From: “list” <list@infowar.com>
To: <cypherpunks@toad.com>
Message Hash: a67b667353812abdfe452cd82829adc6c83ea0e58dc92491eab7c315f17f1d23
Message ID: <199611150519.VAA27299@toad.com>
Reply To: N/A
UTC Datetime: 1996-11-15 05:19:32 UTC
Raw Date: Thu, 14 Nov 1996 21:19:32 -0800 (PST)
From: "list" <list@infowar.com>
Date: Thu, 14 Nov 1996 21:19:32 -0800 (PST)
To: <cypherpunks@toad.com>
Subject: infowar Digest for 14 Nov 1996
Message-ID: <199611150519.VAA27299@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
infowar Digest for 14 Nov 1996
Topics covered in this issue include:
1: Flight Information Resource
by Betty@infowar.com
2: Flight Information Resource
by Betty@infowar.com
--------------------------------------------------------------------------
1 Message:0001 1
--------------------------------------------------------------------------
To: infowar@infowar.com
From: "Betty G. O'Hearn" <betty@infowar.com>
Subject:
Infowar Thursday November 14 1996 Volume 01: Number 03
We thank our sponsors:
Internet Security Solutions
New Dimensions International - Security Training
Secure Computing Corporation
HOMECOM Communications
National Computer Security Association
OPEN SOURCE SOLUTIONS, Inc.
__________________________________________________
Infowar@infowar.com is brought to you in the the interest of an open,=
unclassified exchange of information and ideas as a means for advancement=
of Information Warfare related issues. Topics of discussion for this list=
include: Infowar, Electronic Civil Defense, Hacking, Defensive Techniques,=
Policy, Non-Lethals, Psyops, Chemical Warfare Agents and WMD.=20
As the list expands we will adapt to the needs and desires of our=
subscribers.=20
__________________________________________________________
To: Infowar@infowar.com
From: winn@infowar.com
Subject: MCTL Process
Infowar.com is proud to have been given permission to publish the=20
latest Military Critical Technologies List - Part I: Weapons Systems=20
Technologies.=20
THE MCTL Process is the systemic ongoing assessment and analyses of=
technologies to determine which technologies are Militarily Critical and=
therefore should have additional controlsplaced on them or made subject to=
export control.=20
This document is the first of three parts. Part two: Weapons of Mass=20
Production and Part three: Critical Developing Technologies are in=
development=20
and will be published when completed and made available to us. Don't miss=
=20
reading this! Download Acrobat as the file is in .pdf format. (acrobat=
readers are free) This file will be posted the week of November 17 1996.
------------------------------------------------------------
To: Betty@infowar.com
From: "Eric L. Nelson, M.A." <enelson@nosc.mil>
Subject: G-TWO RECRUITMENT FORM
Sender: owner-g-two@majordomo.netcom.com
Please use this ammended form to inform your DOD intel
and CI colleagues about g-two. Please discard previous
editions.
Thanks,
EL Nelson
moderator
Get The Word Out (G-TWO) is designed to provide direct assistance=20
to DOD intelligence and counterintelligence teams by providing=20
open-source intelligence and news summaries pertinent to DOD=20
interests. Topics include:
Political:
Politics of intelligence.
Political history of hotspots/groups/personalities.
Information:
WWW locations of intelligence usefulness with brief summaries.
Lists, databases, and archives accessible via the internet.
Resource sharing.
NBC-M (nuclear, biological, chemical & medical):
Biochem threat analysis/events (outbreaks).
Medical technology and issues related to DOD missions/personnel.
Tracking the development of NBC capabilities by country/group.
Terrorism:
Threat/threat mindsets/tactical intent.
Issues related to security and threat issues.
International Crime.
New developments in terrorism.
New technology/weapons systems with CT application.
Info. on capability of Special Teams/personnel.
Military/Intel Agencies:
Force protection.
OPSEC.
Military plans/policies. =20
Reports on terrorism/counter-terrorism activities.
Data on military forces and capabilities (order of battle).
Analysis:
More analysis by SME's (subject matter experts).
Emerging threat analysis.
EOD/chemical analysis.
Group profies (themes, objectives, etc.) Who are these people?
Cultural profiles and key info/customs to know.
Technology & Industrial:
Hacking/Infowar.
Technology/precursor tracking, what is being procured by others.
Industrial/technical intelligence on foreign countries-=20
what are they doing?
Other:
Central/South American, and Caribbean information. =20
Psychological profiles/cultural profiles of groups/personalities.
Deception.
Stateless Warfare Issues (gangs, 4th generation warfare).
State department info. =20
Washington Early Bird news summaries. =20
World hot spot info.
Information warfare.
Daily news articles on terrorism and related issues
State Department country studies
State Department terrorist groups/personalities files
Emergency News Network (ENN) updates
Intelligent Concepts Daily News Summaries
Special support tasking
News flashes
More to be added soon!
MEMBERSHIP: Limited to DOD intelligence and counterintelligence
personnel, (active, reserve, or retired). Non-DOD intel/CI
applicants may request a waiver by demonstrating a need for=20
inclusion, (such as law enforcement intelligence, FBI, etc.)
To apply for membership answer the following questions and email
to Eric Nelson at: =20
enelson@rohan.sdsu.edu
<send the following>
NAME/RANK:
MILITARY UNIT/ORG:
JOB TITLE:
EMAIL ADDRESS:
REG/RES/RET?
NAME OF PERSON WHO REFERRED YOU (MANDATORY):
<clip here and send>
------------------------------------------------------------
From: "Robert A. Walton" <waltonr@meade-emh2.army.mil>=20
Subject: DC Area Infowar Event
Cc: "Betty G. O'Hearn" <betty@infowar.com>
Date: Thu, 14 Nov 1996 17:04:22 +0000
You may wish to post the following notice.
The Maryland chapter of Armed Forces Communications and Electronics=20
Association will have a luncheon meeting at the Fort Meade Officer's Club=20
on Tuesday, 19 November. The lunch is at 11:45, the program follows at=20
12:30. The speaker is Brigadier General Jaeger. The topic is=20
"Information Warfare Exercise Lessons Learned."
The cost is $10.00 for the luncheon if you register today or Friday, or=20
$12.00 at the door Tuesday. If you are interested in going, please call=20
Vicki Neuman at 301-317-9474 to make a reservation.
Thanks
Bob Walton
------------------------------------------------------------
To: infowar@infowar.com
From: aludwig@pacbell.net
Subject: Legal aspects of information warfare
My name is Aaron Ludwig and I am a third year law student at Whittier Law=20
School. I am currently writing a law review article about the legal=20
aspects of information warfare. If anyone has any insight or helpful=20
information regarding this topic please contact me at=20
aaronludwig@juno.com or simply reply to this mail. The following are=20
just a few of the questions I hope to analyze and answer:
If the U.S. sustains an information-based attack, does this warrant an=20
armed response?(i.e., what constitutes an attack?)
What laws are involved in carrying out or defending against information=20
attacks? What laws are involved in the detection of enemy information=20
warriors?
Last, but not least, I wonder whether anyone can tell me how to get a=20
hold of the proceedings of any of the information warfare conferences. =20
Keep in mind that I am a highly-leveraged (broke) law student.
Thank you.
Aaron
------------------------------------------------------------
To: Infowar@infowar.com
From: Betty@infowar.com
Subject: Defense Science Board Task Force
Defense Science Board Task Force on Information Warfare-Defense=20
(IW-D), will be issuing a report in the next few days. Federal Computer=
Week=20
has an interesting article stating that the report called the threat of an=
IW=20
attack "significant," adding that the nation's "vulnerabilities are=
numerous,=20
[and] the countermeasures are extremely limited...." You can read the=
article at=20
http://www.fcw.com/pubs/fcw/1111/duck.htm. We will be publishing the=
report=20
as it is made available to us.
------------------------------------------------------------
Date: 11 Nov 1996 20:13:20 CST
Subject: Flight Information Resource
Sender: owner-g-two@majordomo.netcom.com
ENN Info Update
11/11/96 - 20:00CST
New Information Resource Assists in Tracking Domestic Flights
(ENN) A free service called "Flight Trax" is now available on the
World-Wide-Web.
This new information resource allows one to track the progress of any
domestic airflight within the contigious 48 states.
Call up: http://www.amerwxcncpt.com/ with your favorite internet
browser. The program will ask you for the flight number, the airline, and=
the destination airport (using the FAA designated three-letter code). The=
program will
then show you the kind of aricraft used, its flight's path, its location
on that path (accurate to within two or three minutes), and its expected
time of arrival at its destination. It will not tell you why it may have
been delayed.
The information is provided by Flyte-Comm of Ft. Lauderdale, FL, which
uses data from the FAA to produce the flight estimates. Might be prove
useful while waiting for Grandma's flight to come in from Des Moines, or
a variety of other uses.
Courtesy of:
EmergencyNet News Service
Emergency Response & Research Institute
6348 N. Milwaukee Ave., #312
Chicago, IL. 60646
(773) 631-3774 - Voice
(773) 631-4703 - Fax
(773) 631-3467 - Modem/Emergency BBS On-Line
http://www.emergency.com - Website
enn@emergency.com - E-mail
------------------------------------------------------------
END
Infowar Thursday November 14 1996 Volume 01: Number 03
DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT
in the subject line.
Subscribe infowar TO JOIN GROUP
Unsubscribe infowar TO LEAVE GROUP
Help infowar TO RECEIVE HELP=20
TO POST A MESSAGE: E-Mail to infowar@infowar.com =20
_____________________________________________________
Infowar.Com
Interpact, Inc.
Winn Schwartau
winn@infowar.com
http://www.infowar.com
813-393-6600 Voice
813-393-6361 FAX
Sponsor Opportunities/Comments/Help
Betty G. O'Hearn
Assistant to Winn Schwartau
http://www.infowar.com
betty@infowar.com
813-367-7277 Voice
813-363-7277 FAX
--------------------------------------------------------------------------
2 Message:0002 2
--------------------------------------------------------------------------
To: infowar@infowar.com
From: "Betty G. O'Hearn" <betty@infowar.com>
Subject:
Infowar Thursday November 14 1996 Volume 01: Number 03
We thank our sponsors:
Internet Security Solutions
New Dimensions International - Security Training
Secure Computing Corporation
HOMECOM Communications
National Computer Security Association
OPEN SOURCE SOLUTIONS, Inc.
__________________________________________________
Infowar@infowar.com is brought to you in the the interest of an open, unclassified exchange of information and ideas as a means for advancement of Information Warfare related issues. Topics of discussion for this list include: Infowar, Electronic Civil Defense, Hacking, Defensive Techniques, Policy, Non-Lethals, Psyops, Chemical Warfare Agents and WMD.
As the list expands we will adapt to the needs and desires of our subscribers.
__________________________________________________________
To: Infowar@infowar.com
From: winn@infowar.com
Subject: MCTL Process
Infowar.com is proud to have been given permission to publish the
latest Military Critical Technologies List - Part I: Weapons Systems
Technologies.
THE MCTL Process is the systemic ongoing assessment and analyses of technologies to determine which technologies are Militarily Critical and therefore should have additional controlsplaced on them or made subject to export control.
This document is the first of three parts. Part two: Weapons of Mass
Production and Part three: Critical Developing Technologies are in development
and will be published when completed and made available to us. Don't miss
reading this! Download Acrobat as the file is in .pdf format. (acrobat readers are free) This file will be posted the week of November 17 1996.
------------------------------------------------------------
To: Betty@infowar.com
From: "Eric L. Nelson, M.A." <enelson@nosc.mil>
Subject: G-TWO RECRUITMENT FORM
Sender: owner-g-two@majordomo.netcom.com
Please use this ammended form to inform your DOD intel
and CI colleagues about g-two. Please discard previous
editions.
Thanks,
EL Nelson
moderator
Get The Word Out (G-TWO) is designed to provide direct assistance
to DOD intelligence and counterintelligence teams by providing
open-source intelligence and news summaries pertinent to DOD
interests. Topics include:
Political:
Politics of intelligence.
Political history of hotspots/groups/personalities.
Information:
WWW locations of intelligence usefulness with brief summaries.
Lists, databases, and archives accessible via the internet.
Resource sharing.
NBC-M (nuclear, biological, chemical & medical):
Biochem threat analysis/events (outbreaks).
Medical technology and issues related to DOD missions/personnel.
Tracking the development of NBC capabilities by country/group.
Terrorism:
Threat/threat mindsets/tactical intent.
Issues related to security and threat issues.
International Crime.
New developments in terrorism.
New technology/weapons systems with CT application.
Info. on capability of Special Teams/personnel.
Military/Intel Agencies:
Force protection.
OPSEC.
Military plans/policies.
Reports on terrorism/counter-terrorism activities.
Data on military forces and capabilities (order of battle).
Analysis:
More analysis by SME's (subject matter experts).
Emerging threat analysis.
EOD/chemical analysis.
Group profies (themes, objectives, etc.) Who are these people?
Cultural profiles and key info/customs to know.
Technology & Industrial:
Hacking/Infowar.
Technology/precursor tracking, what is being procured by others.
Industrial/technical intelligence on foreign countries-
what are they doing?
Other:
Central/South American, and Caribbean information.
Psychological profiles/cultural profiles of groups/personalities.
Deception.
Stateless Warfare Issues (gangs, 4th generation warfare).
State department info.
Washington Early Bird news summaries.
World hot spot info.
Information warfare.
Daily news articles on terrorism and related issues
State Department country studies
State Department terrorist groups/personalities files
Emergency News Network (ENN) updates
Intelligent Concepts Daily News Summaries
Special support tasking
News flashes
More to be added soon!
MEMBERSHIP: Limited to DOD intelligence and counterintelligence
personnel, (active, reserve, or retired). Non-DOD intel/CI
applicants may request a waiver by demonstrating a need for
inclusion, (such as law enforcement intelligence, FBI, etc.)
To apply for membership answer the following questions and email
to Eric Nelson at:
enelson@rohan.sdsu.edu
<send the following>
NAME/RANK:
MILITARY UNIT/ORG:
JOB TITLE:
EMAIL ADDRESS:
REG/RES/RET?
