ebook img

DTIC ADA525610: Operational Deception in the Information Age PDF

8 Pages·0.38 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview DTIC ADA525610: Operational Deception in the Information Age

Operational Deception 1stCombat Camera Squadron (Jeremy Lock) in the Information Age By M I L A N N. V E G O D eception is as old as warfare. It can cannot deceive a sophisticated enemy that has magnify strength for both attackers information superiority. Yet new information and defenders. It is among the least technologies offer both sides more, not fewer, expensive military activities in terms opportunities for deception. of forces and assets. Yet for all its proven value, The lack of peacetime interest is hard to rem- it generates little enthusiasm in the U.S. mili- edy once war begins. Deception skills must then tary. No operational deception plan was pre- be learned by trial and error and at great cost. Yet pared for the Kosovo conflict of 1999, nor has they can facilitate the element of surprise, which one been evident for operations in Afghanistan. multiplies chances for a quick and conclusive suc- A popular view in today’s information era is that cess while minimizing personnel and material deception is outdated: a stronger force need not losses. Deception can cause an enemy to waste as- deceive an enemy to win while a weaker party sets defending unimportant areas, disperse its forces, or reduce its readiness. Any strength, no matter how overwhelming, risks stagnation or de- cline if it is not accompanied by stratagems and Milan N. Vego is professor of operations in the Joint Military Operations deceptions. Even the strongest military should Department at the Naval War College and the author of Naval Strategy systematically undertake them. and Operations in Narrow Seas. 60 JFQ / Spring 2002 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2002 2. REPORT TYPE 00-00-2002 to 00-00-2002 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Operational Deception in the Information Age 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION National Defense University,Institute for National Strategic Studies,260 REPORT NUMBER Fifth Avenue SW Bg 64 Fort Lesley J. McNair,Washington,DC,20319 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF ABSTRACT OF PAGES RESPONSIBLE PERSON a. REPORT b. ABSTRACT c. THIS PAGE Same as 7 unclassified unclassified unclassified Report (SAR) Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Vego Why Deceive? and executed on the national or alliance/coali- Designed to mislead by distorting, manipu- tion level and is conducted both in peace and lating, or falsifying information available to it, war. It could be designed to hide military or eco- deception can induce an enemy to do something nomic weaknesses, exaggerate strength in peace- contrary to its interests. Joint Pub 3-58, Joint Doc- time, or conceal preparations to open hostilities. trine for Military Deception, defines it as “those ac- It can trick an enemy into opening a new front or tions executed to deliberately mislead adversary initiating a new campaign. It encompasses meas- military decisionmakers as to friendly military ures from political, diplomatic, and informational capabilities, intentions, and operations, thereby to the threat or use of force. causing the adversary to take specific actions that One of the most successful strategic decep- will contribute to the accomplishment of the tions of World War II was Allied Plan Bodyguard, friendly mission.” It is also understood to in- adopted in January 1944 to mislead Hitler and clude planned measures for conveying true or the German Supreme Command about the place false information pertaining to one’s strategic and time of the invasion of Normandy. This de- plans, strength, dispositions, operations, or tac- ception campaign contained several military and tics to cause an enemy to reach false estimates diplomatic plans: Fortitude to move the threat of and act on them. the Allied landing from the French Atlantic coast Deception can be designed to delude an to northern Norway; Zeppelin to prevent the enemy about the time and place of an attack. The Germans from moving timely reinforcements Germans gained operational surprise through de- from the eastern Mediterranean to northern ception in their attack through the Ardennes in France; Vendetta to tie German forces to south- May 1940 and again in December 1944. They ern France by presenting a plausible threat of an Allied attack in that area shortly after the Nor- deception can overload collection and analytical mandy landing; Copperhead to convince the Germans that there was no immediate threat of capabilities or block information invasion of northwestern France; and Ironside to simulate an attack against Bordeaux to commit achieved both strategic and operational surprise the Germans to southwestern France. In