List of Tables, Figures, and Boxes Preface About the Authors PART I: FUNDAMENTALS OF DECEPTION AND COUNTERDECEPTION Chatper 1: Deception: The Basics Why Deception? Definitions The Deception Target Basic Principles Roles of Operations and Intelligence Chapter 2: The Methodology The OODA Loop OODA Loop Perspectives Planning Deception: The Inverse OODA Loop Executing Deception: The Forward OODA Loop Chapter 3: The Outcome Scenario Outcome Scenarios - The PMESII View Political Military Economic Social Information Infrastructure Chapter 4: The Target Individual Decision Modeling Collective Decision Modeling Cultural Modeling Chapter 5: The Story What Makes a Good Story? Characteristics of a Good Deception Story Plausibility Reinforcement Influence Nets Chapter 6: The Channels Understanding the Channels Sensor Mapping Channel Characterization Channel Exploitation Chapter 7: The Traditional Intelligence Channels OSINT COMINT HUMINT IMINT Technical Collection Chapter 8: The Cyberspace Channel Deception in Cyberspace Web-Based Deception Web-Based CNE/CNA Standalone Computers and Intranets Cyber Deception Chapter 9: Planning and Executing Deception Checking the Decision/Action Model: Red Team Analysis Checking for Unfavorable Outcomes: Alternative Analysis Deconfliction Overview of the Execution Process Achieving Surprise Operating Inside the Opponent's OODA Loop Attending to Details and Timing Managing the Developing Scenario Chapter 10: Preparing to Counter Deception Assessing Vulnerability Assessing the Threat Chapter 11: Identifying Deception Deception Detection via Channel Management Evaluating the Source Evaluating the Channel Evaluating the Evidence PART II: EXERCISES Chapter 12: Sensor Mapping and Channel Tracking Exercises Sensor Mapping Exercises Channel Management Exercises - Deception Projection Chapter 13: General Deception Planning Exercises Exercise 1: Derailing a Trade Negotiation Exercise 2: Protecting Drug Cartel Shipments Exercise 3: Taking Down the Fordow Uranium Enrichment Facility Exercise 4: Countering Israeli Efforts to Take Down Fordow Exercise 5: Supporting a NEO Evacuation Exercise 6: Disrupting Boko Haram Operations Chapter 14: Military Deception Planning Exercises MILDEC CONOP Example: Operation Bulldozer Exercise 1: Operation Lights Out Exercise 2: Operation Timber Float Exercise 3: Operation Closing Time Chapter 15: Deception Detection Exercises Exercise 1 - The Valley of Doubt Exercise 2 - The YUTA Ghost Bibliography Index.
Deception : Counterdeception and Counterintelligence