“The chapters on the exercises are a treasure chest of material to work with, covering a whole array of scenarios. . . . I think virtually every page and topic could spark robust and spirited classroom discussion starting with the text title itself.”
—Ronald W. Vardy, University of Houston
“Most students have very little or no background [in this subject area], so Clark’s work is great to introduce students to intelligence and the analytical disciplines . . . a really excellent book that fills a gaping hole in the public literature and is of genuinely great value to both students and practitioners.”
—Carl A. Wege, Professor Emeritus, College of Coastal Georgia
Bridging the divide between theory and practice, Deception: Counterdeception and Counterintelligence provides a thorough overview of the principles of deception and its uses in intelligence operations. This masterful guide focuses on practical training in deception for both operational planners and intelligence analysts using a case-based approach. Authors Robert M. Clark and William L. Mitchell draw from years of professional experience to offer a fresh approach to the roles played by information technologies such as social media. By reading and working through the exercises in this text, operations planners will learn how to build and conduct a deception campaign, and intelligence analysts will develop the ability to recognize deception and support deception campaigns.
- New channels for deception, such as social media, are explored to show readers how to conduct and detect deception activities through information technology.
- Multichannel deception across the political, military, economic, social, infrastructure, and information domains provides readers with insight into the variety of ways deception can be used as an instrument for gaining advantage in conflict.
- Contemporary and historical cases simulate real-world raw intelligence and provide readers with opportunities to use theory to create a successful deception operation.
- A series of practical exercises encourages students to think critically about each situation. The exercises have several possible answers, and conflicting raw material is designed to lead readers to different answers depending on how the reader evaluates the material.
- Individual and team assignments offer instructors the flexibility to proceed through the exercises in any order and assign exercises based on what works best for the classroom setup.
|The Deception Target|
|Roles of Operations and Intelligence|
|The OODA Loop|
|OODA Loop Perspectives|
|Planning Deception: The Inverse OODA Loop|
|Executing Deception: The Forward OODA Loop|
|Outcome Scenarios - The PMESII View|
|Individual Decision Modeling|
|Collective Decision Modeling|
|What Makes a Good Story?|
|Characteristics of a Good Deception Story|
|Understanding the Channels|
|Deception in Cyberspace|
|Standalone Computers and Intranets|
|Checking the Decision/Action Model: Red Team Analysis|
|Checking for Unfavorable Outcomes: Alternative Analysis|
|Overview of the Execution Process|
|Operating Inside the Opponent's OODA Loop|
|Attending to Details and Timing|
|Managing the Developing Scenario|
|Assessing the Threat|
|Deception Detection via Channel Management|
|Evaluating the Source|
|Evaluating the Channel|
|Evaluating the Evidence|
|Sensor Mapping Exercises|
|Channel Management Exercises - Deception Projection|
|Exercise 1: Derailing a Trade Negotiation|
|Exercise 2: Protecting Drug Cartel Shipments|
|Exercise 3: Taking Down the Fordow Uranium Enrichment Facility|
|Exercise 4: Countering Israeli Efforts to Take Down Fordow|
|Exercise 5: Supporting a NEO Evacuation|
|Exercise 6: Disrupting Boko Haram Operations|
|MILDEC CONOP Example: Operation Bulldozer|
|Exercise 1: Operation Lights Out|
|Exercise 2: Operation Timber Float|
|Exercise 3: Operation Closing Time|
|Exercise 1 - The Valley of Doubt|
|Exercise 2 - The YUTA Ghost|