It is a *very* old, time honored technique. 

If my antique memory serves, something like this is described in Sun
Tzu's "The Art of War."  This book was thought to have been written in
the 6th century BC and is still on the self at many bookstores. Of
course, the email used then is a bit different than that used these days
:-) 

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On
Behalf Of Ulrich Boche
Sent: Monday, September 25, 2006 3:37 AM
To: [email protected]
Subject: Re: HP and false emails

 
> 
> So planting false emails to try and find leaks is scandalous, is it?
> 
> How interesting.
> 
> How very, very interesting.
> 
Any reason why it shouldn't be both scandalous and illegal?
-- 
Ulrich Boche
SVA GmbH, Germany
IBM Premier Business Partner

 
NOTICE: This electronic mail message and any files transmitted with it are 
intended exclusively
for the individual or entity to which it is addressed. The message, together 
with any attachment, may contain confidential and/or privileged
information. Any unauthorized review, use, printing, saving, copying, 
disclosure 
or distribution is strictly prohibited. If you have received this message in 
error, please immediately
advise the sender by reply email and delete all copies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to