NAME OF PERSON WHO REFERRED YOU (MANDATORY):
<clip here and send>
------------------------------------------------------------
From: "Robert A. Walton" <waltonr@meade-emh2.army.mil>
Subject: DC Area Infowar Event
Cc: "Betty G. O'Hearn" <betty@infowar.com>
Date: Thu, 14 Nov 1996 17:04:22 +0000
You may wish to post the following notice.
The Maryland chapter of Armed Forces Communications and Electronics
Association will have a luncheon meeting at the Fort Meade Officer's Club
on Tuesday, 19 November. The lunch is at 11:45, the program follows at
12:30. The speaker is Brigadier General Jaeger. The topic is
"Information Warfare Exercise Lessons Learned."
The cost is $10.00 for the luncheon if you register today or Friday, or
$12.00 at the door Tuesday. If you are interested in going, please call
Vicki Neuman at 301-317-9474 to make a reservation.
Thanks
Bob Walton
------------------------------------------------------------
To: infowar@infowar.com
From: aludwig@pacbell.net
Subject: Legal aspects of information warfare
My name is Aaron Ludwig and I am a third year law student at Whittier Law
School. I am currently writing a law review article about the legal
aspects of information warfare. If anyone has any insight or helpful
information regarding this topic please contact me at
aaronludwig@juno.com or simply reply to this mail. The following are
just a few of the questions I hope to analyze and answer:
If the U.S. sustains an information-based attack, does this warrant an
armed response?(i.e., what constitutes an attack?)
What laws are involved in carrying out or defending against information
attacks? What laws are involved in the detection of enemy information
warriors?
Last, but not least, I wonder whether anyone can tell me how to get a
hold of the proceedings of any of the information warfare conferences.
Keep in mind that I am a highly-leveraged (broke) law student.
Thank you.
Aaron
------------------------------------------------------------
To: Infowar@infowar.com
From: Betty@infowar.com
Subject: Defense Science Board Task Force
Defense Science Board Task Force on Information Warfare-Defense
(IW-D), will be issuing a report in the next few days. Federal Computer Week
has an interesting article stating that the report called the threat of an IW
attack "significant," adding that the nation's "vulnerabilities are numerous,
[and] the countermeasures are extremely limited...." You can read the article at
http://www.fcw.com/pubs/fcw/1111/duck.htm. We will be publishing the report
as it is made available to us.
------------------------------------------------------------
Date: 11 Nov 1996 20:13:20 CST
Subject: Flight Information Resource
Sender: owner-g-two@majordomo.netcom.com
ENN Info Update
11/11/96 - 20:00CST
New Information Resource Assists in Tracking Domestic Flights
(ENN) A free service called "Flight Trax" is now available on the
World-Wide-Web.
This new information resource allows one to track the progress of any
domestic airflight within the contigious 48 states.
Call up: http://www.amerwxcncpt.com/ with your favorite internet
browser. The program will ask you for the flight number, the airline, and the destination airport (using the FAA designated three-letter code). The program will
then show you the kind of aricraft used, its flight's path, its location
on that path (accurate to within two or three minutes), and its expected
time of arrival at its destination. It will not tell you why it may have
been delayed.
The information is provided by Flyte-Comm of Ft. Lauderdale, FL, which
uses data from the FAA to produce the flight estimates. Might be prove
useful while waiting for Grandma's flight to come in from Des Moines, or
a variety of other uses.
Courtesy of:
EmergencyNet News Service
Emergency Response & Research Institute
6348 N. Milwaukee Ave., #312
Chicago, IL. 60646
(773) 631-3774 - Voice
(773) 631-4703 - Fax
(773) 631-3467 - Modem/Emergency BBS On-Line
http://www.emergency.com - Website
enn@emergency.com - E-mail
------------------------------------------------------------
END
Infowar Thursday November 14 1996 Volume 01: Number 03
DIRECT REQUESTS to: list@infowar.com with one-line in the BODY, NOT
in the subject line.
Subscribe infowar TO JOIN GROUP
Unsubscribe infowar TO LEAVE GROUP
Help infowar TO RECEIVE HELP
TO POST A MESSAGE: E-Mail to infowar@infowar.com
_____________________________________________________
Infowar.Com
Interpact, Inc.
Winn Schwartau
winn@infowar.com
http://www.infowar.com
813-393-6600 Voice
813-393-6361 FAX
Sponsor Opportunities/Comments/Help
Betty G. O'Hearn
Assistant to Winn Schwartau
http://www.infowar.com
betty@infowar.com
813-367-7277 Voice
813-363-7277 FAX
Return to November 1996
Return to ““list” <list@infowar.com>”
1996-11-15 (Thu, 14 Nov 1996 21:19:32 -0800 (PST)) - infowar Digest for 14 Nov 1996 - “list” <list@infowar.com>