Return-Path: <sentto-279987-1121-986900322-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 10 Apr 2001 03:59:08 -0700 (PDT) Received: (qmail 8565 invoked by uid 510); 10 Apr 2001 09:59:45 -0000 Received: from hl.egroups.com (208.50.99.197) by 204.181.12.215 with SMTP; 10 Apr 2001 09:59:45 -0000 X-eGroups-Return: sentto-279987-1121-986900322-fc=all.net@returns.onelist.com Received: from [10.1.4.53] by hl.egroups.com with NNFMP; 10 Apr 2001 10:58:42 -0000 X-Sender: JStClair@vredenburg.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-7_1_1); 10 Apr 2001 10:58:42 -0000 Received: (qmail 72343 invoked from network); 10 Apr 2001 10:58:41 -0000 Received: from unknown (10.1.10.26) by l7.egroups.com with QMQP; 10 Apr 2001 10:58:41 -0000 Received: from unknown (HELO vre?sd?nt.vredenburg.com) (208.221.135.20) by mta1 with SMTP; 10 Apr 2001 10:58:41 -0000 Received: by vre-sd-nt.vredenburg.com with Internet Mail Service (5.5.2650.21) id <2N98H9CK>; Tue, 10 Apr 2001 03:55:26 -0700 Message-ID: <B30A25E2D1D2D1118021006097C3AC63C97EE4@ccopo.vredenburg.com> To: "'iwar@yahoogroups.com'" <iwar@yahoogroups.com> X-Mailer: Internet Mail Service (5.5.2650.21) From: "St. Clair, James" <jstclair@vredenburg.com> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 10 Apr 2001 03:58:32 -0700 Reply-To: iwar@yahoogroups.com Subject: RE: [iwar] A question... Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit No. There is nothing covert about a 500 lb bomb. Physical destruction is as much a part of "IW" as perception management. Let me mix things further: Are we discussing IW or IO (Information Operations)? IW could arguably considered a subset of IO, where IO encompasses the whole conflict spectrum (peace, crisis, war, de-escalation, peace, ad infinitium). Jim -----Original Message----- From: Riccardo Sibilia [mailto:sibilia@ims.ee.ethz.ch] Sent: Tuesday, April 10, 2001 5:34 AM To: iwar@yahoogroups.com Subject: Re: [iwar] A question... Tony, I do agree with you 100% I came up recently with the following definition of IW (I know, we do not want to start it all over again with definitions and so on, but we NEED to get away from the actual technocratic view and say what IW is done for... one can say he goes in hollyday to find some rest or to fly 800 miles, land at a sunny place, travel by bus some more an lay on the beach. Both are true, but only one expresses the real reason he is doing that to himself ;-) ) ... so my proposal (that actually put some more light on IW operations proposed yesterday): Information Warfare is a *strategy*, that consist in coverly influencing the opponent's decicion cycles the way that favourizes our own goals and in designing our own cycles so, that they are protected from such an influence. From this definition (please excuse me if my english is not so perfect here, I've translated it from german... corrections are very much welcome!) one sees where the focus of the yesterday's operations is. It is true, that the limit from one operation type to the next is very thin. Rick > > >> >> > public information management (works with true information that is used >> at the >> > right time, place, quality and quantity) or >> >>Is this "selective" information? If so, it is a form of deception, isn't it? >> >> > disruption (where one tryies to reduce the opponents or public >> attention to a >> > certain subject by "noise"). >> >>Isn't disruption in this case a form of deception? > >Well, of course it is. And deception is generally intended to cause >disruption ... > >I both love, and hate, to quibble over the meaning of words, but it is a >necessary component of any real discussion. > >Murder could be described as the "permanent disruption of someone's >functioning." > >I like the 5 operations described by Sibilia: > >> > disruption; >> > deception; >> > destruction; >> > public information management and >> > operational security measures. > >But the categories are not a nicely bounded as the terms might imply. If >you "disrupt" an adversary's ability to control a critical process, and as >an "indirect" consequence, something degenerates into collapse, did you >engage in "disruption" or "destruction". > >Would it be true to say that "all conflict seeks to end conflict"? > >Confusion among terms often occurs when some assign meaning to words based >upon a supposed "intent" behind the action, others to the "immediate form" >of the action, and yet others based upon the extended consequences of the >action. If we could be clear in which of these senses a word is defined or >intended, confusion would be reduced. > >___tony___ > -- Riccardo Sibilia sibilia@ims.ee.ethz.ch Inst. fuer militaerische Sicherheitstechnik http://www.ims.ee.ethz.ch/ Auf der Mauer 2 Tel. +41 1 252 6260 8001 Zurich / Switzerland Fax. +41 1 252 1667 ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ ------------------------ Yahoo! Groups Sponsor ---------------------~-~> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide, "Securing Your Web site for Business." Get it now! http://us.click.yahoo.com/4cW4jC/e.WCAA/bT0EAA/kzAVlB/TM ---------------------------------------------------------------------_-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:07 PDT