Re: [iwar] A question...

From: Riccardo Sibilia (
Date: 2001-04-10 02:34:04

Return-Path: <>
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 10 Apr 2001 02:38:07 -0700 (PDT)
Received: (qmail 2104 invoked by uid 510); 10 Apr 2001 08:38:11 -0000
Received: from ( by with SMTP; 10 Apr 2001 08:38:11 -0000
Received: from [] by with NNFMP; 10 Apr 2001 09:37:09 -0000
Received: (EGP: mail-7_1_1); 10 Apr 2001 09:37:08 -0000
Received: (qmail 55340 invoked from network); 10 Apr 2001 09:37:07 -0000
Received: from unknown ( by with QMQP; 10 Apr 2001 09:37:07 -0000
Received: from unknown (HELO ( by mta1 with SMTP; 10 Apr 2001 09:37:07 -0000
Received: (qmail 14372 invoked from network); 10 Apr 2001 09:37:03 -0000
Received: from (HELO lacrosse) ( by with SMTP; 10 Apr 2001 09:37:03 -0000
Content-MD5: c3pxIVl/lJk+85GxJKqgtw==
X-Mailer: dtmail 1.3.0 @(#)CDE Version 1.4 SunOS 5.8 sun4u sparc 
From: Riccardo Sibilia <>
Mailing-List: list; contact
Delivered-To: mailing list
Precedence: bulk
List-Unsubscribe: <>
Date: Tue, 10 Apr 2001 11:34:04 +0200 (MEST)
Subject: Re: [iwar] A question...
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Tony, I do agree with you 100%

I came up recently with the following definition of IW (I know, we do not want 
to start it all over again with definitions and so on, but we NEED to get away 
from the actual technocratic view and say what IW is done for... one can say he 
goes in hollyday to find some rest or to fly 800 miles, land at a sunny place, 
travel by bus some more an lay on the beach. Both are true, but only one 
expresses the real reason he is doing that to himself ;-) )

... so my proposal (that actually put some more light on IW operations proposed 

Information Warfare is a *strategy*, that consist in coverly influencing the 
opponent's decicion cycles the way that favourizes our own goals and in 
designing our own cycles so, that they are protected from such an influence.

From this definition (please excuse me if my english is not so perfect here, 
I've translated it from german... corrections are very much welcome!) one sees 
where the focus of the yesterday's operations is. It is true, that the limit 
from one operation type to the next is very thin.


>> > public information management (works with true information that is used 
>> at the
>> > right time, place, quality and quantity) or
>>Is this "selective" information?  If so, it is a form of deception, isn't it?
>> > disruption (where one tryies to reduce the opponents or public 
>> attention to a
>> > certain subject by "noise").
>>Isn't disruption in this case a form of deception?
>Well, of course it is.  And deception is generally intended to cause 
>disruption ...
>I both love, and hate, to quibble over the meaning of words, but it is a 
>necessary component of any real discussion.
>Murder could be described as the "permanent disruption of someone's 
>I like the 5 operations described by Sibilia:
>> > disruption;
>> > deception;
>> > destruction;
>> > public information management and
>> > operational security measures.
>But the categories are not a nicely bounded as the terms might imply.  If 
>you "disrupt" an adversary's ability to control a critical process, and as 
>an "indirect" consequence, something degenerates into collapse, did you 
>engage in "disruption" or "destruction".
>Would it be true to say that "all conflict seeks to end conflict"?
>Confusion among terms often occurs when some assign meaning to words based 
>upon a supposed "intent" behind the action, others to the "immediate form" 
>of the action, and yet others based upon the extended consequences of the 
>action.  If we could be clear in which of these senses a word is defined or 
>intended, confusion would be reduced.

Riccardo Sibilia                    
Inst. fuer militaerische Sicherheitstechnik
Auf der Mauer 2                               Tel. +41 1 252 6260
8001 Zurich / Switzerland                     Fax. +41 1 252 1667

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Do you have 128-bit SSL encryption server security?
Get VeriSign's FREE Guide, "Securing Your
Web Site for Business." Get it now!


Your use of Yahoo! Groups is subject to 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:07 PDT