From Citizendium, the Citizens' Compendium
- See also changes related to Deception, or pages that link to Deception or to this page or whose text .
- Information operations : The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security.
- Barium meal (intelligence) : Add brief definition or description
- False flag : In a variety of situations ranging from clandestine human-source intelligence to fraud to counterintelligence to false flag interrogation techniques, a manipulative technique where the manipulator leads others to believe he is the representative of a group they either admire or fear, in order to secure a benefit for his own cause, symbolically represented by a national flag
- Deceptive decoy : Within the broad context of electronic warfare, which includes both electromagnetic and acoustic sensing, a device, independently launched from a target or escort, which interferes with enemy tracking or final weapons guidance
- Double agent : Minimally, an human intelligence source that while claiming to spy for a hostile service, often after being caught trying to spy for it, now is under the control of the organization that caught him; many variants including "triple agent" and even more levels of deception
- Sacrificial decoy : Using electronic warfare techniques, a (usually) mobile transmitting device that will lure an enemy weapon to attack it rather than the real platform it is protecting
Historical and archetypes
- Richard Meinertzhagen : Add brief definition or description
- Double-Cross system : A World War II British system that is believed to have captured all Nazi spies, and either turned them into double agents, imprisoned, or executed them. This was part of the overall strategic deception plan.
- London Controlling Section : An extremely secret British staff organization, in World War II, in charge of strategic deception, principally to convince the Nazis that the main invasion of Europe would come at any of a variety of places other than Normandy; U.S. counterpart was Joint Security Control
- Plan BODYGUARD : The main Allied strategic deception plan to convince the Nazi military that the main invasion of the continent of Europe would take place at any of a number of places other than Normandy; formerly Plan JAEL; directed by the London Controlling Section
- Operation MINCEMEAT : Code name for a WWII British deception operation, in which a corpse was made up to appear to be that of a military staff officer, and let wash ashore in Spain where German intelligence was likely to get copies of the documents he carried; they indicated an invasion of Sardinia was planned rather than the actual invasion of Sicily
- Operation FORTITUDE NORTH : Add brief definition or description
- Operation FORTITUDE SOUTH : Add brief definition or description
- Newspeak : A fictional variant of the English language, from George Orwell's dystopian novel Nineteen Eighty-Four.
- Case Green : The Nazi invasion of Czechoslovakia, which they knew they did not have the troops to carry out, and from which would have withdrawn in the face of resistance
- Gleiwitz radio station attack : A faked Nazi raid on their own radio station at Gleiwitz, with SS deception troops and bodies (of concentration camp prisoners) in Polish uniform, to give a casus belli for Case White, the invasion of Poland
- Operation NORTH POLE : Add brief definition or description
Soviet & Russian
- Maskirovka : A very broad Soviet/Russian military theoretical concept, encompassing what the West regards as camouflage, or deception, concealment and counterintelligence, but going to a conscious plan of convincing the opponent to believe what one wants him to believe
- Gulf war amphibious deception : Operations by U.S. Navy SEALs on potential invasion beaches, and by a large United States Marine Corps force afloat, to threaten amphibious warfare against the Kuwait coast and pin Iraqi defenders to it
- We Know All interrogation techniques : Methods of psychological interrogation, which may be coercive or noncoercive, that establish a state of futility in the prisoner, convincing him that there is no point in withholding information
- Establish Your Identity interrogation techniques : Methods of interrogation, applied with various levels of psychological pressure, which induce a prisoner to reveal true information about himself, to convince the interrogator he is not a person for whom the captors plan a very bad fate
- File and Dossier interrogation techniques : A technique that involves using voluminous documentation, not always all visible to the prisoner, to give the impression that the questioner knows all; it differs from We Know All interrogation techniques that rely on verbal convincing that the questioner is omniscient and resistance is futile
- Befuddled Interrogator interrogation techniques : Having some relationship to Pride and Ego Up interrogation techniques, this method has an interrogator feign incompetence, in order that the prisoner is induced to boast and reveal information
- False flag interrogation techniques : Interrogators' representing their nationality or affiliation ("flag") as other than it is, variously for the noncoercive method of convincing the subject of shared interests, or for the coercive threat of the prisoner being at the mercy of an especially dreaded foe
- Mutt and Jeff interrogation techniques : Interrogation techniques using varying degrees of psychological pressure applied by a pair of interrogators, one playing a sympathetic and the other a hostile persona to the subject, alternating between entreaties and threats; often called "good cop-bad cop"
- Counterintelligence : Countermeasures to foreign intelligence organizations collecting intelligence against one's own side.
- Phishing : Use of online social engineering methods in order to persuade a victim to part with personal details such as online banking logins, in order to perpetrate fraud.
- Social engineering : Subverting a security system by deceiving its users.
- Trojan (computers) : In computer security, a program that a user is induced to run deliberately for some apparently desirable function, but actually is malware that performs some damaging action, perhaps hidden from the user