Editorial

Volume 17, Issue 1 Editorial

Stylized Image of the Word Editorial

Winter 2018

A sovereign nation is often defined by its geographical boundaries—a line on a map—that delineates the limits of its territory. Over time, those definitions have expanded into the sea and air, as technology has enabled militaries to defend these domains from foreign intrusion.

Volume 16, Issue 4 Editorial

Stylized Image of the Word Editorial

Fall 2017

Information has always been a weapon; and, throughout most of human civilisation, it has been hoarded and kept limited to those groups that had control over it. Early on, the Internet was seen as democratic and liberating. As recent events have demonstrated, however, the Internet has become another domain in which information can be weaponised and used to the advantage of a person, an organisation, or a nation-state. 

Volume 16, Issue 3 Editorial

Styled jiw editorial image

Summer 2017

Most of the papers in this latest edition of the Journal of Information Warfare represent the best presentations from the 2017 International Conference on Cyber Warfare and Security (ICCWS) held in Dayton, Ohio, and co-sponsored by Wright State University and the U.S. Air Force Institute of Technology (AFIT). This issue of JIW contains a wide variety of research focusing on the broad spectrum of cyber warfare, with an emphasis on Industrial Control Systems (ICS), 

Volume 16, Issue 2 Editorial

Stylized Image of the Word Editorial

Spring 2017

Information Warfare. We used to talk about this as a historical or acadewhich mic issue, one in we could use vignettes or test cases from World War II or Vietnam as instances of deception, operations security, or psychological warfare efforts conducted in an active warfare operation. Everything has changed as we see an active measure information campaign by Russia during the 2016 United States election process, where fake news is considered the norm.

Volume 16, Issue 1 Editorial

Stylized Image of the Word Editorial

Winter 2017

We certainly live in interesting times. Just look at the United States presidential election in 2016. Which of the following were at play? Partisan politics? Russian interference?  Information Warfare?  An act  of  war? All of the above? Or, none of the above? The articles in this latest edition of the Journal of Information Warfare cover issues and ideas as wide-ranging as the possibilities so characteristic of our current times. We hope you enjoy these papers.

Volume 15, Issue 4 Editorial

Stylized Image of the Word Editorial

Fall 2016

Post-Truth. Conspiracy Theories. Influence Campaigns. The last few months have been incredibly interesting (and perhaps, terrifying) from an information warfare perspective because all of the issues that have been researched, written about, and published by so many authors and in so many forums are now being played out on the world stage. It is also clear that the shift from the Industrial Age to the Information Environment may not mean that the U.S. will forever remain the dominant player in the political arena.

Volume 15, Issue 3 Editorial

Stylized Image of the Word Editorial

Summer 2016

Cyber Security is certainly the hot topic of 2016 and this latest version of JIW reflects that emphasis. We have a wide spectrum of papers in this edition, with a diverse group of authors from around the world who have contributed to this edition. I think that you will find it very interesting and thought provoking.

Volume 15, Issue 2 Editorial

Stylized Image of the Word Editorial

Spring 2016

This is the special edition we produce each year in collaboration with the National Security Agency (NSA). Formerly, we worked with Neal Ziring, the Technical Director of the Information Assurance Directorate (IAD), on what turned out to be a great collaborative effort. This year, we were supported by Dr. Emily Goldman and the Joint Action Group of U.S. Cyber Command. As before, this joint effort will produce a number of unique and original papers on cutting-edge areas of interest to our subscribers, that are focused on first-person, experimental, primary research from the NSA and Cyber Command.

Volume 9, Issue 3 Editorial

Stylized Image of the Word Editorial

December, 2010

Welcome to the third issue of JIW for 2010 and the 27th issue overall. The Journal of Information Warfare continues to engage in the ever widening discipline of information warfare / operations. In particular, this issue puts forward a range of papers that push the information warfare envelope in several new directions. The impact of influence can now be seen through a variety of lenses, and although we contest these differences as we search to define and distinguish our efforts, we must continue to acknowledge the wide-ranging scope of information warfare.

Volume 9, Issue 2 Editorial

Stylized Image of the Word Editorial

September, 2010

Welcome to the second issue of JIW for 2010 and the 26th issue overall. The Journal of Information Warfare continues to engage in the ever widening discipline of information warfare / operations. In particular, this issue examines disparities in the field of influence across both soft and hard power, and within critical and non-critical structures. The issue has 5 papers. The paper by Huhtinen, Armistead and Schou looks at the integration of information warfare training with traditional military training. It considers the shift from  command and control-based leadership to new forms of information-based contributions.

Volume 9, Issue 1 Editorial

Stylized Image of the Word Editorial

April, 2010

Welcome to the first issue of JIW for 2010 and the 25th issue overall. Professor Bill Hutchinson formally retired in January 2010, and without his tireless efforts the journal would not have established itself as such a strong contributor to the research field that we broadly refer to as Information Warfare. In his place, the Journal now boasts a team of three academics (Professor Matthew Warren, Professor Craig Valli, and Dr Leigh Armistead) who will directly guide me into producing future issues of JIW.

Volume 10, Issue 1 Editorial

Stylized Image of the Word Editorial

April 2011

Welcome to the first issue of JIW for 2011 and the 28th issue overall. The Journal of Information Warfare is committed to an involvement in the wider discipline of information warfare and information operations. This issue considers a range of issues relating to Information Warfare. 

Volume 15, Issue 1 Editorial

Stylized Image of the Word Editorial

March 2016

Information Warfare is a term that means many things to many people. The Journal of Information Warfare (JIW) strives to be as inclusive as possible to bring in all different aspects of this important capability, from the “softer” topics, such as perception management and strategic communications, to the “harder” areas, such as computer network defense and electronic warfare.

Volume 14, Issue 4 Editorial

Stylized Image of the Word Editorial

FALL 2015

I want to thank all subscribers and authors for your support of the Journal of Information Warfare (JIW). The number of papers submitted has increased dramatically; and, as always, we welcome new submissions. Our rigorous double-blind peer-review process remains unchanged: through this process, we are able to collect objective feedback for all submissions. In addition to our regular issues, we continue to produce a special edition each April with the National Security Agency (NSA). In 2016, we will also be collaborating with USCYBERCOM for this special edition.

Volume 4, Issue 1 Editorial

Stylized Image of the Word Editorial

February 2005

The fourth volume of the JIW has seven papers that reflect the variety of topics in the Information Warfare (Operations) discipline. The first by Geoffrey Darton explores the relationship of International Law and Information Warfare. Next Montgomery McFate takes us into the mysterious world of North Korea and examines the American perspective on the issues that could help influence operations with that state. Cecilia Andrews investigates belief systems and how belief networks can assist in Information Warfare strategies. Cameron Wells examines the differences between the US and Australian concepts of Network Centric Warfare.

Volume 4, Issue 2 Editorial

Stylized Image of the Word Editorial

SEPTEMBER 2005

Welcome to the 11th issue of JIW. I must apologize for the delay in this issue. Factors beyond our control contributed to this. However, this issue addresses a variety of topics and come from authors in a number of nations (the UK, Finland, and Australia). The first from Darnton looks at the use of content analysis in information warfare, whilst Jormakka and Molsa examine the more mathematically base game theory as a tool in information warfare. Rowlingson looks at the ever present threat from insiders as a threat to information security. Hutchinson looks at information and its changing nature and use by governments, and finally Jones, Mee, Meyler, and Gooch examine the security threat from the casual disposal of data storage media.

Volume 3, Issue 3 Editorial

Stylized Image of the Word Editorial

OCTOBER 2004

This issue of JIW consists of papers predominantly from Australian contributors. There has been a special issue from the Naval Postgraduate School at Monterey, and the intention is that further issues will highlight research in the United Kingdom, and the National Defense University in Washington. Most issues are generic but special issues do give a forum to display research from specific sources.

Volume 3, Issue 2 Editorial

Stylized Image of the Word Editorial

SPRING 2004

Last November, the Editor-in-Chief of JIW, William Hutchinson, invited the Naval Postgraduate School in Monterey, California to put together a special issue of papers representing some of the research at NPS. We agreed and offer the five papers included in this issue. All of the papers underwent the normal JIW review process before final acceptance and publication.

The papers reflect but a small sample of the IW-related research at NPS. There are approximately 40 permanent faculty and research staff at NPS working in some area of IW, and an even larger number of graduate students who have passed through our programs and completed theses. Many of these people are affiliated with the Center for Information Systems Security Studies and Research (CISR), which was among the first federally designated Centers of Academic Excellence in Information Assurance Education and participants in the Scholarship for Service Program. Others are affiliated with the Cryptologic Research Center, which enjoys significant participation by members of the Department of Electrical and Computer Engineering, the Information Warfare program, the Center for Homeland Defense and Security, or the Center for Terrorism and Irregular Warfare (CTIW). NPS is also in the process of establishing the new Department of Defense Center of Excellence in Information Operations. The new IO center will join CISR and CTIW as components of the Cebrowski Institute for Information Innovation and Superiority. For more information about our programs, we invite the reader to visit the NPS website at www.nps.edu.

Volume 3, Issue 1 Editorial

Stylized Image of the Word Editorial

WINTER 2004

Welcome to first issue of volume three of the journal. Many excellent articles have been published since the journal was first introduced at InfoWarCon in Washington a week before that fateful day on September 11th, 2001. The range of papers presented in the previous issues illustrates the holistic nature of information warfare and information operations disciplines. This issue is no exception with topics as diverse as data mining, propaganda, critical infrastructure protection, and mobile and network security being represented.

Volume 4, Issue 3 Editorial

Stylized Image of the Word Editorial

December 2005

The final issue of JIW for 2005 includes four very different papers.  The first by Duczynski investigates the application of Effects Based Operations and uses a technique called Field Anomaly Relaxation to illustrate the issues involved.  Pierce, Warren and Corray have written a more technology based paper that examines penetration testing. In the third paper, Lubbers has written an interesting case study of that examines a real world corporate espionage case in which she was personally involved.  The last paper is slightly unusual for JIW in that it covers ground that is not directly within the scope of the journal. However, the reviewers were quite enthusiastic about this opinion piece, and as it was thought it would interest the readership, it was included.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com