Return-Path: <sentto-279987-1239-989984055-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 15 May 2001 20:35:27 -0700 (PDT) Received: (qmail 31592 invoked by uid 510); 16 May 2001 02:36:01 -0000 Received: from n4.groups.yahoo.com (HELO hk.egroups.com) (216.115.96.54) by 204.181.12.215 with SMTP; 16 May 2001 02:36:01 -0000 X-eGroups-Return: sentto-279987-1239-989984055-fc=all.net@returns.onelist.com Received: from [10.1.4.53] by hk.egroups.com with NNFMP; 16 May 2001 03:34:15 -0000 X-Sender: ozair_rasheed@geocities.com X-Apparently-To: iwar@yahoogroups.com Received: (EGP: mail-7_1_3); 16 May 2001 03:34:14 -0000 Received: (qmail 2104 invoked from network); 16 May 2001 03:33:26 -0000 Received: from unknown (10.1.10.27) by l7.egroups.com with QMQP; 16 May 2001 03:33:26 -0000 Received: from unknown (HELO swprod.strategyworld.com) (206.81.133.14) by mta2 with SMTP; 16 May 2001 03:33:26 -0000 Received: from mail pickup service by swprod.strategyworld.com with Microsoft SMTPSVC; Tue, 15 May 2001 21:33:24 -0600 To: <iwar@yahoogroups.com> X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Message-ID: <SWPRODNfLjH5ML8JLLg00000095@swprod.strategyworld.com> X-OriginalArrivalTime: 16 May 2001 03:33:24.0609 (UTC) FILETIME=[F6864710:01C0DDB8] From: <ozair_rasheed@geocities.com> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Tue, 15 May 2001 21:33:24 -0600 Reply-To: iwar@yahoogroups.com Subject: [iwar] News from www.strategypage.com Content-Type: text/plain Content-Transfer-Encoding: 8bit Sent to you by Ozair from www.strategypage.com. Direct from the site. <p><b>INFORMATION WARFARE: Marketing Mode</b></p> <p> </p> <p>April 10, 2001; The U.S. armed forces are into marketing mode. Noting that the MYV generation is not much impressed by stories of past military glory, the brass are meeting the kids on familiar ground. A new TV show called "Wargames," complete with a music video class soundtrack has just appeared. A new reality TV show, "Boot Camp", uses active duty Marine Corps drill instructors to add the right edge of authenticity. New recruiting commercials come on like music videos. Action and excitement is stressed. In the long history of military recruiting, stressing the fun (there's always some) and neglecting the tedium, terror and boredom has always worked better than being up front about what military life is really all about. Stressing service, accomplishment and pride in one's work has always been a hard sell. But the current campaign is actually not so much about recruiting as it is about just keeping people aware that the armed forces exist. Recruiters tend to be more forthcoming about what military life is really all about. The recruiters know that word-of –mouth from young people in the service, or who have been, is used by potential recruits to provide more realistic information on what it's like "inside." But many potential recruits are only dimly aware that the military exists. Thus the current flood of flashy military programming.<br> <br> March 24, 2001; The U.S. Army is sending 7,500 troops from the 4th Infantry Division to the National Training Center to test new digitalization technologies. These techniques depend on digital communications gear to instantly pass video, voice and data between armored vehicles, artillery, aircraft, infantry and headquarters. The result is a combat force that can react more rapidly. But bringing firepower on targets more quickly, the enemy is put at an enormous disadvantage. For as long as soldiers have been fighting, getting information about the enemy to your commander has always been a problem. The digitalized force solves that. The commander always knows where his own troops are and obtains better information about the enemy faster. The impact will be similar to what happened when police cars got radios some fifty years ago. All of a sudden, crimes like bank robbery got a whole lot more dangerous. Once the word got out, the police could rapidly use radio to reply their people, and rapidly receive information from witnesses or, say, police on foot who saw the robbers speed by. Radio alone did not revolutionize warfare as much because battles are a much more complex and chaotic process. Digitialization and the use of computers, plus soldiers who have years of internet experience, will make a big difference. But another reason the army is eager to test digitalized units under combat conditions is to discover those things they haven't through of yet. New forms of warfare tend create opportunities, and pitfalls, no one foresaw. Just as many armies stumbled into "blitzkrieg" warfare in the late 1930s and early 1940s, the same is expected to happen again.