Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation

Nonfiction, History, Military, Strategy, United States
Cover of the book Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310005305
Publisher: Progressive Management Publication: April 17, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310005305
Publisher: Progressive Management
Publication: April 17, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

More books from Progressive Management

Cover of the book Essential Guide to Transnistria and the Transniestrian Contest in Moldova: Russia, NATO, European Union, Ukraine, OSCE, "Frozen" Conflict by Progressive Management
Cover of the book Intelligence Community Legal Reference Book: Laws of the Federal Government Guiding the Intel Community - CIA Act, USA PATRIOT Act, Detainee Treatment Act, War Crimes Act, Executive Orders by Progressive Management
Cover of the book 2014 President Barack Obama State of the Union Address plus 2013 and 2009 Inaugural Addresses and Presidential Campaign Speeches from 2012 by Progressive Management
Cover of the book Expanding Fixed-Wing Aircraft Capability in U.S. Army Aviation Operations - UH-60L Blackhawk, CH-47F Chinook, C-23B, C-27J, BCT, Intra-Theater Airlift, Joint Cargo Aircraft (JCA), Ground Force Support by Progressive Management
Cover of the book History of the Office of the Secretary of Defense, Volume Two: The Test of War, 1950-1953 - Pentagon's Role in the Korean War, the Recall of MacArthur, Hydrogen Bomb, Truman, NATO by Progressive Management
Cover of the book Counterinsurgency in Somalia: Lessons Learned from the African Union Mission in Somalia, 2007-2013 - Insurgents, Harakat al-Shabaab, Somali Piracy, Evolution of AMISOM, U.S. Role, Lessons Learned by Progressive Management
Cover of the book NSA Secrets Declassified: Pearl Harbor Revisited, West Wind Clear - Cryptology and the Winds Message Controversy, The Black Chamber, Navy Cryptology, Signal Intelligence, Linguists, Purple Machines by Progressive Management
Cover of the book Endgame in the Pacific: Complexity, Strategy, and the B-29 - World War II Technological Solution to Attacking Japan, Bomber's Unintended Consequences in Chaos, Atomic Bombing of Hiroshima, Nagasaki by Progressive Management
Cover of the book Complete Guide to World War II's Forgotten War: The Aleutian Campaign in Alaska and North Pacific Against Japan - Kiska, Attu, Komandorski Islands, Operation Landcrab, Cold Weather Fighting, Navy by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Meteorology for Army Aviators (FM 1-230) - Weather Principles and Theory, Hazards (Professional Format Series) by Progressive Management
Cover of the book Liberia in Perspective: Orientation Guide: Geography, History, Economy, Security, Monrovia, Ganta, Buchanan, Gbarnga, Kakata, Deforestation, American Colonization, Tubman, Doe, Taylor, Civil War by Progressive Management
Cover of the book 21st Century Pocket Guide to Hydropower, Microhydropower and Small Systems, Incentives and Funding, Dams, Turbine Systems, Environmental Impact and Fish Passage, History, Research Projects by Progressive Management
Cover of the book Integrating the Unmanned Aircraft System (UAS) Into the National Airspace System by Progressive Management
Cover of the book 2014 Defense Department China Military and Security Report: People's Liberation Army (PLA), Space and Missiles, Force Modernization, Technology, Taiwan, Air Defenses, First Aircraft Carrier by Progressive Management
Cover of the book The Spoken Word: Recollections of Dryden History, The Early Years (NASA SP-2003-4530) - Scott Crossfield Interview, Muroc, NACA Research, X-1 Project by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy