Journal of Information Warfare
The Journal of Information Warfare (JIW) is turning a new page. We are moving forward with a new Chief Editor, Dr. Leigh Armistead, as well as maintaining our excellence by bringing back Dr. Bill Hutchinson as the Deputy Editor. Bill founded this esteemed journal 15 years ago, and the staff of the JIW wanted to bring him back so that this publication could focus on its original intent – namely to deliver high quality, highly technical papers on cutting edge IW and Cyber Warfare topics. This will be done by linking closely with the academic IW conferences, to deliver new and exciting articles for publication in the JIW. Dr Armistead received his PhD in IW and has written three books.
In addition, a new site is being stood up to share information on academic, operational, strategic and tactical on areas such as IA, IO, Cyber Security and Warfare. As part of this effort JIW and a new publication, the Cyber Operations Journal (COJ) will also be stood up as an operational and tactical online journal to discuss Cyber Issues on a timely basis. This journal will discuss actual cyber war strategies, tactics, techniques, legal issues, pros, cons and bleeding edge issues. Ongoing issues will definitely include China and Russia, hopefully including articles from their experts, as well.
Dr. Leigh Armistead, President, Peregrine Technical Solutions along with the Information Assurance Directorate (IAD) of the National Security Agency (NSA) collaborated for the April 2014 edition of the Journal of Information Warfare (JIW). In this special JIW issue, all 10 articles were written by serving members of the IAD at the NSA, which produced a unique, unclassified publication that focuses on cyber security efforts in realizing “Confidence in Cyberspace.” The papers below are all unclassified and vetted by the IAD.
- Achieving Confidence in Cyberspace in an Ever-Changing Ecosystem
- Cyber-Mugging: Summary and Analysis of a simulated ICS/SCADA Attack
- Active Cyber Defense: A Vision for Real-Time Cyber Defense
- How IAD Leverages Big Data for Anomaly and Malware Detection (v10.2)
- Information Assurance Standards: A Cornerstone for Cyber Defense
- Introducing the National Security Cyber Assistance Program (NSCAP)
- Outmaneuvering Cyber Adversaries Using Commercial Technologies
- Securing the Cloud
- Using Classified Intelligence to Defend Unclassified Networks
- Building Future Generations of Elite Cyber Professionals (CNODP)
The April 2014 issue of JIW was the first time that NSA IAD worked with an academic journal to create a special issue. It was a great learning experience for some of our internal experts, and also helped raise awareness of some of our important mission challenges among academic researchers in this field.
- Neal Ziring
Received Mention as media partner at the following site: http://www.informationoperationsevent.com/mediapartner