Return-Path: <sentto-279987-3476-1004118532-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 26 Oct 2001 10:50:07 -0700 (PDT) Received: (qmail 4977 invoked by uid 510); 26 Oct 2001 17:48:19 -0000 Received: from n2.groups.yahoo.com (216.115.96.52) by 204.181.12.215 with SMTP; 26 Oct 2001 17:48:19 -0000 X-eGroups-Return: sentto-279987-3476-1004118532-fc=all.net@returns.onelist.com Received: from [10.1.1.224] by n2.groups.yahoo.com with NNFMP; 26 Oct 2001 17:48:52 -0000 X-Sender: cpreston@gci.net X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-8_0_0_1); 26 Oct 2001 17:48:51 -0000 Received: (qmail 59815 invoked from network); 26 Oct 2001 17:48:50 -0000 Received: from unknown (10.1.10.142) by 10.1.1.224 with QMQP; 26 Oct 2001 17:48:50 -0000 Received: from unknown (HELO mta-1.gci.net) (208.138.130.82) by mta3 with SMTP; 26 Oct 2001 17:48:45 -0000 Received: from mmp-2.gci.net ([208.138.130.81]) by mta-1.gci.net (Netscape Messaging Server 4.15) with ESMTP id GLTQTA01.FJA for <iwar@yahoogroups.com>; Fri, 26 Oct 2001 09:48:46 -0800 Received: from graywolf49 ([24.237.1.40]) by mmp-2.gci.net (Netscape Messaging Server 4.15) with SMTP id GLTQTB00.421 for <iwar@yahoogroups.com>; Fri, 26 Oct 2001 09:48:47 -0800 To: <iwar@yahoogroups.com> Message-ID: <OCEDLLJFJEMAFJGHDCLNOEMOCMAA.cpreston@gci.net> X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Importance: Normal X-eGroups-From: "Charles Preston" <cpreston@gci.net> From: "Charles Preston" <cpreston@sinbad.net> X-Yahoo-Profile: cpreston_2000 Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 26 Oct 2001 09:48:41 -0800 Reply-To: iwar@yahoogroups.com Subject: [iwar] Is there a hidden strategic goal in current attacks? Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit I wonder if someone's strategic thinking could be along these lines of deception? Two incidents don't make a clear pattern, but... Target : U.S. Conventional total military defeat: High risk and low probability of success Destruction by biological weapons: No current way to blanket the U.S. and still limit spread Economic destruction by loss of confidence and efficiency from attacks on physical targets and systems (transportation and mail): Damage is assured but short-term destruction not likely Plan: Encourage a shift from transportation and physical communication to electronic. Transportation system attacks promote video conferencing, instant messaging, and email. Biological attacks discourage physical exchange of messages and promote the same electronic means of communication. Infectious biological attacks will discourage face-to-face contact, again encouraging electronic communication. The increased threats of biological and chemical attacks also greatly increase costs for everyday items including food and water, and for all shipped goods, impacting productivity. Increase dependence on communication and computing for bill-paying (cash flow from individuals) company-company payments, ordering of goods, and dissemination of news. After the current trend of increasing dependence on communications and computing has been accelerated, and the cost of interruption is higher, use currently known methods to attack this infrastructure, causing enough economic disruption for long enough to make collapse likely. If normal lack of attention to secure design and coding isn't good enough, at the current rate of replacement for routers, computers and operating systems, a couple hundred people placed strategically in the right major companies and subcontractors could provide a substantial boost in covert weak points within 2 years. According to remarks by one software industry spokesperson, a technical team leader for even one small subset of an operating system, such as encryption, cannot inspect and know the function of each line of code. A major advantage of this approach is that most previous and current attention to software/hardware sabotage in the U.S. has probably been directed toward weapons and military systems. cmp ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST