[iwar] News from www.strategypage.com

From: ozair_rasheed@geocities.com
Date: 2001-05-15 20:33:24

Return-Path: <sentto-279987-1239-989984055-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 15 May 2001 20:35:27 -0700 (PDT)
Received: (qmail 31592 invoked by uid 510); 16 May 2001 02:36:01 -0000
Received: from n4.groups.yahoo.com (HELO hk.egroups.com) ( by with SMTP; 16 May 2001 02:36:01 -0000
X-eGroups-Return: sentto-279987-1239-989984055-fc=all.net@returns.onelist.com
Received: from [] by hk.egroups.com with NNFMP; 16 May 2001 03:34:15 -0000
X-Sender: ozair_rasheed@geocities.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_1_3); 16 May 2001 03:34:14 -0000
Received: (qmail 2104 invoked from network); 16 May 2001 03:33:26 -0000
Received: from unknown ( by l7.egroups.com with QMQP; 16 May 2001 03:33:26 -0000
Received: from unknown (HELO swprod.strategyworld.com) ( by mta2 with SMTP; 16 May 2001 03:33:26 -0000
Received: from mail pickup service by swprod.strategyworld.com with Microsoft SMTPSVC; Tue, 15 May 2001 21:33:24 -0600
To: <iwar@yahoogroups.com>
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Message-ID: <SWPRODNfLjH5ML8JLLg00000095@swprod.strategyworld.com>
X-OriginalArrivalTime: 16 May 2001 03:33:24.0609 (UTC) FILETIME=[F6864710:01C0DDB8]
From: <ozair_rasheed@geocities.com>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 15 May 2001 21:33:24 -0600
Reply-To: iwar@yahoogroups.com
Subject: [iwar] News from www.strategypage.com
Content-Type: text/plain
Content-Transfer-Encoding: 8bit

