Return-Path: <sentto-279987-3515-1004159437-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 26 Oct 2001 22:13:07 -0700 (PDT) Received: (qmail 32654 invoked by uid 510); 27 Oct 2001 05:10:00 -0000 Received: from n2.groups.yahoo.com (216.115.96.52) by 204.181.12.215 with SMTP; 27 Oct 2001 05:10:00 -0000 X-eGroups-Return: sentto-279987-3515-1004159437-fc=all.net@returns.onelist.com Received: from [10.1.1.224] by n2.groups.yahoo.com with NNFMP; 27 Oct 2001 05:10:37 -0000 X-Sender: fastflyer28@yahoo.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-8_0_0_1); 27 Oct 2001 05:10:35 -0000 Received: (qmail 82119 invoked from network); 27 Oct 2001 05:10:35 -0000 Received: from unknown (10.1.10.26) by 10.1.1.224 with QMQP; 27 Oct 2001 05:10:35 -0000 Received: from unknown (HELO web14509.mail.yahoo.com) (216.136.224.168) by mta1 with SMTP; 27 Oct 2001 05:10:35 -0000 Message-ID: <20011027051035.32856.qmail@web14509.mail.yahoo.com> Received: from [63.21.88.110] by web14509.mail.yahoo.com via HTTP; Fri, 26 Oct 2001 22:10:35 PDT To: iwar@yahoogroups.com In-Reply-To: <OCEDLLJFJEMAFJGHDCLNOEMOCMAA.cpreston@gci.net> From: "e.r." <fastflyer28@yahoo.com> X-Yahoo-Profile: fastflyer28 Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Fri, 26 Oct 2001 22:10:35 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: Re: [iwar] Is there a hidden strategic goal in current attacks? Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit You have the percentages on terrorism down as well as the Joint Chiefs-low probability of success, but if you get through, high probability of damage on a horrific scale.--- Charles Preston <cpreston@sinbad.net> wrote: > I wonder if someone's strategic thinking could be along these lines > of > deception? > Two incidents don't make a clear pattern, but... > > Target : U.S. > > Conventional total military defeat: High risk and low probability of > success > > Destruction by biological weapons: No current way to blanket the U.S. > and > still limit spread > > Economic destruction by loss of confidence and efficiency from > attacks on > physical targets and systems (transportation and mail): Damage is > assured > but short-term destruction not likely > > Plan: > Encourage a shift from transportation and physical communication to > electronic. Transportation system attacks promote video > conferencing, > instant messaging, and email. Biological attacks discourage physical > exchange of messages and promote the same electronic means of > communication. > Infectious biological attacks will discourage face-to-face contact, > again > encouraging electronic communication. The increased threats of > biological > and chemical attacks also greatly increase costs for everyday items > including food and water, and for all shipped goods, impacting > productivity. > > Increase dependence on communication and computing for bill-paying > (cash > flow from individuals) company-company payments, ordering of goods, > and > dissemination of news. > > After the current trend of increasing dependence on communications > and > computing has been accelerated, and the cost of interruption is > higher, use > currently known methods to attack this infrastructure, causing enough > economic disruption for long enough to make collapse likely. > > If normal lack of attention to secure design and coding isn't good > enough, > at the current rate of replacement for routers, computers and > operating > systems, a couple hundred people placed strategically in the right > major > companies and subcontractors could provide a substantial boost in > covert > weak points within 2 years. According to remarks by one software > industry > spokesperson, a technical team leader for even one small subset of an > operating system, such as encryption, cannot inspect and know the > function > of each line of code. A major advantage of this approach is that > most > previous and current attention to software/hardware sabotage in the > U.S. has > probably been directed toward weapons and military systems. > > cmp > > > > __________________________________________________ Do You Yahoo!? Make a great connection at Yahoo! Personals. http://personals.yahoo.com ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/UnN2wB/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST