| Foreword | p. ix |
| Preface | p. xiii |
| Acknowledgments | p. xiv |
| Deception and the Need for Counterdeception | p. 1 |
| The Changing Role of Deception in National Security | p. 2 |
| Basic Terminology | p. 5 |
| Perspectives and Applications of Deception | p. 8 |
| Levels of Effects | p. 8 |
| Domains of Implementation | p. 8 |
| The Operational-Implementation Framework | p. 9 |
| The Development of Deception Theory and Literature | p. 10 |
| Book Overview | p. 12 |
| Annotated Bibliography of Principal Deception Texts | p. 12 |
| Endnotes | p. 14 |
| Introduction to Deception Principles | p. 17 |
| Introduction | p. 17 |
| The History of Deception Analysis | p. 18 |
| Conceptual Models and Theories of Deception | p. 20 |
| Barton Whaley | p. 20 |
| Donald Daniel and Katherine Herbig | p. 23 |
| Barton Whaley and J. Bowyer Bell | p. 25 |
| Michael Handel | p. 29 |
| Scott Gerwehr and Russell Glenn | p. 31 |
| Principles and Maxims of Deception | p. 33 |
| R.V. Jones | p. 33 |
| The Mathtech Deception Research Program | p. 34 |
| Haswell, Dewar, and Latimer | p. 36 |
| The View from Science | p. 38 |
| The View from Magic | p. 41 |
| Searching for Common Themes | p. 48 |
| Fundamental Principles of Deception: Truth, Denial, Deceit, and Misdirection | p. 58 |
| Truth | p. 59 |
| Denial | p. 60 |
| Deceit | p. 62 |
| Misdirection | p. 63 |
| Summary | p. 66 |
| Endnotes | p. 66 |
| The Cognitive Aspects of Deception: Why Does Deception Work? | p. 71 |
| Biases Relevant to Deception | p. 71 |
| The Influence of Cultural Biases on Deception | p. 72 |
| The Influence of Personal Biases on Deception | p. 73 |
| Organizational Biases and Deception | p. 74 |
| Cognitive Biases and Deception | p. 76 |
| The Impact of Cognitive Biases on the Deception Story | p. 88 |
| Cognitive Bias and Principles of Deception | p. 98 |
| Truth: The Source of Expectations, Preconceptions, and Beliefs | p. 100 |
| Denial: Out of Sight, Out of Mind | p. 102 |
| Deceit: Reinforcing the Biases | p. 103 |
| Misdirection: Diverting Attention and Reducing Suspicion | p. 105 |
| Summary | p. 106 |
| Endnotes | p. 107 |
| Technical Methods of Deception | p. 113 |
| Taxonomy of Technical Methods | p. 113 |
| Technical Sensor Camouflage, Concealment, and Deception | p. 115 |
| Tactical and Operational Sensory Deception | p. 115 |
| Strategic Sensory Deception | p. 116 |
| Signal and Information Systems Denial and Deception | p. 120 |
| Electronic Warfare | p. 121 |
| Signals Intelligence | p. 121 |
| Information Operation (IO) | p. 122 |
| Human Deception Channels | p. 127 |
| The Use of HUMINT Channels for Deception | p. 129 |
| Coordinated Technical Deception Methods | p. 132 |
| Coordinating Stratagem | p. 133 |
| Deception Timing and Surprise | p. 133 |
| Deception Strategy | p. 136 |
| Summary | p. 138 |
| Endnotes | p. 138 |
| Principles of Counterdeception | p. 143 |
| What Is Counterdeceptlon? | p. 143 |
| The Search for Ways to Counter Deception | p. 145 |
| Early Pioneers [6]: "Is there, then, no way by which the target of stratagem can untangle the web of deceit?" | p. 145 |
| The Theoretical Work of the 1980s | p. 150 |
| Current Directions | p. 157 |
| Searching for Common Themes | p. 167 |
| A Holistic Approach to Counterdeception | p. 167 |
| Counterdeception Themes and the Deception Cycle | p. 173 |
| Proposed Principles of Counterdeception | p. 175 |
| Know Yourself | p. 175 |
| Know Your Adversary | p. 177 |
| Know Your Situation | p. 178 |
| Know Your Channels | p. 179 |
| Summary | p. 180 |
| Endnotes | p. 181 |
| Nontechnical Approaches to Counterdeception | p. 185 |
| The Vulnerable Mind and the Vulnerable Organization | p. 185 |
| The Vulnerable Mind | p. 186 |
| The Vulnerable Organization | p. 189 |
| Deception-Resistant Humans and Organizations: The Prepared Mind and the Prepared Organization | p. 193 |
| Building and Maintaining the Prepared Mind | p. 194 |
| Building the Prepared Organization | p. 214 |
| Summary | p. 228 |
| Endnotes | p. 229 |
| Technical Methods of Counterdeception | p. 237 |
| The Counterdeception Elements of Detection, Discovery, and Deterrence | p. 238 |
| Fundamental Counterdeception Technical Methods | p. 244 |
| Counterdeception Planning and Collection Strategies | p. 247 |
| Counterdeception Information Processing | p. 249 |
| Counterdeception Analysis, Decision Support, and Production | p. 252 |
| Deception Warning | p. 253 |
| Considering Deception in Alternatives Analysis | p. 254 |
| Deception Analytic Flow | p. 256 |
| Summary | p. 272 |
| Endnotes | p. 273 |
| Counterdeception Architectures and Technologies | p. 277 |
| Architecture Considerations | p. 278 |
| Performance Measures | p. 279 |
| Effectiveness Measures | p. 280 |
| Operational Architecture: Methodology and Workflow of Counterdeception | p. 281 |
| Individual Analyst's Methodologies | p. 281 |
| Intelligence Team Workflow | p. 284 |
| Intelligence Team Use Case | p. 287 |
| Operational Architecture: Tools of Counterdeception | p. 288 |
| Automated Processing Filters and Knowledge Bases | p. 291 |
| Computational Analytic Support Tools | p. 292 |
| An Analytic Tool Workflow | p. 293 |
| System Architecture to Support Counterdeception | p. 300 |
| Summary | p. 303 |
| Endnotes | p. 305 |
| Speculations About the Future of Deception and Counterdeception | p. 309 |
| The Future, Changing Factors, and Implications for Deception | p. 309 |
| Global Information Flows and Mass Media | p. 314 |
| Deception and Counterdeception Technologies | p. 315 |
| Summary | p. 319 |
| Endnotes | p. 319 |
| About the Authors | p. 323 |
| Index | p. 325 |
| Table of Contents provided by Ingram. All Rights Reserved. |