It is a *very* old, time honored technique. If my antique memory serves, something like this is described in Sun Tzu's "The Art of War." This book was thought to have been written in the 6th century BC and is still on the self at many bookstores. Of course, the email used then is a bit different than that used these days :-)
-----Original Message----- From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Ulrich Boche Sent: Monday, September 25, 2006 3:37 AM To: [email protected] Subject: Re: HP and false emails > > So planting false emails to try and find leaks is scandalous, is it? > > How interesting. > > How very, very interesting. > Any reason why it shouldn't be both scandalous and illegal? -- Ulrich Boche SVA GmbH, Germany IBM Premier Business Partner NOTICE: This electronic mail message and any files transmitted with it are intended exclusively for the individual or entity to which it is addressed. The message, together with any attachment, may contain confidential and/or privileged information. Any unauthorized review, use, printing, saving, copying, disclosure or distribution is strictly prohibited. If you have received this message in error, please immediately advise the sender by reply email and delete all copies. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