Sent to you by Ozair from www.strategypage.com.
Direct from the site.
<p><b>INFORMATION WARFARE: Marketing Mode</b></p>
<p>April 10, 2001; The U.S. armed forces are into marketing mode. Noting
that the MYV generation is not much impressed by stories of past military
glory, the brass are meeting the kids on familiar ground. A new TV show
called "Wargames," complete with a music video class soundtrack has just
appeared. A new reality TV show, "Boot Camp", uses active duty Marine
Corps drill instructors to add the right edge of authenticity. New
recruiting commercials come on like music videos. Action and excitement is
stressed. In the long history of military recruiting, stressing the fun
(there's always some) and neglecting the tedium, terror and boredom has
always worked better than being up front about what military life is
really all about.  Stressing service, accomplishment and pride in one's
work has always been a hard sell. But the current campaign is actually not
so much about recruiting as it is about just keeping people aware that the
armed forces exist. Recruiters tend to be more forthcoming about what
military life is really all about. The recruiters know that word-of –mouth
from young people in the service, or who have been, is used by potential
recruits to provide more realistic information on what it's like "inside."
But many potential recruits are only dimly aware that the military exists.
Thus the current flood of flashy military programming.<br>
March 24, 2001; The U.S. Army is sending 7,500 troops from the 4th
Infantry Division to the National Training Center to test new
digitalization technologies. These techniques depend on digital
communications gear to instantly pass video, voice and data between
armored vehicles, artillery, aircraft, infantry and headquarters. The
result is a combat force that can react more rapidly. But bringing
firepower on targets more quickly, the enemy is put at an enormous
disadvantage. For as long as soldiers have been fighting, getting
information about the enemy to your commander has always been a problem.
The digitalized force solves that. The commander always knows where his
own troops are and obtains better information about the enemy faster.  The
impact will be similar to what happened when police cars got radios some
fifty years ago. All of a sudden, crimes like bank robbery got a whole lot
more dangerous. Once the word got out, the police could rapidly use radio
to reply their people, and rapidly receive information from witnesses or,
say, police on foot who saw the robbers speed by. Radio alone did not
revolutionize warfare as much because battles are a much more complex and
chaotic process. Digitialization and the use of computers, plus soldiers
who have years of internet experience, will make a big difference. But
another reason the army is eager to test digitalized units under combat
conditions is to discover those things they haven't through of yet. New
forms of warfare tend create opportunities, and pitfalls, no one foresaw.
Just as many armies stumbled into "blitzkrieg" warfare in the late 1930s
and early 1940s, the same is expected to happen again.<br>
March 23, 2001; Armies of the Byte; All the talk about Cyberwarfare
(attacking computers over the internet) has not produced much actual
cyberaction in the military. On the civilian side, costs of dealing with
cyberattacks on commercial systems exceed $30 billion a year. Cyberwar for
the troops is still largely getting ready and talking about all the
horrible things that might happen when the cyber warriors actually use
their weapons. But in East Asia, cyberwar is becoming far more real than
anywhere else. China and Taiwan have already been skirmishing, and more
serious attacks have been attempted, although both sides deny this. Some
serious hacking of US military sites has been traced back to Chinese cyber
warfare organizations.&nbsp;<br>
Besides China and Taiwan, the two Koreas, Japan and Singapore have also
established cybewarfare units. South Korea has done it to protect South
Korea's extensive electronic infrastructure from attacks by North Korea.
For decades, North Korea has used terrorism, threats, espionage and
anything the poverty stricken, but belligerent, northerners could think of
to torment the south. The North Korean leader is known to be an avid
personal computer user, so one can imagine that there is enthusiasm for
cyberwarfare at the very top. South Korea has a very computer literate
population, and discovered that they had far more cyberwarfare talent than
they first thought. Once the southerners investigated what cybermischief
the northerners could get into, they realized that this cyberwar stuff had
potential. Unfortunately, the north has very little electronic
infrastructure to attack. But there's always China, Japan and Russia.
However, these are nations South Korea wants to do business with. Yes,
South Korea now realizes they have a formidable weapon. More so than any
of their neighbors, with the possible exception of Japan, South Korea has
more local talent who can carry out cyberwar attacks and, more
importantly, defend the nation from such assaults.<br>
Japan set up cyberwar units because it realized that it had the largest
electronic exposure in their part of the world. Indeed, next to North
America, there's probably no juicier cyber target than Japan. The Japanese
have concentrated on defense. They have a lot to protect, and for cultural
reasons (they are very polite) and some lingering anxiety about their
aggressive role in World War II, they have not done much to develop
offensive methods.&nbsp;<br>
Not so the Chinese, where a combination of growing local internet
presence, rapidly expanding technology industries and a strong sense of
nationalism have created a major cyber power. The Chinese are also unique
in that the government has tried, and succeeded to a large extent, in
controlling the internet within China. Of course, no nation can completely
control the internet. But the Chinese government has gone father than any
one else. This effort is aided by the many patriotic internet experts in
China who cooperate with the government in creating a powerful
cyberwarfare capability. What this means is that thousands of capable,
patriotic and internet savvy Chinese are eager to aid the government in
this effort. These Chinese outnumber those independent minded hackers who
scare governments and businesses in other nations.&nbsp;<br>
As good as the Chinese hackers are, they have not been able to cover their
tracks. Some of their efforts overseas have been traced back to China. We
know what the Chinese are up to, at least in general. And we know that
they are good. What we don't know is exactly how good and exactly what
cyberweapons they would unleash in a wartime, or a near wartime,
situation. This is the most frightening aspect of cyberwar. The best
weapons are those that are kept secret until used. The victim hit by a new
type of cyberattack has to first figure out what's going on before
defenses  can be devised and damage repaired. The larger and more capable
a nations cyberforce is, the more new attacks and tools they can
Examples of Chinese Cyberwar prowess have been seen in internet battles
between Chinese and Taiwanese hackers over the last few years. The dispute
between China and Taiwan over Taiwan's independence has been fought most
viciously on the internet. The action has largely been minor stuff,
trashing each others web sites and the like. But there have been
indications of more potent stuff. The most damaging internet attacks
require a lot of preparation and this usually involves quietly sneaking
into the computers of potential victims to scout out defenses and
sometimes leave programs for later use. There are a lot of Chinese
cyberwarriors sneaking around the internet these days.<br>
<p>Most cyberweapons also have a short shelf life, as they depend on
software flaws that are constantly being discovered and fixed. But this is
where China has an edge, for as the number of skilled Chinese software
engineers and hackers increases, so does the ability of China to discover,
and exploit, internet flaws more rapidly than anyone else.&nbsp;<br>

------------------------ Yahoo! Groups Sponsor ---------------------~-~>
SearchSecurity.com is your free resource that
aggregates the best security news and resources from
around the Internet daily. So you have a partner that
does all of the research that you don't have time to
do - from the most comprehensive daily news, to the
largest collection of security links and interactive
community features anywhere.


Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 

This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:13 PDT