addi- in the invasion of Russia in June 1941. Likewise, tion, the Allies executed deceptions Graffham the Japanese used deception to gain strategic, op- and Royal Flush to support Plan Bodyguard by erational, and tactical surprise in attacking Pearl exploiting German fears that Sweden, Spain, and Harbor in December 1941. Deception can create Turkey might abandon their nominal neutrality an illusion of strength where weakness exists or and cooperate with the Allies. weakness where there is strength. It can induce Theater-strategic deception is a subset of na- an enemy to focus forces in the wrong place and tional or coalition/alliance strategic deception thereby violate the principle of concentration. It aimed at misleading enemy leadership and the- can also cause it to concentrate forces at the ater commanders on the objectives, place, and wrong time against nonexistent objectives. time of an initial major operation in a new cam- In addition, deception can mislead an paign. It is usually conducted in two or more the- enemy about friendly capabilities, type of forces, aters of operation or a major part of the theater of or location of centers of gravity. Moreover, it can war. Deception plan Fortitude South was aimed at overload collection and analytical capabilities or convincing the Germans to keep their Fifteenth block information, thus denying an accurate and Army deployed in the Pas de Calais area both timely picture of the operational or strategic situ- prior to and after the Normandy landing. Creat- ation. Deception can introduce noise into the col- ing a large fictitious force deployed in southeast- lection and analysis of intelligence and weaken ern England helped accomplish this objective. the clarity of signals. It thus makes sense to use it The Allies convinced the Germans that the land- on any level of planning, if for no other purpose ings in Normandy were a diversion to force the than to insert continuous uncertainty into the Germans to commit their reserves before the minds of enemy commanders about the value of main landing at Pas de Calais 45 days later. the intelligence received. Once victimized, an In strict terms, operational deception pertains enemy will be suspicious of future information. to actions and measures to deceive an enemy as Deception, like surprise, should thus be consid- to time, place, and details of the planned major ered a vital part of one’s intelligence activity. operation conducted as a part of a campaign or Efforts differ in objective, area, duration, major joint or combined operation with a strate- forces, and assets. Strategic deception is planned gic objective. Such a deception is normally multi- service and can require multinational assets. It must target enemy commanders with the author- ity and assets to react in the desired manner; and Spring 2002 / JFQ 61 ■ OPERATIONAL DECEPTION it must arrive through enemy intelligence sys- Deception cannot succeed in wartime with- tems. Deception plans should be designed so an out developing theory and doctrine in peacetime. enemy will collect carefully planted information, Preparation of assets must likewise start in peace- some false, some true, which appears logical and time and be continuous. Preparedness is crucial causes decisionmakers to reach the desired con- because there must be time to develop the con- clusion. Planning, preparation, and execution of cepts and allow planners and implementers to operational deception is the paint the deception picture. Planners must know an enemy must not have responsibility of the joint how long a measure will take to affect the decep- force commanders and their tion target and for the target to react. the capability to observe and staffs. Because centralized Planners rely on intelligence to construct a evaluate the real situation command and control plausible story aimed at the fears of enemy com- works best, planning should manders and preconceptions of the opposing be directed through a single organization that forces and situation. The theater must be seen also directs implementation, seeing that all meas- through their eyes so the deception can be based ures are coordinated toward the common objec- on their concept of what friendly forces will do. tive. Deception plans should protect the opera- Intelligence continues to be used to identify the tional commander’s intent from hostile parts of an enemy collection and evaluation struc- intelligence-gathering sources and reinforce ex- ture the deception will target. After parts of the pectations and preconceptions about one’s own story are leaked, intelligence must assess their ef- forces and future actions. fect. Critical is predicting how the opposing com- Tactical deception is intended to mislead op- mander will react. Planners then use intelligence posing tactical commanders in terms of time, to adjust both the deception and operation. The