RE: [iwar] How do we know if a cyber-conflict or InfoWar reached to the end?


From: St. Clair, James
To: 'iwar@egroups.com'
From: jstclair@vredenburg.com
To: iwar@egroups.com

Thu, 21 Dec 2000 05:13:00 -0800


fc  Thu Dec 21 05:14:07 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 21 Dec 2000 05:14:07 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu Dec 21 13:09:50 2000)
X-From_: jstclair@vredenburg.com  Thu Dec 21 07:08:52 2000
Received: from ch.egroups.com (ch.egroups.com [208.50.99.226]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id HAA17260 for ; Thu, 21 Dec 2000 07:08:50 -0600
X-eGroups-Return: sentto-279987-837-977404384-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by ch.egroups.com with NNFMP; 21 Dec 2000 13:13:05 -0000
X-Sender: JStClair@vredenburg.com
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_3_1_3); 21 Dec 2000 13:13:03 -0000
Received: (qmail 84882 invoked from network); 21 Dec 2000 13:13:03 -0000
Received: from unknown (10.1.10.27) by l7.egroups.com with QMQP; 21 Dec 2000 13:13:03 -0000
Received: from unknown (HELO vre?sd?nt.vredenburg.com) (208.221.135.20) by mta2 with SMTP; 21 Dec 2000 13:13:03 -0000
Received: by vre-sd-nt.vredenburg.com with Internet Mail Service (5.5.2650.21) id ; Thu, 21 Dec 2000 05:12:55 -0800
Message-ID: 
To: "'iwar@egroups.com'" 
X-Mailer: Internet Mail Service (5.5.2650.21)
From: "St. Clair, James" 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 21 Dec 2000 05:13:00 -0800
Reply-To: iwar@egroups.com
Subject: RE: [iwar] How do we know if a cyber-conflict or InfoWar reached  to the end?
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

There is no such thing as an ending. IW follows the conflict cycle which
adjusts from "normal" peacetime through the peak of all-out conflict,
de-escalating to crisis cessation and returning to "normal". There is always
some level of "background noise" in cyberattacks and physical destruction,
and non-stop psyops and perception management. 

In an asymmetric environment, start and end is even more difficult, given
that asymmetric attacks SHOULD support a larger strategy not easily
perceived by the pattern or escalation of attacks.

James St. Clair 



-------------------------- eGroups Sponsor -------------------------~-~>
Download Net2Phone's free software to make FREE calls anywhere within
the US from your PC now! Get great low rates on international calls!
http://click.egroups.com/1/10923/1/_/595019/_/977404384/
---------------------------------------------------------------------_->

------------------
http://all.net/