Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation

Nonfiction, History, Military, Strategy, United States
Cover of the book Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310005305
Publisher: Progressive Management Publication: April 17, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310005305
Publisher: Progressive Management
Publication: April 17, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

More books from Progressive Management

Cover of the book NASA Report on Mars Exploration: Frontier In-Situ Resource Utilization for Enabling Sustained Human Presence on Mars - ISRU, Surface Habitats, Entry Descent and Landing, Fuels, Food, Robotics by Progressive Management
Cover of the book Fire Monitoring Handbook (FMH Fire Management Program Center, National Interagency Fire Center) Part 2 - Wildfire and Wildland Fire Environmental and Fire Observation, Vegetation Monitoring Protocols by Progressive Management
Cover of the book 21st Century FEMA Study Course: NIMS Communications and Information Management (IS-704) - Interoperability, Mutual Aid and Assistance, Exercises, Scenarios by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - The State-Owned Enterprise as a Vehicle for Stability - Liberia, Kosovo, Iraq, Mozambique, Afghanistan by Progressive Management
Cover of the book The Army Medical Department 1818: 1865, Laying the Foundation, War with Mexico, The American Civil War, Achievements and Failures by Progressive Management
Cover of the book The Future of Command and Control: Complexity, Networking, and Effects-Based Approaches to Operations - Terrorism, the Post 9-11 World, von Moltke, Clausewitz, Decisionmaking during Apollo 13 by Progressive Management
Cover of the book Air National Guard (ANG) Structure for the Twenty-first Century: The Multimission Framework for Total Force Integration - ANG History and Culture, Why Does the Governor Need Fighter Airplanes by Progressive Management
Cover of the book The War in South Vietnam: The Years of the Offensive 1965-1968 - The United States Air Force in Southeast Asia - B-52 Bomber, Deployments and Air Operations, Refinements of Aircraft and Munitions by Progressive Management
Cover of the book Russia in Perspective: Orientation Guide and Cultural Orientation: Geography, History, Economy, Society, Security, Religion, Post-Soviet Russia, Stalin, Ivan the Terrible, Ukraine, Crimea by Progressive Management
Cover of the book Cost, Capability, and the Hunt for a Lightweight Ground Attack Aircraft: A-10 Warthog Replacement for Close Air Support (CAS), AT-6B, COIN, Counterinsurgency by Progressive Management
Cover of the book Keeping Special Forces Special: Regional Proficiency in Special Forces (SOF) - Evolution of Commando and Warrior Diplomat Roles, Language and Culture Needs Assessment, Foreign Area Officer Standard by Progressive Management
Cover of the book Inside the International Space Station (ISS): NASA Command and Data Handling (CDH) Astronaut Training Manual by Progressive Management
Cover of the book 21st Century NBC WMD CBRN Weapons and Terrorism: Guidelines for Mass Casualty Decontamination During a HAZMAT/Weapon of Mass Destruction Incident (Two Volumes) by Progressive Management
Cover of the book 1776: A Critical Time in the American Revolution: Initiative and Leadership of George Washington, Continental Congress, American and British Forces, Strategic Setting, Long Island and Trenton Battles by Progressive Management
Cover of the book 20th Century Spy in the Sky Satellites: Secrets of the National Reconnaissance Office (NRO) Volume 5 - NRO Leaders, Founders, Pioneers, and the Robert Perry History Volume IV by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy