A Framework for Deception
Draft Report

Back - Next

References

[1] OODA Loop Citation - Boyd Cycle

[2] David Lambert, "A Cognitive Model for Exposition of Human Deception and Counter-deception" (NOSC Technical Report 1076 - October, 1987). [Main Table]

[3] Fred Cohen, "The Structure of Intrusion and Intrusion Detection", May 16, 2000, http://all.net/ (InfoSec Baseline Studies)

[4] Fred Cohen, "A Theory of Strategic Games with Uncommon Objectives"

[5] Fred Cohen, "Simulating Cyber Attacks, Defenses, and Consequences", IFIP TC-11, Computers and Security, 1999.

[6] F. Cohen, "A Note on the Role of Deception in Information Protection", Computers and Security 1999.

[7] F. Cohen, "A Mathematical Structure of Simple Defensive Network Deceptions", 1999, http://all.net (InfoSec Baseline Studies).

[8] James F. Dunnigan and Albert A. Nofi, "Victory and Deceipt: Dirty Tricks at War", William Morrow and Co., New York, NY, 1995.

[9] F. Cohen, "Managing Network Security: What does it do behind your back?", July, 2000, Network Security Management Magazine.

[10] Field Manual 90-02: Battlefield Deception, 1998.

[11] Bart Whaley, "Stratagem: Deception and Surprise in War", Cambridge: MIT Center for International Studies. 1969

[12] Chuck Whitlock, "Scam School", MacMillan, 1997.

[13] Bob Fellows, "Easily Fooled", Mind Matters, PO Box 16557, Minneapolis, MN 55416, 2000

[14] Thomas Gilovich, "How We Know What Isn't So: The fallibility of human reason in everyday life", Free Press, NY, 1991

[15] Al Seckel, "The Art of Optical Illusions", Carlton Books, 2000.

[16] Colonel Michael Dewar, "The Art of Deception in Warfare", David and Charles Military Books, 1989.

[17] William L. Griego, "Deception - A 'Systematic Analytic' Approach", (slides from 1978, 1983)

[18] Scott Gerwehr, Jeff Rothenberg, and Robert H. Anderson, "An Arsenal of Deceptions for INFOSEC (OUO)", PM-1167-NSA, October, 1999, RAND National Defense Research Institute Project Memorandum.

[19] Fred Cohen, "Deception Toolkit", March, 1998

[20] Bill Cheswick, Steve Bellovin, Diana D'Angelo, and Paul Glick, "An Evening with Berferd" - followed by S. M. Bellovin. "There Be Dragons". Proceedings of the Third Usenix UNIX Security Symposium. Baltimore (September 1992).

[21] F. Cohen, "Internet Holes - Internet Lightning Rods", Network Security Magazine, July, 1996.

[22] F. Cohen, Operating System Protection Through Program Evolution Computers and Security 1992.

[23] F. Cohen, A Note On Distributed Coordinated Attacks, Computers and Security, 1996.

[24] Scott Gerwehr, Robert Weissler, Jamison Jo Medby, Robert H. Anderson, Jeff Rothenberg, "Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities (OUO)", PM-1124-NSA, Novermber 2000, RAND National Defense Research Institute.

[25] Robert E. Huber, "Information Warfare: Opportunity Born of Necessity", News Briefs, September-October 1983, Vol. IX, Num. 5, "Systems Technology" (Sperry Univac) pp 14-21.

[26] Knowledge Systems Corporation, "C3CM Planning Analyzer: Functional Description (Draft) First Update", RADC/COAD Contract F30602-87-C-0103, December 12, 1987.

[27] John J. Ratey, M.D., "A User's Guide to the Brain", Pantheon Books, 2001. [In contrast, the auditory nerve only has about 25,000 nerve fibers. Information must be assessed beginning in the ear itself, guided by the brain. "Evidence that our brains continually shape what we hear lies in the fact that there are more neuronal networks extending from the brain to the ears than there are coming from the ears to the brain." [27] (p. 93)]

[28] Sun Tzu, "The Art of War", (Translated by James Clavell), Dell Publishing, New York, NY 10036 (1983).

[29] Gordon Stein, "Encyclopedia of Hoaxes", Gale Research, Inc, 1993, p. 293.

[30] Fay Faron, "Rip-Off: a writer's guide to crimes of deception", Writers Digest Books, 1998, Cinn, OH.

[31] Richard J. Robertson and William T. Powers, Editors, "Introduction to Modern Psychology, The Control-Theory View". The Control Systems Group, Inc., Gravel Switch, Kentucky, 1990.

[32] Charles K. West, "The Social and Psychological Distortion of Information", Nelson-Hall, Chicago, 1981.

[33] Chester R. Karrass, "The Negotiating Game", Thomas A. Crowell, New York, 1970.

[34] Robert B. Cialdini, "Influence: Science and Practice", Allyn and Bacon, Boston, 2001.

[35] Robert W. Mitchell and Nicholas S. Thompson, "DECEPTION: Perspectives on human and nonhuman deceipt", SUNY Press, 1986, NY.

[36] Donald D. Hoffman, "Visual Intelligence: How We Create What We See", Norton, 1998, NY.

[37] Charles Handy, "Understanding Organizations", Oxford University Press, NY, 1993. img35.jpg

[38] National Research Council, "Modeling Human and Organizational Behavior", National Academy Press, Washington, DC, 1998.

[39] Bill Cheswick, An Evening with Berferd, 1991.

[40] Fred Cohen, "The Unpredictability Defense", Managing Network Security, April, 1998.

[41] David Kahn, "The Code Breakers", Macmillan Press, New York, 1967

[42] Norbert Weiner, "Cybernetics", 1954?

[43] The HoneyNet Project web site (www.honeynet.org).

[44] Tom Keaton, "A History of Warfare", Vintage Books, NY, 1993

[45] Andrew Wilson, "The Bomb and The Computer", Delacorte Press, NY, 1968.

[46] Robert Greene, "The 48 Laws of Power", Penguin Books, New York 1998

[47] Diana Deutsch, "Musical Illusions and Paradoxes", Philomel, La Jolla, CA 1995.

[48] Fred Cohen Cynthia Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary, Fran Rupley, Richard Isler, and Eli Dart, "A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on That Model", The Encyclopedia of Computer Science and Technology, 1999.

[49] Richards J. Heuer, Jr., "Psychology of Intelligence Analysis", History Staff Center for the Study of Intelligence Central Intelligence Agency 1999.

[50] Aldert Vrij, "Detecting Lies and Deceipt", Wiley, New York, NY, 2000.

[51] National Technical Baseline, "Intrusion Detection and Response", Lawrence Livermore National Laboratory, Sandia National Laboratories, December, 1996

[52] Various documents, A list of documents related to MKULTRA can be found over the Internet.

[53] Kalbfleisch, Pamela J. The language of detecting deceit. Journal of Language & Social Psychology, Dec94, Vol. 13 Issue 4, p469, 28p, 1 chart [Provides information on the study of language strategies that are used to detect deceptive communication in interpersonal interactions. Classification of the typology; Strategies and implementation tactics; Discussions on deception detection techniques; Conclusion.]

[54] Colonel John Hughes-Wilson, "Military Intelligence Blunders", Carol & Graf, NY, 1999

[55] John Keegan, "A History of Warfare", Vintage Books, NY 1993.

[56] Charles Mackay, "Extraordinary Popular Delusions and the Madness of Crowds", Templeton Publications, 1989 (originally Richard Bently Publishers, London, 1841)

[57] Donald Danial and Katherine Herbig, ed. "Strategic Military Deception", Pergamon Books, 1982.

[58] Western Systems Coordinating Council WSCC Preliminary System Disturbance Report Aug 10, 1996 - DRAFT [This report details the August 10, 1996 major system disturbance that separated the Western Systems Coordinating Council system into 4 islands, interrupting service to 7.5 million customers for periods ranging from several minutes to nearly six hours.]

[59] Bob Pekarske. Restoration in a Flash---Using DS3 Cross-connects, Telephony. September 10, 1990. [This paper describes the techniques used to compensate for network failures in certain telephone switching systems in a matter of a millisecond. The paper points out that without this rapid response, the failed node would cause other nodes to fail, causing a domino effect on the entire national communications networks.]

[60] Mimi Ito, "Cybernetic Fantasies: Extended Selfhood in a Virtual Community", 1993.

[61] Mark Peace, "Dissertation: A Chatroom Ethnography", May 2000

[62] Daniel Chandler, "Personal Home Pages and the Construction of Identities on the Web", 2001

[63] Fred Cohen, "Understanding Viruses Bio-logically", Network Security Magazine, Aug, 2000.

[64] Fred Cohen, "Red Teaming and Other Agressive Auditing Techniques", Managing Network Security", March, 1998.

[65] SSCSD Tactical DecisionMaking Under Stress

[66] Fred Cohen, "Method and Aparatus for Network Deception/Emulation", International Patent Application No PCT/US00/31295, Filed Octoboer 26, 2000.

[67] Heidi Vanderheiden, Boston University "Gender swapping on the Net?", http://web.aq.org/~tigris/loci-virtualtherapy.html

[68]

[69]

[70]

Back - Next