Diasporas, whilst Webb examines the equally modern phenomenon of Information Operations by terrorist groups. Edge et al. then examine the concept of ‘protection trees’ on the risk analysis of a system. The next paper by Kuusisto et al. looks at the implications of information flow priorities for inter-organizational crisis management. Al Mannai and Lewis propose a new definition of network risk, and this issue concludes with Maule and Gallup illustrating a simulation of the US Department of Defense supporting civilian authorities in time of crisis.

Volume 6, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2007

Welcome to the last issue of 2007. Next year will be the seventh year of publication for JIW so any suggestions to improve the service to the readers will be gratefully received. We are always looking for quality papers so if you feel you want to contribute please send your work in. Most papers are of an academic nature and follow the rigorous process of peer review and need to stick to accepted practice. However, we also welcome papers with opinions on relevant topics from knowledgeable persons – these do not require such rigorous analysis by peers.

Volume 7, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2008

Welcome to the first edition of JIW for 2008. This year, as Bill Hutchinson is on leave, I have taken on the editorship and I wish to thank Bill for his continuing guidance and valuable advice.

Volume 7, Issue 2 Editorial

Stylized Image of the Word Editorial

SEPTEMBER 2008

William Sousan and his colleagues from the KEWI Research Group at the University of Nebraska investigate open source intelligence using a tailored information delivery service system, whilst Andy Luse, Anthony Townsend and Kevin Scheibe from Iowa State University present a new method for secure message transmission. In addition, we have three papers from authors who presented at the 7th European Conference on Information Warfare in Plymouth, UK, in June of this year. The first of these papers by Andrea Cullen and Ian Mann presents an interesting industry/academic perspective on balancing a layered approached in security to counteract social engineering. Linda Finch and Richard Vaughan from General Dynamics UK Limited then propose an engineering ‘fit for purpose’ security system which seeks to create flexibility in adapting to changing resource and information sharing requirements in the military. Lastly, Chris Flaherty argues that information deception is a core component of three dimensional tactics, which seeks to develop spherical security protection, particularly in the context of terrorist attacks.

Volume 1, Issue 2 Editorial

Stylized Image of the Word Editorial

DECEMBER 2001

Welcome to the second issue of JIW. The journal was launched at InfoWarCon in Washington early in September, despite some problems with the delivery of the hard copies.

This issue contains eleven papers. Four of them (Armstrong; Furnell; Fawcett and Sowerbutts; Busuttil and Warren) were selected from those presented at the 2nd Australian Information Warfare and Security conference in Perth, Western Australia (November, 2001). We are also privileged to have three eminent information warfare experts (Schwartau; Dearth; Tyrell) offer position papers. Another excellent paper from Noel et al examines anomaly detection, Chirathamjaree and Gururajan look at threat to wireless systems. Broucek and Turner delve into the expanding area of Forensic Computing whilst Davey and Armstrong give us an approach to teaching cyber warfare. I hope you find this a diverse and interesting issue.

Volume 1, Issue 1 Editorial

Stylized Image of the Word Editorial

SEPTEMBER 2001

It is with great pleasure that we present the first issue of the Journal of Information Warfare (JIW). It is an international journal created to share quality information to researchers and practitioners in the field. We hope that you will contribute as well as read this publication. The journal will cover the broad spectrum of issues associated with Information Warfare such as military, government, commerce, and education. Over the last decade, as the Information Society has evolved, the discipline has grown from purely being the concern of those in defence, to the whole of society. JIW will address this phenomenon, and intends to become the first point of call for contemporary commentary for Information Warfare. The editors of JIW intend to maintain a level of excellence in the papers presented. Each paper is blind-refereed by two people experienced in the field. Some contributions will be academic in nature, some statements of opinion, some experiential from practitioners. All are welcome. Standards will be kept high, but it is recognised that each type of paper has different means of assessing its value and significance. Also, we welcome letters to the editor. Please send them to my e-mail address below, as well as any suggestions for improvement to JIW.

Volume 1, Issue 3 Editorial

Stylized Image of the Word Editorial

WINTER 2002

Chief Editor Bill Hutchinson asked us some months ago to lead the effort to produce a special issue of this Journal dedicated to the overarching topic of Perception Management. As members of the Journal’s Advisory Board, we were happy to do so, despite the fact that major new projects rarely arise at the most opportune times. In addition to our own contributions, we have assembled an international team of exceptional theorists and practitioners from the United Kingdom, the United States, Australia, and Sweden.

Volume 7, Issue 3 Editorial

Stylized Image of the Word Editorial

DECEMBER 2008

This final edition of JIW for 2008 covers vulnerability in IPSec tunnels, malware analysis, wireless deployment in the defence forces, and a discussion of the lessons that could be learnt from modern military conflict.

Volume 8, Issue 1 Editorial

Stylized Image of the Word Editorial

APRIL 2009

Welcome to the first issue of JIW for 2009. Firstly, Yin looks at the use of the Internet in the 2000-2008 Intifada. This is followed by Baines who examines the use of fear in information operations campaigns and compares this with research on marketing communications. Next Sentse and Jansen examine the use of fusion cells in counter-insurgency. Finally, Veerasamy proposes a high level framework for contextualising cyber-terrorism.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com