FM 90-2: Battlefield Deception
Chapter 1
BATTLEFIELD DECEPTION FUNDAMENTALS
REVITALIZING THE "LOST ART"
History has shown that there is a potential payoff to be gained by using battlefield deception. Wise military planners throughout history have used deception. It is a low cost and effective way to cause the enemy to waste his efforts. Imaginative use of deception, coupled with aggressive training, improves combat effectiveness at all levels. Throughout our military history, though, commanders viewed deception only as a war-fighting need.
Today, commanders use little deception in planning, directing, and conducting combat operations. As a result, many deception-related skills that have served our Army well in the past have been forgotten, and where remembered, have not been made part of our war-fighting capabilities Armywide. This is caused by the following factors and the myths discussed later in this chapter.
- Advances in technology are perceived to make successful deception more difficult, if not impossible, to achieve.
- Commanders are reluctant to devote scarce resources, including time, to tasks that are considered less essential.
- Force modernization, being primarily focused on high-cost force structure and materiel initiatives, has pushed low-cost, perceived intangibles like deception further into the background.
- Implements, in part, the Defense Science Board's recommendation to DOD that the services pursue deception as a low-cost, high-payoff methodology to achieve operational advantage.
- Supports, in part, the intent of the headquarters DA early tactical deception (TAC-D) action plan.
- Applies the Principles of War to the conduct of combat operations.
- Applies AirLand Battle doctrinal tenets to the conduct of military operations.
- Employs deception within the context of any overall command, control, and communications countermeasures (C3CM) strategy adopted by commands to support combat operations.
- Optimizes existing and future war-fighting capabilities to plan, direct, and conduct combat operations.
MYTHS
The following myths contribute to reasons why deception is not more widely used and understood:
- Surprise comes from luck. Experience has taught us that surprise can be greatly enhanced by deception. Studies of military encounters since 1914 show deception almost certainly results in surprise. On the other hand, if deception is not used, surprise is achieved only about 50 percent of the time.
- Deception plays a trivial part in warfare and is not for real soldiers. This myth is dispelled by the writings of such leaders as General George S. Patton. In 1945 he wrote that he believed deception and cover should be a normal part of the planning for any campaign.
- Tremendous growth in intelligence collection capabilities has destroyed the possibility of deceiving a sophisticated opponent. The truth is that the greater the collection capability an opponent has, the greater the opportunity to feed him specifically designed false information. Additionally, historical studies show that tactical warning of attack was provided in about 78 percent of all military encounters studied since 1914. Even so, if deception was successfully used, the enemy ignored the warning and was surprised by the attack.
- Deception is only for combatants. In the 1973 Middle East War, the Egyptians brought the Israelis to the brink of defeat in five days. The Egyptian attack was aided by 150 deception ploys in economic, political, and military forms. A team of 40 people began working in February 1973 on the Egyptian plan for the October 6 invasion. Combat operations were preceded by construction projects, false reports, and many other noncombat activities.
BATTLEFIELD DECEPTION DEFINITION
Battlefield deception consists of those operations conducted at echelons theater (Army component) and below which purposely mislead enemy decision makers by--
- Distortion.
- Concealment:
- Falsification of indicators of friendly intentions, capabilities, or dispositions.
The goals of battlefield deception, when discussed within the context of mission-oriented requirements, depend on the factors of mission, enemy, terrain, troops, and time available METT-T). The following goal categories, therefore, are general enough to be applicable to most situations, regardless of echelon or conflict intensity level:
- Coordinate operational deceptions to maintain coherency of deception story portrayal at strategic and Army echelons.
- Mask an increase in or redeployment of forces and weapon systems which the enemy has spotted.
- Block the enemy's perception and identification of new weapons or forces being introduced into combat.
- Distract the enemy's attention from other activities.
- Overload enemy intelligence collection and analytical capabilities.
- Create the illusion of strength where weakness exists.
- Create the illusion of weakness where strength exists.
- Condition the enemy to particular patterns of friendly behavior that are operationally exploitable at the appropriate time.
- Confuse enemy expectations with regard to the size, activity, location, unit, time, equipment (SALUTE), intent or style of mission execution--to effect surprise in these areas.
DECEPTION MAXIMS
Achievement of the above goals relies on deception maxims or principles that are supported by historical deception-related evidence. Other principles come from social science, decision analysis, and game theory. Still others are anecdotal in nature; although they meet the test of common sense, they are generally untested in the formal sense. Nevertheless, they have served as useful theoretical guidelines on which this doctrine has been built. The 10 maxims are--
- Magruder's principles--the exploitation of perceptions.
- Limitations to human information processing.
- Cry-Wolf.
- Jones' dilemma.
- A choice among types of deception.
- Axelrod's contribution: the husbanding of assets.
- A sequencing rule.
- The importance of feedback.
- The Monkey's Paw.
- Care in the design of planned placement of deceptive material.
It is generally easier to induce an enemy to maintain a pre-existing belief than to present notional evidence to change that belief. Thus, it may be more useful to examine how an enemy's existing beliefs can be turned to advantage than to attempt to change his beliefs.
Perhaps the most striking application of this principle in military deception is to be found in the selection of the invasion site and cover plan for the D-Day invasion at Normandy. It is well established that Hitler and almost all of his senior military advisors believed that the most likely place for the Allied invasion of Europe would be in the Pas de Calais region. Moreover, the Allies were aware of this belief through ULTRA intercept. Intercept confirmed that Hitler believed that the Allies would invade at Pas de Calais.
This preconception formed the basis of an elaborate deception plan keyed to reinforce this belief. "If deception targets tend to perceive what they expect, then these expectations furnish greater leverage to a deception plan--a form of mental jujitsu.1 This principle appears to be well appreciated by deception planners and is consistent with numerous studies on the psychology of perception.
There is ample historical evidence to confirm the truth of Magruder's Principles. Figure 1-1 contains entries from a historical data base. These entries (including both strategic and tactical cases) have been placed into the following categories:
- Whether or not deception was employed.
- Whether or not plans were keyed to enemy preconceptions.
- Whether or not surprise was achieved.
LIMITATIONS TO HUMAN INFORMATION PROCESSING
There are two limitations to human information processing that are exploitable in the design of deception schemes:
- The law of small numbers.
- Susceptibility to conditioning.
"The law of small numbers" is the name given to describe one weakness in intuitive inference--best guesses. Figure 1-2 shows three events as examples:
- Lack of alertness on the part of German troops on the eve of the Normandy invasion.
- Stalin's belief that the Germans would issue an ultimatum before an invasion of Russia.
- The view expressed by some intelligence analysts that Khruschev would not place offensive missiles in Cuba.
Figure 1-1. Deception, preconception, and surprise
Susceptibility to Conditioning
Another limitation of human information processing relevant to deception planning is the frequent inability of targets to detect small changes in indicators, even if the cumulative change over time is large. This is the basis for the use of conditioning as a deception technique.
Figure 1-2. Law of small numbers: some historical examples 3
Conditioning or desensitizing has an important place in the design of deception schemes. There are numerous instances of its successful application. One now-classic application of this principle was made in the breakout of the German ships Scharnhorst, Gneisenau, and Prinz Eugen from Brest on February 12, 1942. The breakout was facilitated by jamming British radars. Ordinarily this would have been a significant tip-off that something was amiss, but British radar operators dismissed it as being caused by atmospheric disturbance. This error was the result of a carefully orchestrated German ruse directed by General Wolfgang Martini, the head of the Luftwaffe Signals Service. The Germans jammed the British radar sites every day at the same time to build their belief that the atmosphere was interrupting the receipt of any signals. The British became so accustomed to the atmospheric problems that the ships were able to escape.
The Germans did not have a monopoly on this concept. It was frequently employed by the RAF for feints or diversionary operations. One example was prior to the British attack on Peenemunde on August 17, 1943. Over a period of time, the British had routinely sent Mosquitoes along the same route to bomb Berlin. This ensured that all personnel in cities along the route were constantly forced to flee to bomb shelters and that German air assets were repeatedly engaged over Berlin. On the night Peenemunde was attacked, the Germans were deceived into believing that the eight Mosquitoes were the vanguard of another attack on Berlin. The result of this deception was a highly successful ruse. At the cost of one aircraft lost to German fighters, the eight Mosquito bombers used in the diversion lured 203 enemy fighters to Berlin. Of 597 British bombers dispatched to Peenemunde, only 40 were lost and 32 damaged. All but 26 managed to attack the target. If the ruse had not been successful, it is quite possible, as one German postwar account claimed, that an additional 160 bombers would have been shot down.
A final remark about the weaknesses of human information processing is that the reading of the literature suggests that targets tend to dismiss unlikely events as impossible events. Such an idea favors bold and imaginative strategies such as Hannibal crossing the Alps or the landing at Inchon.
CRY-WOLF
Figure 1-3 provides a synopsis of several events which show how repeated false alarms (cry-wolf) have historically contributed to surprise. There is no doubt that cry-wolf is an established element in indications and warning intelligence work. As Figure 1-3 shows, this method of desensitizing an enemy before an attack has been very effective.
In a paper entitled "Deception Maxims: Fact and Folklore," 4 prepared by the Office of Research and Development, Central Intelligence Agency, June 1981, the cry-wolf syndrome alone, and false alarms combined with other deception techniques were analyzed to see if they contributed to creating surprise.
Figure 1-3. Historical desensitization by false alerts
The data showed that when cry-wolf techniques were combined with other deception methods, surprise was achieved 92 percent of the time. 4
However, when deception techniques were used that did not include false alerts, surprise resulted in only 67 percent of the cases studied. The analyst concluded from this statistical analysis that combining the effects of false alerts with other deception techniques seemed to increase the chances of achieving surprise. In fact, in 23 cases, when wolf was cried and deception was attempted, surprise was achieved 100 percent of the time.
