Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation

Nonfiction, History, Military, Strategy, United States
Cover of the book Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310005305
Publisher: Progressive Management Publication: April 17, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310005305
Publisher: Progressive Management
Publication: April 17, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

More books from Progressive Management

Cover of the book 21st Century U.S. Military Manuals: Intelligence Preparation of the Battlefield (IPB) Field Manual - FM 34-130 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Death Spiral: Luftwaffe Airlift Training, Operation Stosser, and Lessons for Modern U.S. Air Force - Highlighting Perils of Cutbacks in Aircraft Training and Proficiency Compared to C-17 Pilot Force by Progressive Management
Cover of the book Hammer Down: The Battle for the Watapur Valley, 2011 - War in Afghanistan Vanguard of Valor Series, Fight Against Taliban and al-Qaeda, Task Force Cacti by Progressive Management
Cover of the book History of the Joint Chiefs of Staff: Volume VIII: The Joint Chiefs of Staff and National Policy 1961-1964 - Strategic Nuclear Forces, Arms Control, Test Ban, Cuban Missile Crisis, Berlin by Progressive Management
Cover of the book NASA Astronauts on Soyuz: Experience and Lessons for the Future - Working with the Russians from the Apollo-Soyuz Test Project to the Mir Space Station and the International Space Station (ISS) by Progressive Management
Cover of the book Establishing a Lessons Learned Program: Observations, Insights and Lessons - Center For Army Lessons Learned Handbook 11-33 - Developing a Lessons Learned Program for Civilians and Business by Progressive Management
Cover of the book The Rollback of South Africa's Chemical and Biological Warfare Program: Origins of NBC Program, Project Coast, Wouter Basson, Transition to ANC Rule, Basson's Arrest and Trial, Mandela by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Support Function #3 Public Works and Engineering (IS-803) - U.S. Army Corps of Engineers (USACE), ENGlink by Progressive Management
Cover of the book A Giant in the Shadows: Major General Benjamin Foulois and the Rise of the Army Air Service in World War I - Beginnings of Military Aviation, War Department Buys Aeroplane, Foulois on Western Front by Progressive Management
Cover of the book Future Counterland Operations: Common Lessons from Three Conflicts - Persian Gulf War Desert Storm, Allied Force NATO in Yugoslavia, Enduring Freedom Afghanistan, Value of ISR, Power of Innovation by Progressive Management
Cover of the book Space Shuttle NASA Mission Report: STS-2, November 1981 - Second Flight of Columbia, Complete Technical Details of Orbiter Performance and Problems, Mission Events by Progressive Management
Cover of the book Cyber Security Planning Guide, Small Business Information Security Fundamentals: Privacy and Data Security, Scams and Fraud, Network Security, Website Security, Email, Mobile Devices, Employees by Progressive Management
Cover of the book China's Role in Counter-Piracy Operations: Gulf of Aden (GOA), Southeast Asia, Cooperating with Other Navies, PLAN Modernization, ASEAN Economic Relationship, Somali Piracy, Mahanian Philosophy by Progressive Management
Cover of the book Female Suicide Bombers: Terrorist Weapon of Choice, Review of Historical Bombers, Characteristics, Changes in Application by Terrorist Organizations, Hamas, Tamil Tigers, Chechen Rebels, Al Aqsa by Progressive Management
Cover of the book 21st Century Pocket Guide to the U.S. Military Academy at West Point: USMA Programs, Admissions, Cadet Life, History by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy