Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation

Nonfiction, History, Military, Strategy, United States
Cover of the book Deception: Theory and Practice - Military Deception, Army Doctrine, World War II, Vietnam, Desert Storm, Post Cold War, Surprise, Freedom of Action, Mislead the Target, Subversion, Mental Isolation by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310005305
Publisher: Progressive Management Publication: April 17, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310005305
Publisher: Progressive Management
Publication: April 17, 2016
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a concise handbook for deception practitioners. A longitudinal review of U.S. Army doctrine reveals a wide variation in the treatment of deception, from emphasized to ignored. This variation can be primarily explained by the U.S. preference for the cumulative destruction style of war and the perceived balance of power between the U.S. and its adversaries. This thesis strives to fill the current doctrinal gap by distilling the existing body of work to create a theory of deception in the military context. The theory presented provides a cogent structure, taxonomy, and lexicon; as well as, emphasis on how deception functions within the frameworks of communications and decision-making. Next, a synthesis of the practice of deception is presented, with a focus on deception planning and the essential elements of deception practice. Examples of U.S. use of deception from the Revolutionary War to Operation DESERT STORM are presented to provide illumination on the utility and use of deception. Finally, the thesis provides recommendations on how to organize for deception operations.

CHAPTER I * INTRODUCTION * A. BACKGROUND * B. HYPOTHESES * C. SCOPE AND SIGNIFICANCE * D. METHODOLOGY * CHAPTER II * DECEPTION IN U.S. ARMY DOCTRINE * A. PRE-WORLD WAR II ERA * B. WORLD WAR II ERA * C. POST WORLD WAR II THROUGH VIETNAM * D. POST VIETNAM ERA THROUGH DESERT STORM * E. POST COLD WAR ERA * F. CONCLUSIONS OF DOCTRINE REVIEW * CHAPTER III * EXPLANATIONS FOR VARIATION OF DECEPTION EMPHASIS * A. THE AMERICAN WAY OF WAR * 1. Styles of War * 2. American Preference for Cumulative Destruction * 3. Balance of Power * B. PROFESSIONAL OFFICER CLASS * C. OVER-CLASSIFICATION * D. MORALITY * E. CONCLUSION * CHAPTER IV * THEORY OF DECEPTION * A. WHAT IS DECEPTION * 1. Deception Defined * 2. Deception: Truth and Lies * B. TAXONOMY OF DECEPTION * 1. Taxonomy of Method * 2. Deception * 3. Active Deception * a. Displays * b. Feints * c. Demonstrations * d. Disinformation * 4. Cover * a. Camouflage * b. Denial * 5. Alternate Deception Taxonomies * a. Commission and Omission * b. Level of Sophistication * c. Effect-Based * C. DECEPTION AND UNCERTAINTY * 1. Uncertainty * 2. A-Type Deception * 3. M-Type Deception. * D. THE WHY OF DECEPTION * 1. Overview * 2. Surprise * 3. Freedom of Action * 4. Save Lives and Resources * 5. Mislead the Target * 6. Relative Superiority * 7. Security * 8. Subversion * 9. Mental Isolation * E. COMMUNICATIONS PROCESS OF DECEPTION * 1. Overview of Communications * 2. Indicators * 3. Channels * 4. Deception's Role in the Communications Process * F. DECEPTION AND TARGET DECISION-MAKING * 1. Observe * 2. Orient * a. Cultural Schemata * b. Personal Schemata * c. Cognitive Biases and Heuristics * d. Results of Orientation * 3. Decide * 4. Act * G. DECEPTION PROCESS * 1. Bell and Whaley * 2. See-Think-Do * 3. Revised Deception Process * CHAPTER V * PRACTICE OF MILITARY DECEPTION * A. DECEPTION PLANNING PROCESS * 1. Mission Analysis * a. Information Requirements * 2. Planning Guidance * 3. Planning Methodology * a. DO * b. THINK * c. SEE * 4. Deception Means * a. Physical * b. Cyber Electromagnetic * c. Administrative * 5. Execution and Assessment * a. Execution * b. Assessment * 6. Termination * B. PRINCIPLES OF DECEPTION * 1. Know the Target and Exploit Existing Perceptions * a. Understand the Target * b. Exploit Existing Perceptions * c. Avoiding Windfalls * 2. Security is Paramount * 3. Utilize Flexibility, Variety, and Conditioning * a. Flexibility * b. Variety * c. Conditioning * 4. Coordination and Control * a. Control * b. Coordination * 5. Requirement for Target Action

More books from Progressive Management

Cover of the book 21st Century U.S. Military Manuals: U.S. Coast Guard (USCG) Marine Safety Manual Volume One, Marine Safety Program, Environmental Response, Commercial Vessel Safety, Boating Safety by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Stability Operations and Support Operations Field Manual FM 3-07, FM 100-20 (Value-Added Professional Format Series) by Progressive Management
Cover of the book 1995 Oklahoma City Bombing: Terrorist Tragedy at the Murrah Federal Building - Timothy McVeigh and Terry Nichols, Foreign Connections, Right-Wing Domestic Terrorists, OKBOMB Task Force by Progressive Management
Cover of the book Deliberate Force: A Case Study in Effective Air Campaigning - Final Report of the Air University Balkans Air Campaign Study - Demise of Yugoslavia, Destruction of Bosnia, Tactics, Aircraft, Weapons by Progressive Management
Cover of the book The Paths of Heaven: The Evolution of Airpower Theory - Douhet, World War I and II, William Mitchell, Naval Theories, Continental Europe, Air Corps, deSeversky, Nuclear Strategy, Boyd, Warden, NATO by Progressive Management
Cover of the book 21st Century Chinese Military Issues: People's Republic of China's Nuclear Force Modernization - Command and Control, Undersea Nuclear Forces, BMD Countermeasures, Chinese Space Program by Progressive Management
Cover of the book Flight Research: Problems Encountered and What They Should Teach Us - Lunar Landing Research Vehicle, X-15, YF-12 Blackbird, P-51 Mustang, Lifting Bodies by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Gastrointestinal Carcinoid Tumors - Appendix, Rectal, Small Bowel, Gastric, Colon, Pancreatic, Regional, Metastatic, Carcinoid Syndrome by Progressive Management
Cover of the book Sustaining Souls: Work of the U.S. Army Chaplain Corps, Soldiers and Families, Religious Formation and Chaplain Identity, Ethos, Commander Assessment of Effectiveness by Progressive Management
Cover of the book The National Security Mission of the U.S. Border Patrol: A Question of Collective Bargaining Exemption - Union Rights for Federal Workforce, The Intelligence Process by Progressive Management
Cover of the book NASA Post-Apollo Lunar Exploration Plans: Moonlab Study - Semi-Permanent Lunar Surface Observatory Concept, Personnel, Life Support, Lunar Farm, Moon Base Layout and Design by Progressive Management
Cover of the book Air Force Doctrine Document 3-72: Nuclear Operations - Command and Control (C2), Deterrence, Strategic Effects, Nuclear Safety, Surety, Training by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Public Affairs Operations Field Manual - FM 46-1 (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Planning (IS-235.a) - Community Emergency Plan Review, Incident Management Case Studies, NRF, ESF, EOP, Appendices and Annexes by Progressive Management
Cover of the book Nanoscience and Nanotechnology: Air Force Research Laboratory (AFRL) Nanoscience Technologies Applications, Transitions and Innovations - Nanostrands, Optical, Transistors by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy