You are here

Disable VAT on Taiwan

Unfortunately, as of 1 January 2020 SAGE Ltd is no longer able to support sales of electronically supplied services to Taiwan customers that are not Taiwan VAT registered. We apologise for any inconvenience. For more information or to place a print-only order, please contact uk.customerservices@sagepub.co.uk.

Deception
Share
Share

Deception
Counterdeception and Counterintelligence



January 2018 | 312 pages | CQ Press

“The chapters on the exercises are a treasure chest of material to work with, covering a whole array of scenarios. . . . I think virtually every page and topic could spark robust and spirited classroom discussion starting with the text title itself.”

—Ronald W. Vardy, University of Houston

“Most students have very little or no background [in this subject area], so Clark’s work is great to introduce students to intelligence and the analytical disciplines . . . a really excellent book that fills a gaping hole in the public literature and is of genuinely great value to both students and practitioners.”

—Carl A. Wege, Professor Emeritus, College of Coastal Georgia

Bridging the divide between theory and practice, Deception: Counterdeception and Counterintelligence provides a thorough overview of the principles of deception and its uses in intelligence operations. This masterful guide focuses on practical training in deception for both operational planners and intelligence analysts using a case-based approach. Authors Robert M. Clark and William L. Mitchell draw from years of professional experience to offer a fresh approach to the roles played by information technologies such as social media. By reading and working through the exercises in this text, operations planners will learn how to build and conduct a deception campaign, and intelligence analysts will develop the ability to recognize deception and support deception campaigns. 

Key Features

  • New channels for deception, such as social media, are explored to show readers how to conduct and detect deception activities through information technology.
  • Multichannel deception across the political, military, economic, social, infrastructure, and information domains provides readers with insight into the variety of ways deception can be used as an instrument for gaining advantage in conflict.
  • Contemporary and historical cases simulate real-world raw intelligence and provide readers with opportunities to use theory to create a successful deception operation.
  • A series of practical exercises encourages students to think critically about each situation. The exercises have several possible answers, and conflicting raw material is designed to lead readers to different answers depending on how the reader evaluates the material.
  • Individual and team assignments offer instructors the flexibility to proceed through the exercises in any order and assign exercises based on what works best for the classroom setup.


 
List of Tables, Figures, and Boxes
 
Preface
 
About the Authors
 
PART I: FUNDAMENTALS OF DECEPTION AND COUNTERDECEPTION
 
Chatper 1: Deception: The Basics
Why Deception?

 
Definitions

 
The Deception Target

 
Basic Principles

 
Roles of Operations and Intelligence

 
 
Chapter 2: The Methodology
The OODA Loop

 
OODA Loop Perspectives

 
Planning Deception: The Inverse OODA Loop

 
Executing Deception: The Forward OODA Loop

 
 
Chapter 3: The Outcome Scenario
Outcome Scenarios - The PMESII View

 
Political

 
Military

 
Economic

 
Social

 
Information

 
Infrastructure

 
 
Chapter 4: The Target
Individual Decision Modeling

 
Collective Decision Modeling

 
Cultural Modeling

 
 
Chapter 5: The Story
What Makes a Good Story?

 
Characteristics of a Good Deception Story

 
Plausibility

 
Reinforcement

 
Influence Nets

 
 
Chapter 6: The Channels
Understanding the Channels

 
Sensor Mapping

 
Channel Characterization

 
Channel Exploitation

 
 
Chapter 7: The Traditional Intelligence Channels
OSINT

 
COMINT

 
HUMINT

 
IMINT

 
Technical Collection

 
 
Chapter 8: The Cyberspace Channel
Deception in Cyberspace

 
Web-Based Deception

 
Web-Based CNE/CNA

 
Standalone Computers and Intranets

 
Cyber Deception

 
 
Chapter 9: Planning and Executing Deception
Checking the Decision/Action Model: Red Team Analysis

 
Checking for Unfavorable Outcomes: Alternative Analysis

 
Deconfliction

 
Overview of the Execution Process

 
Achieving Surprise

 
Operating Inside the Opponent's OODA Loop

 
Attending to Details and Timing

 
Managing the Developing Scenario

 
 
Chapter 10: Preparing to Counter Deception
Assessing Vulnerability

 
Assessing the Threat

 
 
Chapter 11: Identifying Deception
Deception Detection via Channel Management

 
Evaluating the Source

 
Evaluating the Channel

 
Evaluating the Evidence

 
 
PART II: EXERCISES
 
Chapter 12: Sensor Mapping and Channel Tracking Exercises
Sensor Mapping Exercises

 
Channel Management Exercises - Deception Projection

 
 
Chapter 13: General Deception Planning Exercises
Exercise 1: Derailing a Trade Negotiation

 
Exercise 2: Protecting Drug Cartel Shipments

 
Exercise 3: Taking Down the Fordow Uranium Enrichment Facility

 
Exercise 4: Countering Israeli Efforts to Take Down Fordow

 
Exercise 5: Supporting a NEO Evacuation

 
Exercise 6: Disrupting Boko Haram Operations

 
 
Chapter 14: Military Deception Planning Exercises
MILDEC CONOP Example: Operation Bulldozer

 
Exercise 1: Operation Lights Out

 
Exercise 2: Operation Timber Float

 
Exercise 3: Operation Closing Time

 
 
Chapter 15: Deception Detection Exercises
Exercise 1 - The Valley of Doubt

 
Exercise 2 - The YUTA Ghost

 
 
Bibliography
 
Index

“The chapters on the exercises are a treasure chest of material to work with, covering a whole array of scenarios. . . . I think virtually every page and topic could spark robust and spirited classroom discussion starting with the text title itself.”

Ronald W. Vardy
University of Houston

“Most students have very little or no background [in this subject area], so Clark’s work is great to introduce students to intelligence and the analytical disciplines . . . a really excellent book that fills a gaping hole in the public literature and is of genuinely great value to both students and practitioners.”

Carl A. Wege, Professor Emeritus
College of Coastal Georgia
Key features
KEY FEATURES:
  • New channels for deception, such as social media, are explored to show readers how to conduct and detect deception activities through information technology.
  • Multichannel deception across the political, military, economic, social, infrastructure, and information domains provides readers with insight into the variety of ways deception can be used as an instrument for gaining advantage in conflict.
  • Contemporary and historical cases simulate real-world raw intelligence and provide readers with opportunities to use theory to create a successful deception operation.
  • A series of practical exercises encourages students to think critically about each situation. The exercises have several possible answers, and conflicting raw material is designed to lead readers to different answers depending on how the reader evaluates the material.
  • Individual and team assignments offer instructors the flexibility to proceed through the exercises in any order and assign exercises based on what works best for the classroom setup.

Sage College Publishing

You can purchase or sample this product on our Sage College Publishing site:

Go To College Site

This title is also available on SAGE Knowledge, the ultimate social sciences online library. If your library doesn’t have access, ask your librarian to start a trial.