Uncertain Security Community: Building Western Cyber-Security Order


Leading NATO countries (such as the United States, the United Kingdom, Germany, and France) are rather like-minded when it comes to cyber-threat assessments and cyber-security policy priorities. They share common security values and norms and identify common cyber threats. In this regard, they can be identified as members of the same security community. However, when it comes to strategies for building cyber security, there is disparity among them.

Cyber Security in the Context of Armenia-NATO Cooperation


NATO is one of the main actors in the development and modernisation of the national security architecture of Armenia. One of the main research goals of the authors is to understand the qualitative and quantitative framework of Armenia-NATO cooperation. From this perspective, the authors of this article analyse cyber-security cooperation between Armenia and NATO based on DOTMLPF II components.

An Analysis of the Social-Media Technology, Tactics, and Narratives Used to Control Perception in the Propaganda War over Ukraine


Framed by the historic 2013-2015 conflict in Ukraine—widely described by Western media as a ‘Cold-War’-style clash between the Russian Federation and the United States/NATO alliance—this qualitative case study examines how social media was used as a platform for propaganda warfare waged by clandestine bloggers and special operations commandos (known as trolls) deployed worldwide by state and non-state actors, and digitally linked and informed by data-mining, to manipulate public perceptions of the events by controlling an element of rhetoric known as narratives.

NATO and Strategic PSYOPS: Policy Pariah or Growth Industry?


In the aftermath of 9/11, among many other changes to its defense establishment, the United States has undertaken a significant re-vamping of its strategic psychological operations (PSYOPS) structure and capabilities.xxxviii Similarly, NATO must now determine if it can adapt and face the realities of the modern security environment -- where current and potential threats to peace will confront NATO through asymmetric means rather than through the use of conventional military forces. Of particular interest in this study, are unconventional attempts to confront NATO via aggressive regional and international perception manipulation.

Know Your Enemy, Know Your Allies: Lessons Not Learned from the Kosovo Conflict


There appears to be a world of difference between NATO’s war over Kosovo in 1999 and the US-led war in Afghanistan 2001. The former was a limited war waged with the active involvement of NATO member countries against an identifiable enemy in well-known terrain, whereas the recent war in Afghanistan seems to lack any of these characteristics. Despite the differences, however, US media management in the first weeks of the war in Afghanistan have been hauntingly familiar for observers of previous conflicts. While mistakes will clearly always be made in times of crisis and war, the US efforts to shape the Information Space outside its own territory demonstrates that certain lessons should and could have been drawn from the Kosovo conflict – if the US is genuinely serious about enlisting the aid of its allies in its struggle with global terrorism.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.














Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.


Get in touch

Principal Office

  • Journal of Information Warfare
  • ArmisteadTEC
  • 525 Landfall Arch,
  • Virginia Beach, VA 23462

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455