Re: [iwar] first-timer


From: Tony Bartoletti
From: azb@llnl.gov
To: iwar@egroups.com

Wed, 12 Jul 2000 13:39:52 -0700


fc  Wed Jul 12 13:33:17 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Wed, 12 Jul 2000 13:33:17 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Wed Jul 12 20:27:17 2000)
X-From_: sentto-279987-451-963433957-fc=all.net@returns.onelist.com  Wed Jul 12 15:26:40 2000
Received: from c3.egroups.com (c3.egroups.com [207.138.41.143]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id PAA25463 for ; Wed, 12 Jul 2000 15:26:40 -0500
X-eGroups-Return: sentto-279987-451-963433957-fc=all.net@returns.onelist.com
Received: from [10.1.10.35] by c3.egroups.com with NNFMP; 12 Jul 2000 20:32:37 -0000
Received: (qmail 17213 invoked from network); 12 Jul 2000 20:32:36 -0000
Received: from unknown (10.1.10.142) by m1.onelist.org with QMQP; 12 Jul 2000 20:32:36 -0000
Received: from unknown (HELO poptop.llnl.gov) (128.115.41.70) by mta1 with SMTP; 12 Jul 2000 20:32:35 -0000
Received: from catalyst (catalyst.llnl.gov [128.115.222.68]) by poptop.llnl.gov (8.8.8/LLNL-3.0.2/pop.llnl.gov-5.1) with ESMTP id NAA24922 for ; Wed, 12 Jul 2000 13:32:34 -0700 (PDT)
Message-Id: <4.2.2.20000712132438.00acc5c0@poptop.llnl.gov>
X-Sender: e048786@poptop.llnl.gov
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 
To: iwar@egroups.com
In-Reply-To: <8525691A.00676C63.00@d54mta01.raleigh.ibm.com>
From: Tony Bartoletti 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Wed, 12 Jul 2000 13:39:52 -0700
Reply-To: iwar@egroups.com
Subject: Re: [iwar] first-timer
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Welcome drellis

 > As for my definition on information warfare: 1) an attack on facilities
 > managing information that make the information no longer usable or useful,
 > or 2) an attack on the information that devalues it in such a way that it
 > is no longer usable or useful.

I don't know that I've ever formulated a definition...

But shouldn't IW also include both (1) manipulation of information to
effect damage through secondary effects (causing an air-traffic disaster,
rerouting critical supplies) and (2) theft of critical information?

I suppose the "theft" aspect might be covered in part by your "devalues"
clause (steal my idea, I don't get to profit) but such theft, and in
particular manipulation, can render information far worse than simply
"no longer usable or useful."  It can render the use of that information
very dangerous.

If someone were to delete the entry in my medical records that warns
the doctor I am deathly allergic to common medication X, the terms
"usable and useful" seem to understate the potential for damage.

Just a thought...

___tony___





Tony Bartoletti 925-422-3881 
Information Operations, Warfare and Assurance Center
Lawrence Livermore National Laboratory
Livermore, CA 94551-9900


------------------------------------------------------------------------
Need technology solutions for your business?
Respond.com will Help!
http://click.egroups.com/1/6829/14/_/595019/_/963433957/
------------------------------------------------------------------------

------------------
http://all.net/