place, and details of a tactical action. In planning process requires continuous feedback from the tar- the combined amphibious landing in Normandy, gets about what an enemy does or doesn’t know. Operation Neptune, the Allies prepared three Operational intelligence relies more on naval and four airborne diversions integrated human intelligence (HUMINT) and sophisticated with the overall Fortitude South deception plan. signals intelligence (SIGINT) than on other Efforts on all levels of war must be comple- sources in assessing enemy situations and inten- mentary; the success or failure of one affects the tions. Feeding certain signals to HUMINT and others. The main and subordinate deception SIGINT collectors prepares the deception story for plans should all accomplish their assigned objec- enemy consumption, while hiding the indicators tives for optimal success. A failure on the strategic of one’s own disposition and strength conceals level usually dooms all secondary plans. Yet tacti- one’s true intentions. cal or sometimes even operational plans can fail Success also requires understanding an enemy but still allow success if the strategic deception intelligence-gathering processes and decision cycle influences enemy strategic leadership. as well as the soundness of its operational and tac- tical doctrine. Because deception plans use hostile HUMINT and SIGINT intelligence collection systems, they must identify Operational deception is normally a joint their modes of collection, timeliness of reporting, and often a combined effort. Relatively large assets relative weight of data received through each are required. An enemy must be convinced that channel, and how that data enters the decision substantial multiservice forces are arrayed against cycle to ensure that proper information is provided it in the theater. The effort needed to realistically by appropriate means at the right time. simulate activities on that scale—corps, naval or Deception is applied through passive and ac- air fleets, or task forces—could discourage decep- tive methods. The passive mode is primarily tion efforts as could the fact that it is difficult to based on secrecy and camouflage—concealing conceal forces and their movements nowdays. one’s intentions and capabilities. Active decep- Operational commanders should not usu- tion normally involves a calculated attempt at ally dedicate any part of their forces solely to de- disclosing half-truths supported by appropriate ception. Plans that rely entirely on bluffing proofs, signals, or other material evidence. Enemy often fail. The optimal solution seems to be in- intelligence must discover planted evidence and volving real forces only temporarily or establish- become convinced of its authenticity and signifi- ing notional headquarters and forces or using cance. Active deception normally depends on the the real and notional forces in combination. success of passive deception. Therefore a key prerequisite is that an enemy Means and Ends must not have the capability to observe and evaluate the real situation. The larger the objective, the more diverse and complex the methods used. In tactical decep- tion, ruses or feints could be sufficient, while on 62 JFQ / Spring 2002 Vego Standing guard,Osan air base,Korea. Pinthong) Sarayuth Squadron ( mera Ca mbat Co 1st the operational level, both military and nonmili- through a mix of real and fictitious forces or by tary measures may be needed. Methods range inventing a completely notional order of battle from spreading rumors and feeding false informa- in a locale an enemy considers critical, to include tion to combat actions. On the highest level, bogus headquarters and forces, communications diplomatic, political, economic, and informa- networks and radio traffic, supply depots and tional instruments of national power are used to other logistic elements, water facilities, pipelines, achieve strategic deception. Information plants telephone and telegraph lines, and railroads and and controlled enemy agents are often employed. railheads. Dummy guns, tanks, trucks, and heavy Ruses, feints, demonstrations, and displays can tie engineering equipment can be concentrated, and down enemy forces in certain areas to ease resist- practice target ranges and tank maneuver areas ance in the main sector. can be built.Troops or naval and air forces can be The most common method of deception is moved into attacking positions under the pretext misrepresenting one’s intentions or capabilities of large-scale maneuvers. Operational security through operational secrecy or more elaborate ac- can be enhanced by denying information on the tive deception that diverts attention. This ap- true purposes of such movements even to proach was successful in the European theater in friendly forces. World War II because the Allies broke the German On the strategic level, it is