<html>
<body text="#000000" bgcolor="#ffffff">
<p>War is also about reducing or softening up your enemy's critical
information infrastructure as a precursor to an actual attack by your
armed forces <br>
<br>
Cyber warfare is a low level, asymmetrical and plausibly deniable
method to accomplish this, much like some countries use non state
actors to carry out a proxy war against their enemies <br>
<br>
--srs (htc one x)<br>
</p>
<br><p>
<p>On 24 March 2013 10:38:13 PM Aldo Matteucci
<aldo.matteucci@gmail.com> wrote:</p>
<blockquote type="cite">
Dear Dr. POUZIN<br><br>A 302 page manual for "cyber
warfare"<br>I'm impressed.<br><br>I only have one problem:
cyber warfare is a misnomer.<br><br><b>War</b>'s aim is
"regime change" - territorial occupation or so. It was about
conquest of<b> immovable property</b>.<br>
Wars in pre-industrial societies were affairs among extractive elites -
hence subject to rules.<br><br><b>Raids</b>, however, to rob movable<b>
property</b>, were never the object of international rules. A raider
was strung up, and that was that.<br>
The problem the US has, after 9/11, was that they were trying to apply
the rules of war to a raid.<br><br>Aldo<br><br><br><div
class="gmail_quote">On 24 March 2013 17:37, Louis Pouzin (well) <span
dir="ltr"><<a href="mailto:pouzin@well.com"
target="_blank">pouzin@well.com</a>></span> wrote:<br>
<blockquote class="gmail_quote"
style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div
class="gmail_quote">On Sat, Mar 23, 2013 at 3:40 AM, Ian Peter <span
dir="ltr"><<a href="mailto:ian.peter@ianpeter.com"
target="_blank">ian.peter@ianpeter.com</a>></span> wrote:<br>
<blockquote class="gmail_quote"
style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div dir="ltr">
<div dir="ltr">
<div style="font-size:12pt;font-family:'Calibri'">
<div><span><font color="#333333"><font face="Helvetica"><span><font
style="FONT-SIZE:10.5pt">As Samuel Morse might have remarked, “What God hath
wrought”.</font></span></font></font></span></div>
<div><span><font color="#333333"><font face="Helvetica"><span><font
style="FONT-SIZE:10.5pt"></font></span></font></font></span> </div>
<div><span><font color="#333333"><font face="Helvetica"><span><font
style="FONT-SIZE:10.5pt">A </font></span><font
style="FONT-SIZE:10.5pt">landmark document created at the request of NATO has
proposed a set of rules for how international cyberwarfare should be
conducted.
Written by 20 experts in conjunction with the International Committee
of the Red
Cross and the US Cyber Command, the</font></font></font></span><font
style="FONT-SIZE:10.5pt"><a
href="http://issuu.com/nato_ccd_coe/docs/tallinnmanual?mode=embed&layout=http%3A%2F%2Fskin.issuu.com%2Fv%2Flight%2Flayout.xml&showFlipBtn=true"
target="_blank"><i><font color="#fb4834"><font
style="TEXT-DECORATION:none" face="Helvetica">Tallinn Manual on the
International Law Applicable to Cyber
Warfare</font></font></i></a></font><span><font face="Helvetica"><font
style="FONT-SIZE:10.5pt"><font color="#333333"><span> </span>analyzes
the rules of conventional war
and applies them to state-sponsored
cyberattacks.</font></font></font></span></div>
<div> </div>
<div><a
title="http://www.theverge.com/2013/3/21/4130740/tallin-manual-on-the-international-law-applicable-to-cyber-warfare"
href="http://www.theverge.com/2013/3/21/4130740/tallin-manual-on-the-international-law-applicable-to-cyber-warfare"
target="_blank">http://www.theverge.com/2013/3/21/4130740/tallin-manual-on-the-international-law-applicable-to-cyber-warfare</a></div>
<div> </div>
</div></div></div>
- - -<br></blockquote><div> </div><div>Thanks Ian for precious links.
It seems that time is coming for legal definitions of cyberwarfare, in
which we are living already. Initiatives belong to the powers that be,
the only ones with the capacity to follow or violate the rules. CS
doesn't have much influence, except through occasional media power.<br>
<br>Some more frightening documents on real war:<br><br><a
href="http://www.salon.com/2013/02/19/latin_america_territorio_libre_from_the_cia_partner/?source=newsletter&utm_source=contactology&utm_medium=email&utm_campaign=Salon_Daily%20Newsletter%20%28Premium%29_7_30_110"
target="_blank">http://www.salon.com/2013/02/19/latin_america_territorio_libre_from_the_cia_partner/?source=newsletter&utm_source=contactology&utm_medium=email&utm_campaign=Salon_Daily%20Newsletter%20%28Premium%29_7_30_110</a><br>
<br><a
href="http://www.opensocietyfoundations.org/projects/globalizing-torture"
target="_blank">http://www.opensocietyfoundations.org/projects/globalizing-torture</a><br><br>One
may observe that oppressive regimes resort to coded sanitized language
to mean illegal and criminal activities. This was anticipated by Orwell
(newspeak), and turned real with soviet labor camp (concentration),
nazism special treatment (gas chamber), maoism reeducation
(deportation), bushism and obamism extraordinary rendition (torture),
inter alia.<span class="HOEnZb"><font color="#888888"><br>
<br>Louis<br><br> </font></span></div></div><br>
<br>____________________________________________________________<br>
You received this message as a subscriber on the list:<br>
<a
href="mailto:governance@lists.igcaucus.org">governance@lists.igcaucus.org</a><br>
To be removed from the list, visit:<br>
<a href="http://www.igcaucus.org/unsubscribing"
target="_blank">http://www.igcaucus.org/unsubscribing</a><br>
<br>
For all other list information and functions, see:<br>
<a href="http://lists.igcaucus.org/info/governance"
target="_blank">http://lists.igcaucus.org/info/governance</a><br>
To edit your profile and to find the IGC's charter, see:<br>
<a href="http://www.igcaucus.org/"
target="_blank">http://www.igcaucus.org/</a><br>
<br>
Translate this email: <a href="http://translate.google.com/translate_t"
target="_blank">http://translate.google.com/translate_t</a><br>
<br></blockquote></div><br><br clear="all"><br>-- <br>Aldo
Matteucci<br>65, Pourtalèsstr.<br>CH 3074 MURI b.
Bern<br>Switzerland<br><a
href="mailto:aldo.matteucci@gmail.com">aldo.matteucci@gmail.com</a><br>
</blockquote>
</body>
</html>