Re: [iwar] How would you do it


From: Michael Wilson
From: partners@7pillars.com
To: iwar@egroups.com

Tue, 17 Oct 2000 10:22:31 -0700 (PDT)


fc  Tue Oct 17 10:24:13 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Tue, 17 Oct 2000 10:24:13 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Tue Oct 17 17:24:07 2000)
X-From_: sentto-279987-541-971803373-fc=all.net@returns.onelist.com  Tue Oct 17 12:23:09 2000
Received: from mq.egroups.com (mq.egroups.com [208.50.144.79]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id MAA12722 for ; Tue, 17 Oct 2000 12:23:09 -0500
X-eGroups-Return: sentto-279987-541-971803373-fc=all.net@returns.onelist.com
Received: from [10.1.10.38] by mq.egroups.com with NNFMP; 17 Oct 2000 17:23:11 -0000
X-Sender: partners@7pillars.com
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_1_0); 17 Oct 2000 17:22:50 -0000
Received: (qmail 21173 invoked from network); 17 Oct 2000 17:22:49 -0000
Received: from unknown (10.1.10.26) by m4.onelist.org with QMQP; 17 Oct 2000 17:22:49 -0000
Received: from unknown (HELO sirius.infonex.com) (216.34.245.2) by mta1 with SMTP; 17 Oct 2000 17:22:34 -0000
Received: from localhost (partners@localhost) by sirius.infonex.com (8.8.8/8.8.8) with SMTP id KAA19988 for ; Tue, 17 Oct 2000 10:22:31 -0700 (PDT)
X-Authentication-Warning: sirius.infonex.com: partners owned process doing -bs
X-Sender: partners@sirius.infonex.com
To: iwar@egroups.com
In-Reply-To: <8si15r+m5g6@eGroups.com>
Message-ID: 
From: Michael Wilson 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Tue, 17 Oct 2000 10:22:31 -0700 (PDT)
Reply-To: iwar@egroups.com
Subject: Re: [iwar] How would you do it
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

www.7pillars.com

I ran an 'iwar list' pre-Fred (look in the NOSI list for the IWAR
archive).  It ran into the same problem--I was carrying it, and didn't have the
time anymore.

Michael Wilson
7Pillars Partners
A Professional Military & Intelligence Advisory Firm

On Tue, 17 Oct 2000 ellisd@cs.ucsb.edu wrote:

> 	I, too, grew accustomed to this being a passive list and enjoyed just
> listening to what others were talking about.  Fred, I really think
> that you did a great job.  Don't think that because nobody was
> contributing much, or because there was a little debate on what was
> pertinent distract you.  Most people that I know of are so new to IW
> that they prefer just listening, learning, and observing until they
> feel they have something meaningful to say.  I, for one, have just
> started tackling Vernon Stagg's biblio (a significant challenge), and
> don't have much news/personal experience/expertise to share.  Aside
> from my Ph.D. work in computer security under Dick Kemmerer and UCSB,
> I don't have a significant amount of time to dedicate to this.  It is
> more of a hobby.
> 	So, that being said, and seeing as many others, like me are
> transitioning from a passive list to an active list, lets get some
> action.  Here is a topic that I propose.
> 	Lets say you are one angry person.  You are not a citizen of the US
> (you don't even live in the US--anywhere else will do), yet you
> perceive the US as the cause (directly or indirectly) of all of your
> problems (having lived 2 years in Russia, I know that this happens). 
> You have a brain and a lot of will power.  You want to *really* hurt
> the US, but you lack: resources (manpower and money).  However, you
> have a lot of time.  You have access to literature (assume any
> literature that has been produced on- or off-line).  And you have
> access to the Internet via some home computer (maybe even a
> workstation).  How would you try to inflict as much damage as you
> could?
> 	The question as basic "how to" elements, but that is not the focus of
> my question.  Rather, how would *you* do it?  What do you perceive as
> the best way to hurt the US?  And how would you go about exploiting
> that vulnerability?
> 	Further, since not everybody who listens to this list will contribute
> (we know you NSA guys love these lists), and since those who know the
> most say the least, feel free to contribute as much as you can.  If
> anybody cares to participate and clarify their background, impetus for
> getting involved in IW (or Information Operations), and their current
> relationship to it, please do so.
> 
> 
> -------------------
> Dan Ellis
> Ph.D. Student, UCSB
> Computer Security
> H: (805) 971-6183
> W: (805) 893-4394
> 
> 
> 
> 
> ------------------
> http://all.net/
> 


-------------------------- eGroups Sponsor -------------------------~-~>
Restaurants, Movies, Weather, Traffic & More!
Access Tellme from any phone.  For more info visit:
http://click.egroups.com/1/9534/14/_/595019/_/971803373/
---------------------------------------------------------------------_->

------------------
http://all.net/