difficult to deceive codes and played on Axis fears and preconcep- an enemy as to real strength at the outbreak of tions of Allied intentions. The key contribution hostilities because both sides have an accurate of intelligence was creating a false order of battle picture of the other’s overall strength. It becomes for the deception plan. Otherwise the Allies could easier as the war progresses. The Allies succeeded not have caused the Germans to react opera- in creating notional forces during preparation for tionally because no actual forces were available the Normandy landing and in many Mediter- for such purposes. ranean operations because the Germans had little Strength can be misrepresented by conceal- ability to obtain or confirm an accurate picture. ing the location and type of one’s forces, head- Excessive exaggeration of strength in individual quarters, and logistic elements. Such deception theaters, however, may tip an enemy off. could create either an exaggerated or reduced evaluation of friendly capabilities. The percep- tion of inflated strength can be reinforced Spring 2002 / JFQ 63 ■ OPERATIONAL DECEPTION Attackers can achieve surprise if their sectors timing. They should not be initiated except in ac- of main effort are concealed by carrying out mas- cordance with an approved plan. sive air strikes against secondary sectors, then sud- Psychological operations (PSYOP) can aid op- denly shifting them to forces deployed in front of erational deceptions even though their objectives the main sector. The successful German offensive are fundamentally at odds. PSYOP can promote in the west in May 1940 was due in large measure the acceptance of a deceptive message by com- to an elaborate deception plan. The Germans con- municating only what one wants an enemy to cealed their sector of main attack by employing hear, real or false, and then replacing it with their feared bombers and Stukas against targets in something else. Belgium and The Netherlands until almost the The growing power of computers and global moment of their operational penetration at Sedan. network connectivity has created an enormous ca- pacity to process and distribute information. That, Keeping Up Appearances in turn, has increased the effectiveness and diver- Deception measures can conceal one’s real sity of deception methods on all levels. The center of gravity. In a major operation (Trappen- growth in the volume of information could satu- jagd-Bustard Hunt) in May 1942, General Erich rate enemy processing and evaluation capabilities. von Manstein, commander of 11thArmy, used ex- It also drastically reduces the time the intelligence tensive measures to deceive his Soviet counterpart apparatus has to process, analyze, and disseminate regarding where his most capable forces were de- its findings. Since the deceiver can saturate the ployed. The German attack unexpectedly came target with useless data, a direct information at- from the south. Von Manstein recaptured the tack need not rely exclusively on enemy ability to Kerch Peninsula. The Crimean Front lost 176,000 perceive or interpret it. Such an attack can aim at men while only 120,000 escaped the trap. planting spurious information in a database, such Another ploy is creating the impression of as a false order of battle. The key is determining routine activities by conditioning an enemy to a what fictions are desired. The attacker can also use pattern. The Germans used this method in logic bombs to incapacitate the opposing informa- preparing operational redeployment of two battle tion system. These can lie dormant until activated cruisers and one heavy cruiser from Brest through by a date or random number and then damage the English Channel in the information system. actions must appear normal to February 1942 during Op- Another method is conventional attack eration Cerberus. They in- against an information system such as computer enemy intelligence agencies creased the intensity of network server farms or telephone switching fa- their radar jamming over cilities. The array of targets is enormous, and the time. The British became so acclimatized to the more an enemy relies on information technology jamming that they did not realize their radar had the greater its vulnerability. Hence the weaker become almost useless. side can also plan and execute deception because Secret channels are one of the most effective sophisticated technology is inherently vulnerable factors in any deception or cover plan. The chan- to even the most basic camouflage and conceal- nels must thus always be under the close control ment. Simple deceptions can be effective against of the officer responsible for theater deception. In some types of information attack while more ad- all physical deception, actions must appear nor- vanced methods are needed to counter sophisti- mal to enemy intelligence agencies, including