Deception : Counterdeception and Counterintelligence

個数:
電子版価格
¥12,045
  • 電子版あり

Deception : Counterdeception and Counterintelligence

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 312 p.
  • 言語 ENG
  • 商品コード 9781506375236
  • DDC分類 355.3432

Full Description

"The chapters on the exercises are a treasure chest of material to work with, covering a whole array of scenarios. . . . I think virtually every page and topic could spark robust and spirited classroom discussion starting with the text title itself."

—Ronald W. Vardy, University of Houston

"Most students have very little or no background [in this subject area], so Clark's work is great to introduce students to intelligence and the analytical disciplines . . . a really excellent book that fills a gaping hole in the public literature and is of genuinely great value to both students and practitioners."

—Carl A. Wege, Professor Emeritus, College of Coastal Georgia

Bridging the divide between theory and practice, Deception: Counterdeception and Counterintelligence provides a thorough overview of the principles of deception and its uses in intelligence operations. This masterful guide focuses on practical training in deception for both operational planners and intelligence analysts using a case-based approach. Authors Robert M. Clark and William L. Mitchell draw from years of professional experience to offer a fresh approach to the roles played by information technologies such as social media. By reading and working through the exercises in this text, operations planners will learn how to build and conduct a deception campaign, and intelligence analysts will develop the ability to recognize deception and support deception campaigns. 


Key Features



New channels for deception, such as social media, are explored to show readers how to conduct and detect deception activities through information technology.
Multichannel deception across the political, military, economic, social, infrastructure, and information domains provides readers with insight into the variety of ways deception can be used as an instrument for gaining advantage in conflict.
Contemporary and historical cases simulate real-world raw intelligence and provide readers with opportunities to use theory to create a successful deception operation.
A series of practical exercises encourages students to think critically about each situation. The exercises have several possible answers, and conflicting raw material is designed to lead readers to different answers depending on how the reader evaluates the material.
Individual and team assignments offer instructors the flexibility to proceed through the exercises in any order and assign exercises based on what works best for the classroom setup.

Contents

List of Tables, Figures, and Boxes
Preface
About the Authors
PART I: FUNDAMENTALS OF DECEPTION AND COUNTERDECEPTION
Chatper 1: Deception: The Basics
Why Deception?
Definitions
The Deception Target
Basic Principles
Roles of Operations and Intelligence
Chapter 2: The Methodology
The OODA Loop
OODA Loop Perspectives
Planning Deception: The Inverse OODA Loop
Executing Deception: The Forward OODA Loop
Chapter 3: The Outcome Scenario
Outcome Scenarios - The PMESII View
Political
Military
Economic
Social
Information
Infrastructure
Chapter 4: The Target
Individual Decision Modeling
Collective Decision Modeling
Cultural Modeling
Chapter 5: The Story
What Makes a Good Story?
Characteristics of a Good Deception Story
Plausibility
Reinforcement
Influence Nets
Chapter 6: The Channels
Understanding the Channels
Sensor Mapping
Channel Characterization
Channel Exploitation
Chapter 7: The Traditional Intelligence Channels
OSINT
COMINT
HUMINT
IMINT
Technical Collection
Chapter 8: The Cyberspace Channel
Deception in Cyberspace
Web-Based Deception
Web-Based CNE/CNA
Standalone Computers and Intranets
Cyber Deception
Chapter 9: Planning and Executing Deception
Checking the Decision/Action Model: Red Team Analysis
Checking for Unfavorable Outcomes: Alternative Analysis
Deconfliction
Overview of the Execution Process
Achieving Surprise
Operating Inside the Opponent's OODA Loop
Attending to Details and Timing
Managing the Developing Scenario
Chapter 10: Preparing to Counter Deception
Assessing Vulnerability
Assessing the Threat
Chapter 11: Identifying Deception
Deception Detection via Channel Management
Evaluating the Source
Evaluating the Channel
Evaluating the Evidence
PART II: EXERCISES
Chapter 12: Sensor Mapping and Channel Tracking Exercises
Sensor Mapping Exercises
Channel Management Exercises - Deception Projection
Chapter 13: General Deception Planning Exercises
Exercise 1: Derailing a Trade Negotiation
Exercise 2: Protecting Drug Cartel Shipments
Exercise 3: Taking Down the Fordow Uranium Enrichment Facility
Exercise 4: Countering Israeli Efforts to Take Down Fordow
Exercise 5: Supporting a NEO Evacuation
Exercise 6: Disrupting Boko Haram Operations
Chapter 14: Military Deception Planning Exercises
MILDEC CONOP Example: Operation Bulldozer
Exercise 1: Operation Lights Out
Exercise 2: Operation Timber Float
Exercise 3: Operation Closing Time
Chapter 15: Deception Detection Exercises
Exercise 1 - The Valley of Doubt
Exercise 2 - The YUTA Ghost
Bibliography
Index

最近チェックした商品