Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation

Nonfiction, History, Military, Strategy, United States
Cover of the book Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310005305
Publisher: Progressive Management Publication: April 17, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310005305
Publisher: Progressive Management
Publication: April 17, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

More books from Progressive Management

Cover of the book Complete Guide to the Abu Ghraib Iraq War Prison Abuse Scandal: Major Reports and Investigations, Analysis, Lessons Learned, Impact on Army Profession, Intelligence Process, Detainee Doctrine, Torture by Progressive Management
Cover of the book Why is the Colonel Called "Kernal"? The Origin of the Ranks and Rank Insignia Now Used by the United States Armed Forces: Enlisted Ranks, Officers by Progressive Management
Cover of the book Yemen in Perspective: Orientation Guide and Yemeni Cultural Orientation: Geography, History, Economy, Security, Customs, Aden, Sanaa, Sunni and Shi'a, Sufism, Qat Chewing, Al Qaeda, Houthi Rebellion by Progressive Management
Cover of the book The United States Strategic Bombing Surveys: European War and Pacific War in World War II, Conventional Bombing and the Atomic Bombings of Hiroshima and Nagasaki by Progressive Management
Cover of the book Bahrain in Perspective: Orientation Guide: Geography, History, Economy, Society, Security, Military, Religion, Traditions, Manama, Muharraq, Hamad Town, Riffa, Al Khalifa Era, Oil, Sectarian Balance by Progressive Management
Cover of the book Establishing a Lessons Learned Program: Observations, Insights and Lessons - Center For Army Lessons Learned Handbook 11-33 - Developing a Lessons Learned Program for Civilians and Business by Progressive Management
Cover of the book Spain: Country Study with Multidisciplinary Analysis of Political, Economic, Social, and National Security Systems and Institutions, Spanish People, Origins, Beliefs and Values by Progressive Management
Cover of the book Keeping Special Forces Special: Regional Proficiency in Special Forces (SOF) - Evolution of Commando and Warrior Diplomat Roles, Language and Culture Needs Assessment, Foreign Area Officer Standard by Progressive Management
Cover of the book Unmanned Aircraft Systems (UAS): Integration of Weaponized Unmanned Aircraft into the Air-to-Ground System, Air War College Paper (UAVs, Drones, RPA) by Progressive Management
Cover of the book Sudan: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - Politics, Economy, Military - Darfur, Khartoum, Muslim Brotherhood by Progressive Management
Cover of the book The Advanced Surface Force Fleet: A Proposal for an Alternate Surface Force Structure and its Impact in the Asian Pacific Theater - Naval Expeditionary Amphibious Warfare, Power Projection, Sea Strike by Progressive Management
Cover of the book Project Mercury: A Chronology - A History of America's First Manned Spacecraft for the Shepard, Grissom, Glenn, Carpenter, Schirra, Cooper Flights (NASA SP-4001) by Progressive Management
Cover of the book 21st Century Emergency War Surgery Textbook by the U.S. Army: Weapons Injuries, Triage, Shock, Anesthesia, Infections, Critical Care, Amputations, Burns, Specific Injury Treatment by Progressive Management
Cover of the book Defense Security Service (DSS) Glossary of Security Terms, Definitions, and Acronyms by Progressive Management
Cover of the book Aftermath: A Historical Analysis of Resiliency Following Failure in Battle – Four Aerial Battles Where U.S. Airmen Won after Failure in World War I and II, Korea, and Vietnam, Esprit de Corps by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy