| |
| |
Foreword | |
| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
| |
Deception and the Need for Counterdeception | |
| |
| |
| |
The Changing Role of Deception in National Security | |
| |
| |
| |
Basic Terminology | |
| |
| |
| |
Perspectives and Applications of Deception | |
| |
| |
| |
Levels of Effects | |
| |
| |
| |
Domains of Implementation | |
| |
| |
| |
The Operational-Implementation Framework | |
| |
| |
| |
The Development of Deception Theory and Literature | |
| |
| |
| |
Book Overview | |
| |
| |
| |
Annotated Bibliography of Principal Deception Texts | |
| |
| |
Endnotes | |
| |
| |
| |
Introduction to Deception Principles | |
| |
| |
| |
Introduction | |
| |
| |
| |
The History of Deception Analysis | |
| |
| |
| |
Conceptual Models and Theories of Deception | |
| |
| |
| |
Barton Whaley | |
| |
| |
| |
Donald Daniel and Katherine Herbig | |
| |
| |
| |
Barton Whaley and J. Bowyer Bell | |
| |
| |
| |
Michael Handel | |
| |
| |
| |
Scott Gerwehr and Russell Glenn | |
| |
| |
| |
Principles and Maxims of Deception | |
| |
| |
| |
R.V. Jones | |
| |
| |
| |
The Mathtech Deception Research Program | |
| |
| |
| |
Haswell, Dewar, and Latimer | |
| |
| |
| |
The View from Science | |
| |
| |
| |
The View from Magic | |
| |
| |
| |
Searching for Common Themes | |
| |
| |
| |
Fundamental Principles of Deception: Truth, Denial, Deceit, and Misdirection | |
| |
| |
| |
Truth | |
| |
| |
| |
Denial | |
| |
| |
| |
Deceit | |
| |
| |
| |
Misdirection | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
| |
The Cognitive Aspects of Deception: Why Does Deception Work? | |
| |
| |
| |
Biases Relevant to Deception | |
| |
| |
| |
The Influence of Cultural Biases on Deception | |
| |
| |
| |
The Influence of Personal Biases on Deception | |
| |
| |
| |
Organizational Biases and Deception | |
| |
| |
| |
Cognitive Biases and Deception | |
| |
| |
| |
The Impact of Cognitive Biases on the Deception Story | |
| |
| |
| |
Cognitive Bias and Principles of Deception | |
| |
| |
| |
Truth: The Source of Expectations, Preconceptions, and Beliefs | |
| |
| |
| |
Denial: Out of Sight, Out of Mind | |
| |
| |
| |
Deceit: Reinforcing the Biases | |
| |
| |
| |
Misdirection: Diverting Attention and Reducing Suspicion | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
| |
Technical Methods of Deception | |
| |
| |
| |
Taxonomy of Technical Methods | |
| |
| |
| |
Technical Sensor Camouflage, Concealment, and Deception | |
| |
| |
| |
Tactical and Operational Sensory Deception | |
| |
| |
| |
Strategic Sensory Deception | |
| |
| |
| |
Signal and Information Systems Denial and Deception | |
| |
| |
| |
Electronic Warfare | |
| |
| |
| |
Signals Intelligence | |
| |
| |
| |
Information Operation (IO) | |
| |
| |
| |
Human Deception Channels | |
| |
| |
| |
The Use of HUMINT Channels for Deception | |
| |
| |
| |
Coordinated Technical Deception Methods | |
| |
| |
| |
Coordinating Stratagem | |
| |
| |
| |
Deception Timing and Surprise | |
| |
| |
| |
Deception Strategy | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
| |
Principles of Counterdeception | |
| |
| |
| |
What Is Counterdeceptlon? | |
| |
| |
| |
The Search for Ways to Counter Deception | |
| |
| |
| |
Early Pioneers [6]: "Is there, then, no way by which the target of stratagem can untangle the web of deceit?" | |
| |
| |
| |
The Theoretical Work of the 1980s | |
| |
| |
| |
Current Directions | |
| |
| |
| |
Searching for Common Themes | |
| |
| |
| |
A Holistic Approach to Counterdeception | |
| |
| |
| |
Counterdeception Themes and the Deception Cycle | |
| |
| |
| |
Proposed Principles of Counterdeception | |
| |
| |
| |
Know Yourself | |
| |
| |
| |
Know Your Adversary | |
| |
| |
| |
Know Your Situation | |
| |
| |
| |
Know Your Channels | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
| |
Nontechnical Approaches to Counterdeception | |
| |
| |
| |
The Vulnerable Mind and the Vulnerable Organization | |
| |
| |
| |
The Vulnerable Mind | |
| |
| |
| |
The Vulnerable Organization | |
| |
| |
| |
Deception-Resistant Humans and Organizations: The Prepared Mind and the Prepared Organization | |
| |
| |
| |
Building and Maintaining the Prepared Mind | |
| |
| |
| |
Building the Prepared Organization | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
| |
Technical Methods of Counterdeception | |
| |
| |
| |
The Counterdeception Elements of Detection, Discovery, and Deterrence | |
| |
| |
| |
Fundamental Counterdeception Technical Methods | |
| |
| |
| |
Counterdeception Planning and Collection Strategies | |
| |
| |
| |
Counterdeception Information Processing | |
| |
| |
| |
Counterdeception Analysis, Decision Support, and Production | |
| |
| |
| |
Deception Warning | |
| |
| |
| |
Considering Deception in Alternatives Analysis | |
| |
| |
| |
Deception Analytic Flow | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
| |
Counterdeception Architectures and Technologies | |
| |
| |
| |
Architecture Considerations | |
| |
| |
| |
Performance Measures | |
| |
| |
| |
Effectiveness Measures | |
| |
| |
| |
Operational Architecture: Methodology and Workflow of Counterdeception | |
| |
| |
| |
Individual Analyst's Methodologies | |
| |
| |
| |
Intelligence Team Workflow | |
| |
| |
| |
Intelligence Team Use Case | |
| |
| |
| |
Operational Architecture: Tools of Counterdeception | |
| |
| |
| |
Automated Processing Filters and Knowledge Bases | |
| |
| |
| |
Computational Analytic Support Tools | |
| |
| |
| |
An Analytic Tool Workflow | |
| |
| |
| |
System Architecture to Support Counterdeception | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
| |
Speculations About the Future of Deception and Counterdeception | |
| |
| |
| |
The Future, Changing Factors, and Implications for Deception | |
| |
| |
| |
Global Information Flows and Mass Media | |
| |
| |
| |
Deception and Counterdeception Technologies | |
| |
| |
| |
Summary | |
| |
| |
Endnotes | |
| |
| |
About the Authors | |
| |
| |
Index | |