RE: [iwar] A question...

From: St. Clair, James (jstclair@vredenburg.com)
Date: 2001-04-10 03:58:32


Return-Path: <sentto-279987-1121-986900322-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 10 Apr 2001 03:59:08 -0700 (PDT)
Received: (qmail 8565 invoked by uid 510); 10 Apr 2001 09:59:45 -0000
Received: from hl.egroups.com (208.50.99.197) by 204.181.12.215 with SMTP; 10 Apr 2001 09:59:45 -0000
X-eGroups-Return: sentto-279987-1121-986900322-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by hl.egroups.com with NNFMP; 10 Apr 2001 10:58:42 -0000
X-Sender: JStClair@vredenburg.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_1_1); 10 Apr 2001 10:58:42 -0000
Received: (qmail 72343 invoked from network); 10 Apr 2001 10:58:41 -0000
Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 10 Apr 2001 10:58:41 -0000
Received: from unknown (HELO vre?sd?nt.vredenburg.com) (208.221.135.20) by mta1 with SMTP; 10 Apr 2001 10:58:41 -0000
Received: by vre-sd-nt.vredenburg.com with Internet Mail Service (5.5.2650.21) id <2N98H9CK>; Tue, 10 Apr 2001 03:55:26 -0700
Message-ID: <B30A25E2D1D2D1118021006097C3AC63C97EE4@ccopo.vredenburg.com>
To: "'iwar@yahoogroups.com'" <iwar@yahoogroups.com>
X-Mailer: Internet Mail Service (5.5.2650.21)
From: "St. Clair, James" <jstclair@vredenburg.com>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 10 Apr 2001 03:58:32 -0700
Reply-To: iwar@yahoogroups.com
Subject: RE: [iwar] A question...
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

No.

There is nothing covert about a 500 lb bomb. Physical destruction is as much
a part of "IW" as perception management.

Let me mix things further: Are we discussing IW or IO (Information
Operations)? IW could arguably considered a subset of IO, where IO
encompasses the whole conflict spectrum (peace, crisis, war, de-escalation,
peace, ad infinitium). 

Jim 

-----Original Message-----
From: Riccardo Sibilia [mailto:sibilia@ims.ee.ethz.ch]
Sent: Tuesday, April 10, 2001 5:34 AM
To: iwar@yahoogroups.com
Subject: Re: [iwar] A question...


Tony, I do agree with you 100%

I came up recently with the following definition of IW (I know, we do not
want 
to start it all over again with definitions and so on, but we NEED to get
away 
from the actual technocratic view and say what IW is done for... one can say
he 
goes in hollyday to find some rest or to fly 800 miles, land at a sunny
place, 
travel by bus some more an lay on the beach. Both are true, but only one 
expresses the real reason he is doing that to himself ;-) )


... so my proposal (that actually put some more light on IW operations
proposed 
yesterday):

Information Warfare is a *strategy*, that consist in coverly influencing the

opponent's decicion cycles the way that favourizes our own goals and in 
designing our own cycles so, that they are protected from such an influence.

From this definition (please excuse me if my english is not so perfect here,

I've translated it from german... corrections are very much welcome!) one
sees 
where the focus of the yesterday's operations is. It is true, that the limit

from one operation type to the next is very thin.

Rick

>
>
>>
>> > public information management (works with true information that is used

>> at the
>> > right time, place, quality and quantity) or
>>
>>Is this "selective" information?  If so, it is a form of deception, isn't
it?
>>
>> > disruption (where one tryies to reduce the opponents or public 
>> attention to a
>> > certain subject by "noise").
>>
>>Isn't disruption in this case a form of deception?
>
>Well, of course it is.  And deception is generally intended to cause 
>disruption ...
>
>I both love, and hate, to quibble over the meaning of words, but it is a 
>necessary component of any real discussion.
>
>Murder could be described as the "permanent disruption of someone's 
>functioning."
>
>I like the 5 operations described by Sibilia:
>
>> > disruption;
>> > deception;
>> > destruction;
>> > public information management and
>> > operational security measures.
>
>But the categories are not a nicely bounded as the terms might imply.  If 
>you "disrupt" an adversary's ability to control a critical process, and as 
>an "indirect" consequence, something degenerates into collapse, did you 
>engage in "disruption" or "destruction".
>
>Would it be true to say that "all conflict seeks to end conflict"?
>
>Confusion among terms often occurs when some assign meaning to words based 
>upon a supposed "intent" behind the action, others to the "immediate form" 
>of the action, and yet others based upon the extended consequences of the 
>action.  If we could be clear in which of these senses a word is defined or

>intended, confusion would be reduced.
>
>___tony___
>

--
Riccardo Sibilia                              sibilia@ims.ee.ethz.ch
Inst. fuer militaerische Sicherheitstechnik   http://www.ims.ee.ethz.ch/
Auf der Mauer 2                               Tel. +41 1 252 6260
8001 Zurich / Switzerland                     Fax. +41 1 252 1667



------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 


------------------------ Yahoo! Groups Sponsor ---------------------~-~>
Secure your servers with 128-bit SSL encryption!
Grab your copy of VeriSign's FREE Guide,
"Securing Your Web site for Business." Get it now!
http://us.click.yahoo.com/4cW4jC/e.WCAA/bT0EAA/kzAVlB/TM
---------------------------------------------------------------------_->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:07 PDT