cated efforts. radio intercept and monitoring, ground and air Plausibility, Security, and Coordination reconnaissance, and especially secret agents. Electronic manipulation and simulation are Deception is always a supporting plan; an highly effective. Manipulation involves altering operational plan should never depend on it ex- one’s own electronic order of battle or creating clusively. A deception plan introduces a risk to false levels of traffic or controlled security the basic plan. Operational commanders and breaches. Electronic manipulation contributes to their staffs should evaluate that risk during plan- security. Simulation, in contrast, paints a fic- ning, considering not only how the operation or tional order of battle or inaccurate location of a campaign achieves the operational or strategic genuine order. objective, but how deception fits into the overall Rumors can support the deception story, military, political, and diplomatic scheme. falsely indicating force movements or one’s When both a primary and alternate plan are strength in a locale. Rumors are usually rampant considered, they must be separated geographi- before a major operation or campaign. They must cally to increase plausibility and decrease suscep- be used with care since they can baffle friend and tibility to counterdeception. Allied strategic de- enemy alike; but their deliberate planting can ception plan Fortitude encompassed two theaters, create confusion over one’s cover objective and 64 JFQ / Spring 2002 Vego Counter-infiltration course of action. Plausibility helps preserve the exercise,Korea. integrity of the operation despite possible secu- rity breaches. Planners must ensure that each ele- ment of the scheme fits logically into the overall operational or strategic scenario. The deception story—often the best alternative course of action in the opposing commander’s estimate—should focus on enemy expectations, preconceptions, and fears. This is difficult on the operational level because of the sheer size of the forces and area involved. Plausibility depends on many factors. The enemy commander may not accept deception quickly; many signals might be required over time to convince him that his first impressions were wrong. He is more likely to accept a story that conforms to his preconceptions and biases. Moreover, the story must correspond with opera- tional and strategic realities. It is generally easier to maintain an existing belief than to change it. This makes it more criti- Young) cal to have a detailed and accurate knowledge of Navy (Stacy etdeneccehemnpiytqi oupneesr ,cs teaopnrtdiie opsn raso,rc eea dcotufitroeensn.s ,tT hdhooes cemt rtoihnstae ,te ftdfaeocc ttniicvoset, S. U. cause an enemy to change anything. Operations security (OPSEC) uses passive measures to conceal a deception and its elements. northern and western Europe. Likewise, the oper- It is the defensive side of operational deception. ational deception plan for the invasion of Sicily Generally, the larger the deception, the more in July 1943 involved the central and western complex its plan and the longer its duration. The Mediterranean. In contrast, the plan for the Nor- operational commander must thus balance time mandy landing encompassed only the sea and and space because the supporting plan must be coastal area from Pas de Calais in the north to maintained for weeks or months. The risk of dis- Brest in the south. covery grows with time and the consequences Time must be available not only for planning can be devastating. The Japanese experienced a but for evidence to be manufactured and received, compromised plan in their Operation MI, which processed, and evaluated led to the Battle of Midway, when American cryp- planners must ensure that each by the target and for a tographers decoded the real purpose of their feint hostile operational com- toward the Aleutians. element of the scheme fits mander to make a deci- False information, selected leaks, half-truths, logically into the overall opera- sion and take the desired and misinterpretation help keep one’s plan se- actions, especially when cure. The greatest problem for an enemy is gener- tional or strategic scenario a deception envisages ally deliberate leaks that might be insignificant enemy forces changing individually but whose collective importance de- location. Measures that cannot be concealed velops over time. Intentional and sometimes un- should be sequenced to generate an estimate of intentional breaches of one’s security can increase friendly capabilities and intentions that coincides ambiguity for an enemy. A dozen German secu- with those in the deception plan. Finally, timing rity breaches revealed Hitler’s intentions in the of the deception story should allow for desired ac- weeks preceding the invasion of Soviet Russia in tions to be initiated, transmitted to hostile intelli- June 1941. Yet