[iwar] Historical posting


From: Fred Cohen
From: fc@all.net
To: iwar@onelist.com

Mon, Jan 1, 1999


fc  Mon Jan 1, 1999
Received: (from fc@localhost) by all.net (8.9.3/8.7.3) id FAA15269 for iwar@onelist.com; Tue, 18 Apr 2000 05:21:43 -0700
To: iwar@onelist.com
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, Jan 1, 1999
From: Fred Cohen 
Reply-To: iwar@egroups.com
Subject: [iwar] Historical posting

          

 On 19 Aug 1999 iwar-owner@onelist.com wrote:

> I would very much like it if new members would anounce themselves
> to the list and tell the rest of us something about yourselves. In
> addition, we are soliciting opinions on what "Information Warfare" 
> is and would welcome all new members to post their current views
> to the list as part of their initial greeting message.


Per the request for introduction above:
My name is Toby Kohlenberg. I am a member of the Corporate Information
Security
technology team for Intel Corp. (standard disclaimer applies; I speak only
for myself any opinions stated are strictly my own and in no way represent
Intel). I have been working in security for about 5 years, most/all of that
in the field. I have just recently started moving towards the research end
of
things. I am a generalist when it comes to security, interested in all
areas.

As to what defines Information Warfare...... Warfare in the classic sense is
a struggle between enemies. That seems like a good place to start. This
seems
like simply a new battle field on which to fight. The goals are the same;
defense- protect what is ours (integrity, availability, accessibility
(control
who sees it, as well as ensuring that they can).
offense- make useless the enemy's information. Either by destruction,
corruption, denial of access or retrieval(negate value by removing the
secrecy).

I think some of the interesting questions for me are; 
1. how to train an info warrior.  (we can train a soldier for warfare and he
will learn because what he learns might save his life. How do we create that
same urgency when you are working at a command prompt?)
2. what the "geneva conventions" of IW will be (we can't use bioweapons,
what
is the IW equivalent?).
3. who will wage IW, and at what scale? Does the government train the
warriors
and use them to help defend corporations? Do corporations train their own
people? Where is the line between appropriate for companies and appropriate
for
government stand?

That is my take on it. I will be interested to hear other opinions.

Toby

---------------------------------------------------
	Toby Kohlenberg 
	Intel Corporate Information Security
	Technologies Team
	Systems & Security Specialist 
	toby.kohlenberg@i...
	503-264-9783	Office & Voicemail
	888-457-2349	Pager

	"Just because you're paranoid, Doesn't mean they're not after
you!"

PGP Fingerprint:
92E2 E2FC BB8B 98CD 88FA  01A1 6E09 B5BA 9E84 9E70

Disclaimer: This email transmission and any files that accompany it may
contain extremely
sensitive information belonging to the Sender and/or Intel Corporation.
The information is intended only for the use of the individual or entity
named. If you are not the
intended recipient, you are hereby notified that any disclosure,
copying, distribution, or the
taking of any action in reliance on the contents of  this information is
strictly prohibited.
----------------------------------------------------