Deceptions are generally categorized as comprising of
concealment, camouflage, false and planted information, reuses, displays,
demonstrations, feints, lies, and insight (as described in [Dunnigan95] Jim
(James F.) Dunnigan and Albert A. Nofi, Victory and Deceit - Dirty Tricks
at War, William Morrow and Co., 1995.) Examples include the creation of a
questionnaire asking for detailed information security backgrounds under the
auspices of a possible contract used to determine what expertise is
available at a particular company to defend against a particular type of
attack (a ruse), the creation of a false front organization such as a
garbage collection business in order to gain access to valuable information
often placed in the trash (camouflage) and the claim of having special
capabilities in your upcoming product in order to force other vendors to
work in that area even though you never intend to enter into it (a feint).
Complexity: In general deceptions comprise a complex class of techniques,
some subclasses of which are known to be undecidable to detect and trivial
to create, other subclasses of which of which have not been analyzed.
fc@red.a.net