[iwar] Info warfare ...


From:
To: iwar@egroups.com
From: DrewSchaefer@ftnetwork.com
To: iwar@egroups.com

Mon, 16 Oct 2000 06:53:04 -0700


fc  Mon Oct 16 07:01:14 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Mon, 16 Oct 2000 07:01:14 -0700 (PDT)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Mon Oct 16 14:01:15 2000)
X-From_: sentto-279987-537-971704808-fc=all.net@returns.onelist.com  Mon Oct 16 09:00:03 2000
Received: from c9.egroups.com (c9.egroups.com [208.50.99.230]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id JAA13416 for ; Mon, 16 Oct 2000 09:00:03 -0500
X-eGroups-Return: sentto-279987-537-971704808-fc=all.net@returns.onelist.com
Received: from [10.1.10.36] by c9.egroups.com with NNFMP; 16 Oct 2000 14:00:08 -0000
X-Sender: drewschaefer@ftnetwork.com
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_1_0); 16 Oct 2000 14:00:05 -0000
Received: (qmail 1143 invoked from network); 16 Oct 2000 14:00:05 -0000
Received: from unknown (10.1.10.142) by m2.onelist.org with QMQP; 16 Oct 2000 14:00:05 -0000
Received: from unknown (HELO email002) (216.35.122.207) by mta3 with SMTP; 16 Oct 2000 14:00:05 -0000
Received: from AspEmail - 216.35.122.211 by email002  with Microsoft SMTPSVC(5.5.1774.114.11); Mon, 16 Oct 2000 07:15:03 -0700
To: "iwar@egroups.com" 
Message-ID: <0a1be03151410a0EMAIL002@email002>
From: 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Mon, 16 Oct 2000 06:53:04 -0700
Reply-To: iwar@egroups.com
Subject: [iwar] Info warfare ...
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hello all,

To hopefully liven up this list, I would like to pass on that I am starting the research for a book chapter, on the "Rules of War" aspects of I-warfare.

Having studied the conventional Rules in a course at Cambridge, I have grown an interest in the aspects that lead us, seemingly, from the confined, strict historic system of defined combatants and non-combatants, to an ever-wider growth towards a blurring of the lines between civilians and military.

We've heard of B2B and B2C, but I am curious if anyone has studied, read, or has information on i2G, G2i, or G2G (where   i   = individual) activities *OUTSIDE* of normal hacking events.  This could include disinformation, EMP bombing, and the many permutations that could be initiated.  

As today's digest shows the coming Taiwan/China interaction, I am interested in following a line that may show how the Rules of Warfare need to update the side-effects of military interventions.

I had appreciated a listmember's link to the "I-war bibliography," which, sadly, was not a survivor of my neighbor's failed attempt to use my laptop, costing her and I a new C-drive. If the originator of that bibliography would pass that list again, I would appreciate and acknowledge its aid in my development of my research.

All for now,

Drew Schaefer, JD

slim


___________________________________________________________________________________________________
Get your free e-mail account with *unlimited* storage at  http://www.ftnetwork.com

Visit the web site of the Financial Times at  http://www.ft.com


-------------------------- eGroups Sponsor -------------------------~-~>
Last minute trips at  
first-rate discounts 
from Hotwire.
http://click.egroups.com/1/9748/14/_/595019/_/971704808/
---------------------------------------------------------------------_->

------------------
http://all.net/