The Strategy of Deception


Book Description

Points out the methods used by Communist parties to capture power.




Strategy of Deception


Book Description

Written with his characteristic flair, Virillo's latest book is a trenchant denunciation of the Kosovo war in which he successfully unites theory with a riveting study of the conflict. Tearing aside the veil of hypocrisy in which the USA and its allies wrapped the war, Virillo demonstrates that the nature of the bombing was set by strategic rather than ethical considerations. Beneath the humanitarian rhetoric, Virillo sees a sinister innovation in the methods of waging war: territorial space is being replaced by orbital space in which a system of global telesurveillance is linked to the destructive power of bombers and missiles. Governments, the military and the media are becoming part of a seamless and self-justifying process linked by new information and arms technologies. Passionate and political, Strategy of Deception is a vital examination not only of the war in Yugoslavia but also what Virillo calls our "fin-de-sicle infantilization" in which the reality of battle is reduced to flickering images on a screen.




Strategic Denial and Deception


Book Description

Does foreign denial and deception threaten the interests of contemporary democracies? Strategic denial and deception (D&D) has emerged as a little understood challenge to security in general, and the intelligence community in particular. To gain advantages, adversaries seek to deny critical information about their own activities and capabilities, and to decieve foreign governments. In recent years, Iraq, India, Somalia, Colombian criminal groups, and terrorists, for example, have all used D&D successfully against the United States. Denial and deception is a low cost, potentially high impact to level political, military, and economic playing fields, particularly against strong opponents. Concerns about the threat of denial and deception have waxed and waned since the end of World War II. Sometimes it shaped assessments about the former Soviet Union, for example. At other times, such as the end of the Cold War, such threats appear to fade into insignificance. This volume considers whether globalization, proliferating communication technologies, and the dissemination of vast amounts of information make effective foreign denial and deception more or less likely. Contributors also examine whether more information and data sources make policymakers better informed or simply create confusion. Drawing on lessons learned from historical experiences, the authors propose ways to minimize future challenges. Chapters include "Elements of Strategic Denial and Deception," by Abram Shulsky; "Conditions Making for Success and Failure of D&D," by Barton Whaley; "Conditions Making for Success and Failure of D&D," by M.R.D. Foot; "Conditions Making for Success and Failure of D&D," by J. Bowyer Bell; "Arms Control," by Lynn M. Hansen; and "Prescription: Detecting Deception-Practice, Practitioners, and Theory," by Barton Whaley and Jeffrey Busby. While there are previous books about celebrated D&D cases, from Troy to Pearl Harbor and D-Day, no work attempts to assess how these instruments of denial and deception can be used in the early twenty-first century. This book will be of interest to students, security planners, and general readers interested in political science, security, and foreign and military policy.




Practise to Deceive


Book Description

Written by the undisputed dean of U.S. denial and deception experts, Practise to Deceive is the most in-depth look at deception as a military strategy. Barton Whaley knew the history of denial and deception across time, disciplines, and culture. He was the foremost authority on the intricacies of denial and deception strategy and tactics. For Whaley, deception was a mind-game, requiring imagination, deep critical thought, a profound understanding of the enemy as well as one's self (a variation of Sun Tzu), and patience and fortitude. This book presents 88 vividly descriptive case studies to serve as a handbook for intelligence and military professionals. In Whaley's analysis, variations in guilefulness between opposing individuals or groups can be crucial in deciding who achieves victory in combat.




The Art and Science of Military Deception


Book Description

It is said that deception among people in a civilized society is something to be loathed even though it seems to be part of human nature; but deception in war is a virtue. Properly designed and executed, stratagems reduce the horrific costs of war. This book is a comprehensive collection of classic articles on deception, hand-picked and expertly introduced by well-known experts on military deception. The purpose of this book is to set in motion a renaissance for using deception as an instrument of statecraft. The various sections are designed to cumulatively provide sufficient breadth and depth on the subject to satisfy both the novice as well as the expert. Packed with expert commentary, interesting background information, and original readings, this book provides the reader with sufficient knowledge to pursue General Eisenhower’s vision for the proper role of deception in support of the national interest.




Military Deception and Strategic Surprise


Book Description

First Published in 2004. Routledge is an imprint of Taylor & Francis, an informa company.




New Lies for Old


Book Description

Very rarely disclosures of information from behind the Iron Curtain throw new light on the roots of communist thought and action and challenge accepted notions on the operation of the communist system. We believe that this book does both these things. It is nothing if not controversial. It rejects conventional views on subjects ranging from Khrushchev's overthrow to Tito's revisionism, from Dubcek's liberalism to Ceausescu's independence, and from the dissident movement to the Sino-Soviet split. The author's analysis has many obvious implications for Western policy. It will not be readily accepted by those who have for long been committed to opposing points of view. But we believe that the debates it is likely to provoke will lead to a deeper understanding of the nature of the threat from international communism and, perhaps, to a firmer determination to resist it.




The Military Guide to Disarming Deception


Book Description

Time Is Running Out--Are You Battle Ready? Military leaders throughout history have used the strategy of deception to win wars--and Satan is a master strategist. He and his forces have enveloped the world in an unprecedented age of mass media disinformation, government psychological operations, social media censorship and other sophisticated mind-control techniques. In this eye-opening book, military and religious expert Colonel David J. Giammona and Pulitzer Prize-nominated journalist Troy Anderson equip you to recognize--and resist--the propaganda and deceptive ideologies infiltrating the Church and society. The last days are coming. And if we don't know how to fight the enemy's pervasive lies, we will be swept away by them. Here are the powerful military and spiritual tactics you need to stand against the devil's rampant deceptions and be a light to a world in darkness. "This book will prepare you to recognize and counter deception not only in politics, religion, media and science, but especially in yourself."--HUGH ROSS, astrophysicist; founder and president, Reasons to Believe "A life-changing, hard-hitting and deeply insightful book. It's the training manual for the coming revival and revolution of the Church."--DR. ROBERT JEFFRESS, pastor; professor; television host, Pathway to Victory




Deception in War


Book Description

From the Trojan Horse to Gulf War subterfuge, this far-reaching military history examines the importance and ingenuity of wartime deception campaigns. The art of military deception is as old as the art of war. This fascinating account of the practice draws on conflicts from around the world and across millennia. The examples stretch from the very beginnings of recorded military history—Pharaoh Ramses II's campaign against the Hittites in 1294 B.C.—to modern times, when technology has placed a stunning array of devices into the arsenals of military commanders. Military historians often underestimate the importance of deception in warfare. This book is the first to fully describe its value. Jon Latimer demonstrates how simple tricks have been devastatingly effective. He also explores how technology has increased the range and subtlety of what is possible—including bogus radio traffic, virtual images, even false smells. Deception in War includes examples from land, sea, and air to show how great commanders have always had, as Winston Churchill put it, that indispensable “element of legerdemain, an original and sinister touch, which leaves the enemy puzzled as well as beaten.”




The Art of Deception


Book Description

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.