<br> <br> March 23, 2001; Armies of the Byte; All the talk about Cyberwarfare (attacking computers over the internet) has not produced much actual cyberaction in the military. On the civilian side, costs of dealing with cyberattacks on commercial systems exceed $30 billion a year. Cyberwar for the troops is still largely getting ready and talking about all the horrible things that might happen when the cyber warriors actually use their weapons. But in East Asia, cyberwar is becoming far more real than anywhere else. China and Taiwan have already been skirmishing, and more serious attacks have been attempted, although both sides deny this. Some serious hacking of US military sites has been traced back to Chinese cyber warfare organizations. <br> <br> Besides China and Taiwan, the two Koreas, Japan and Singapore have also established cybewarfare units. South Korea has done it to protect South Korea's extensive electronic infrastructure from attacks by North Korea. For decades, North Korea has used terrorism, threats, espionage and anything the poverty stricken, but belligerent, northerners could think of to torment the south. The North Korean leader is known to be an avid personal computer user, so one can imagine that there is enthusiasm for cyberwarfare at the very top. South Korea has a very computer literate population, and discovered that they had far more cyberwarfare talent than they first thought. Once the southerners investigated what cybermischief the northerners could get into, they realized that this cyberwar stuff had potential. Unfortunately, the north has very little electronic infrastructure to attack. But there's always China, Japan and Russia. However, these are nations South Korea wants to do business with. Yes, South Korea now realizes they have a formidable weapon. More so than any of their neighbors, with the possible exception of Japan, South Korea has more local talent who can carry out cyberwar attacks and, more importantly, defend the nation from such assaults.<br> <br> Japan set up cyberwar units because it realized that it had the largest electronic exposure in their part of the world. Indeed, next to North America, there's probably no juicier cyber target than Japan. The Japanese have concentrated on defense. They have a lot to protect, and for cultural reasons (they are very polite) and some lingering anxiety about their aggressive role in World War II, they have not done much to develop offensive methods. <br> <br> Not so the Chinese, where a combination of growing local internet presence, rapidly expanding technology industries and a strong sense of nationalism have created a major cyber power. The Chinese are also unique in that the government has tried, and succeeded to a large extent, in controlling the internet within China. Of course, no nation can completely control the internet. But the Chinese government has gone father than any one else. This effort is aided by the many patriotic internet experts in China who cooperate with the government in creating a powerful cyberwarfare capability. What this means is that thousands of capable, patriotic and internet savvy Chinese are eager to aid the government in this effort. These Chinese outnumber those independent minded hackers who scare governments and businesses in other nations. <br> <br> As good as the Chinese hackers are, they have not been able to cover their tracks. Some of their efforts overseas have been traced back to China. We know what the Chinese are up to, at least in general. And we know that they are good. What we don't know is exactly how good and exactly what cyberweapons they would unleash in a wartime, or a near wartime, situation. This is the most frightening aspect of cyberwar. The best weapons are those that are kept secret until used. The victim hit by a new type of cyberattack has to first figure out what's going on before defenses can be devised and damage repaired. The larger and more capable a nations cyberforce is, the more new attacks and tools they can develop. <br> <br> Examples of Chinese Cyberwar prowess have been seen in internet battles between Chinese and Taiwanese hackers over the last few years. The dispute between China and Taiwan over Taiwan's independence has been fought most viciously on the internet. The action has largely been minor stuff, trashing each others web sites and the like. But there have been indications of more potent stuff. The most damaging internet attacks require a lot of preparation and this usually involves quietly sneaking into the computers of potential victims to scout out defenses and sometimes leave programs for later use. There are a lot of Chinese cyberwarriors sneaking around the internet these days.<br> </p> <p>Most cyberweapons also have a short shelf life, as they depend on software flaws that are constantly being discovered and fixed. But this is where China has an edge, for as the number of skilled Chinese software engineers and hackers increases, so does the ability of China to discover, and exploit, internet flaws more rapidly than anyone else. <br> </p> ------------------------ Yahoo! Groups Sponsor ---------------------~-~> SearchSecurity.com is your free resource that aggregates the best security news and resources from around the Internet daily. So you have a partner that does all of the research that you don't have time to do - from the most comprehensive daily news, to the largest collection of security links and interactive community features anywhere. http://us.click.yahoo.com/PnDLcC/uGiCAA/EGNFAA/kzAVlB/TM ---------------------------------------------------------------------_-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:13 PDT