Stalin remained convinced that gence, and analyzed by it before an enemy reacts. the massive German deployment in the east was Plausibility, security, and coordination are a cover for the invasion of Britain. the key components. Plausibility is the most im- A way to enhance OPSEC is to limit the per- portant. A plan cannot succeed if the target does sonnel involved by creating a small, specialized not believe the story and consider it a logical planning section within a large headquarters and combining that with centralized direction and ex- ecution. Field Marshal Erwin Rommel, com- mander of Africa Corps and Axis forces in North Spring 2002 / JFQ 65 ■ OPERATIONAL DECEPTION Africa, knew the need for OPSEC. He informed plan never stands alone but supports the cam- neither his staff nor the supreme command of his paign or major operation plan, therefore the intentions. He especially distrusted the Italians plans must be coordinated. Commanders must because they were loose with security. Likewise, ensure that plans prepared by their superiors and in their great surprise counteroffensive in the Ar- subordinates do not conflict with their own. A dennes in December 1944, the Germans limited strategic deception plan can involve assets as- the number of commanders who knew of the signed to an operational commander who is not plan. Chiefs of staff of two participating army aware of the plan. Operational and tactical decep- groups signed a pledge of secrecy and were under tion must also be synchronized. In addition, op- penalty of death if they leaked information. erational deception plans should be integrated into a strategic deception plan. Diplomatic, polit- The Ring of Truth ical, economic, and media elements must be co- Deception security is often enhanced by mis- ordinated on the strategic and operational levels. leading one’s high commanders and their subor- Deception plans may use not only notional dinates. Not informing one’s forces enhances forces, but real forces, which might endanger the prospects for the entire plan because the troops real plan if those forces interfere with the sector are better motivated for the coming action if con- of main effort or accidentally reveal the true ob- vinced that their efforts are real. In the Ardennes jective. Thus it is necessary to disentangle the de- counteroffensive, German front commanders ception from the real scheme during planning. were convinced that massing supplies and with- These efforts should continue throughout a major drawing front line divisions were necessary to operation or campaign. provide fresh troops for defending the Ruhr and Operational deception often requires moving the Palatinate. One way of enhancing a plan’s se- large and diverse forces. Because it is unlikely that curity is by surrounding it with truth. there will be separate forces for both the real and the deception plans, both should be executed si- multaneously with the same forces. Congruence is ensured through coordinated planning. The op- erational commander should also be able to mod- ify or cancel the entire deception. A large-scale deception cannot be limited to individual elements. Military, political, economic, and informational activities may be needed. All Kevin H. Tierney) mmfeomuirsepslt el odabydeemp aheennan rdtem sno oefo nmlnaizy resg. edeOq awpuneeidtrnha dct itieovhdnee r aasolen v ddfeoe rcrascyellepn sst cciaohennnrdo a tnrahisioesz eretetdos- Pacific ( controlled by the operational commander in Group, terms of time, space, forces, and objective. mera Deception can be a force multiplier as well as Combat Ca ac ocmritmicaanl dpearrst oafn cda mthpeaiirg nst apflfasn mniunsgt. uOnpdereartsitoannadl Fleet and apply its principles. New information tech- nologies and techniques increase rather than re- Inflatable boat on patrol. duce opportunities for deception, allowing both Excessive security hinders coordination; thus attackers and defenders greater choice of meth- there should be a balance between protection and ods. Technology, no matter how sophisticated effectiveness. An enemy is always alert for indica- and available, cannot erase the need for wider tions and warnings, hence perfect security does awareness of the usefulness of deception on all not exist. Commanders, knowing that their de- levels of military activity. Deception should be in- ception plans could be compromised, should use tegral to any major operation or campaign. JFQ any security breaches to their advantage. Operational commanders should reconcile differences between deception objectives and the methods their staffs recommend. This is ensured by coordination throughout the chain of com- mand. Because planning is conducted concur- rently and in various staff sections, inconsisten- cies must be resolved. An operational deception 66 JFQ / Spring 2002

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.