Return-Path: <sentto-279987-5369-1038526550-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 28 Nov 2002 15:38:24 -0800 (PST) Received: (qmail 1850 invoked by uid 511); 28 Nov 2002 23:36:23 -0000 Received: from n14.grp.scd.yahoo.com (66.218.66.69) by all.net with SMTP; 28 Nov 2002 23:36:23 -0000 X-eGroups-Return: sentto-279987-5369-1038526550-fc=all.net@returns.groups.yahoo.com Received: from [66.218.66.98] by n14.grp.scd.yahoo.com with NNFMP; 28 Nov 2002 23:35:51 -0000 X-Sender: junkmail@barnowl.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-8_2_3_0); 28 Nov 2002 23:35:50 -0000 Received: (qmail 73253 invoked from network); 28 Nov 2002 23:35:50 -0000 Received: from unknown (66.218.66.218) by m15.grp.scd.yahoo.com with QMQP; 28 Nov 2002 23:35:50 -0000 Received: from unknown (HELO mail15.messagelabs.com) (63.210.62.243) by mta3.grp.scd.yahoo.com with SMTP; 28 Nov 2002 23:35:50 -0000 X-VirusChecked: Checked X-Env-Sender: junkmail@barnowl.com X-Msg-Ref: server-32.tower-15.messagelabs.com!1038526490!26524 Received: (qmail 22576 invoked from network); 28 Nov 2002 23:34:50 -0000 Received: from nospam.barnowl.com (HELO barnowl.com) (206.72.12.109) by server-32.tower-15.messagelabs.com with SMTP; 28 Nov 2002 23:34:50 -0000 Received: from mmedia01 (unknown [10.1.1.132]) by barnowl.com (Postfix) with SMTP id EA267EDA7 for <iwar@yahoogroups.com>; Thu, 28 Nov 2002 17:30:47 -0600 (CST) To: <iwar@yahoogroups.com> Message-ID: <DCEJIBODBPNAOCPAPLHGAEKGHCAA.junkmail@barnowl.com> X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4910.0300 Importance: Normal In-Reply-To: <20021128141618.70013.qmail@web20707.mail.yahoo.com> From: "Rob Rosenberger" <junkmail@barnowl.com> X-Yahoo-Profile: barnowlcom Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 28 Nov 2002 17:35:09 -0600 Subject: RE: [iwar] Dr Raj Mehta - National Security in Network Era Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit He asked for constructive criticism. All right... First let's recognize the fact Mehta "editorialized" rather than "detailed" his concerns about information warfare. One would expect a Ph.D. to offer a hell of a lot more to an audience of constructive critics. For example, how can one accept on faith the author's "hypothetical scenarios that are technically quite feasible"? Mehta presents no real-world anecdotes in his editorial to support this alleged feasibility. At most he uses sweeping generalizations of crime (a problem we've dealt with since Eve plucked fruit from the forbidden tree). To put it succinctly: Mehta focuses on a single arbitrary "cause" (information warfare) and he ignores the amazing commonness of the "effects" it would produce. To put it in detail: Mehta asserts a criminal element could "quite feasibly" bring railways, telecom, airways, and power grids to a halt -- at which point "modern India will come to a stand-still, and law and order problems could result across the country." And yet modern India (like modern America) regularly suffers regional outages of these infrastructures. A large portion of the U.S. state of Tennessee recently lost its power grid for three days during a severe winter event, and yet the state maintained law & order without coming close to a declaration of martial law. The U.S. power industry actually conspired to deprive the state of California of electricity and they went so far as to cause rolling blackouts. Like Tennessee, California never considered the notion of martial law. Hurricanes destroy whole sections of he U.S. eastern seaboard nearly every year; they can easily contaminate 150,000 square kilometers of vital water supplies with dead carcasses and sewage overflows. And yet the eastern seaboard seldom declares martial law. Regional U.S. airways & railways routinely fall victim to severe weather; one would expect India's airways & railways to suffer the same earthly fate. And yet life goes on. Furthermore, India's airways & railways deal with regional paramilitary flareups (e.g. along the Pakistani border) not usually seen in the U.S. Should we infer Kashmir's unrest stems partly from the unreliability of its mass transportation? Mehta asserts the banking & financial industrial complex could "quite feasibly" suffer enormous losses if "unfriendly elements" cook the books without the industry's knowledge. So? We've seen fantastic examples of this all throughout the ages. Nations have long used counterfeiting as a way to destabilize their enemies and/or pay for covert operations. (Both sides counterfeited in the U.S. civil war, for example.) Florence, Italy nearly collapsed from financial ruin in the late 15th century after the death of its most prominent politician revealed he raped the city-state's coffers. In the late 20th century, the implosion of the "LTCM" hedge fund _literally_ set the entire global financial world on the brink of collapse due to the nitroglycerine power & instability of the Black-Scholes model. Again, Mehta focuses on a single arbitrary "cause" (database manipulation) and he ignores the amazing commonness of the "effects" it would produce. We can skip a critique of information warfare in revenue collection. I view it as merely a nation-state's role within the overall banking & financial industrial complex. Mehta asserts a band of terrorists could "quite feasibly" manipulate an immigration database to gain entry to India (or any other computer-dependent nation). "The terrorists would be allotted visas and would enter India without any agency being able to detect such an invasion. Can you imagine what havoc this could cause?" he asks rhetorically. And yet, once again, history revels with instances of sponsored actors who enter *and* exit an enemy's borders with impunity. CIA, KGB, Moussad, et al. create "confetti packs" (movie ticket stubs, bank transaction jackets, wallet photos with handwriting in a local dialect, etc.) so an agent will look like a typical citizen if the police empty his pockets. Terrorist groups -- or to use the old term: "agents provocateur" -- teach the very same "tradecraft" to their own "sleepers." It takes only motivation & resources to "quite feasibly" manipulate any given immigration system no matter how primitive or state-of-the-art it may be. ...I could go on, of course. Let me reiterate: Mehta focuses on a single arbitrary "cause" and he ignores the amazing commonness of the "effects" it would produce. No offense, but I rank his editorial at that of an undergraduate. I should note Cohen routinely offers enough details on information warfare to form his conclusions. Mehta should follow his lead. Rob the constructive critic ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get 128 Bit SSL Encryption! http://us.click.yahoo.com/CBxunD/vN2EAA/xGHJAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2002-12-31 12:01:55 PST