JONES' DILEMMA
Deception becomes more difficult as the number of channels of information available to the target increases. However, within limits, the greater the number of controlled channels the greater the likelihood the deception will be believed.
A CHOICE AMONG TYPES OF DECEPTION
Where possible, the objective of the deception planner should be to reduce the uncertainty in the mind of the target, to force him to seize upon a notional world view as being correct--not making him less certain of the truth, but more certain of a particular falsehood. However, increasing the range of alternatives and the evidence supporting any of many incorrect alternatives--also known as increasing the noise--may have particular use when the target already has several elements of truth in his possession.
It is convenient to classify deception into two types: A (for ambiguity deception) and M (for misdirection deception). A-deception increases doubt in the target's mind and lowers the probability of a correct perception by taking from or adding to alternatives. M-deception reduces uncertainty in the target's mind by having him become convinced of a particular falsehood. Either form of deception can be accomplished, incidentally, by telling only the truth.
A-deception can function by--
- Altering the probabilities attached to various outcomes in the mind of the target.
- Diluting or burying useful information in noise.
- Altering the perceived range of options and outcomes available to the target.
A classic analysis of the Pearl Harbor surprise borrowed the concepts of signal and noise from communications theory. "To understand the fact of surprise, it is necessary to examine the characteristics of the noise as well as the signals that after the event are clearly seen to herald the attack." 5 On the other hand, noise can be created by the deception architect to overpower or swamp the signal. "The idea is to give your target a kaleidoscope to play with, and then let him use it as a looking glass." 6
A simple example of a defense game shows this idea more clearly. Suppose an attacker has a choice between two locations to attack. The defender can choose to defend either location. Given this scenario, the attacker has an even chance of choosing an undefended location to attack. But, what if the attacker could convince the defender that there were three possible locations for the attack? If he could, the success probability then climbs to 2 to 3, and so forth. The probability would reach unity as a mathematical limit when the number of threatened sites grows arbitrarily too large. It is necessary that the options introduced by the attacker be both individually and collectively plausible to the target.
As a practical matter, the number of threats cannot arbitrarily grow too large. This fact was appreciated by deception planners who worked on the invasion of Sicily: "It was decided, very wisely, that to mount so many threats in the Mediterranean would stretch the Germans' credulity too far. Moreover, the fact that Sicily was almost the only objective not threatened might lead them to guess the truth. To prevent this, the simulated threats to north and west France, Pantelleria, and Lampedusa were abandoned." 7
The foregoing discussion is purposely oversimplified, but it clearly shows the principle of A-deception.
In contrast to A-deception, M-deception (or misdirection) reduces uncertainty. The strategy of misdirection is clear: to make the enemy very certain, very determined, and completely wrong. In the attack/defense game used earlier, M-deception would require the attacker to convince the defender to defend one site, while attacking the other.
Deception schemes used in practice are usually combinations of A and M types, with one or the other being dominant. Such was the case at Normandy.
The multiple attack location threats in the initial stages are evidence of A-deception. In the end phases, however, Normandy was predominantly an M-deception. Historically, deception professionals seem to have preferred M-deception. For after all, who can resist the ultimate triumph of "the sting?"
AXELROD'S CONTRIBUTION: THE HUSBANDING OF ASSETS
There are circumstances where deception assets should be kept in reserve despite the costs of maintenance and risk of waste, awaiting a more fruitful use.
Window, later renamed Chaff by the Americans, was easily the most cost effective electronic countermeasures (ECM) deception device introduced in World War II. However, the British were at first reluctant to use Chaff for two reasons. First, they were afraid that the Germans also had this capability and second, the British had not been able to develop an effective countermeasure. However, after much debate, the British decided to employ Chaff and did so with much success.
It is also interesting to note that concern over whether an asset will become valueless once used, or that upon compromise, an effective countermeasure can and will be developed is often exaggerated. In spite of the concern over the first use of chaff, it is still considered effective in today's sophisticated electronic warfare (EW) environment. Similarly, in the use of double agents, a refusal to believe that the agent is other than genuine has been observed to continue in the face of strong evidence of hostile control.
"Other examples of holding deception assets in reserve until the right moment include--
- Employment of ULTRA in World War II.
The Syrian decision to withhold use of its new SAM defense despite heavy losses until the opportune time in the 1973 Arab-Israeli war.
- The use of double agents by Britain in connection with the Normandy deception."8
-
"One can see that it would be a mistake to evaluate the opponent's resources for surprise by what you have seen when the stakes were low or moderate. He may be rationally waiting for an event with sufficiently large stakes to justify the exploitation of whatever resource for surprise he has."9
A SEQUENCING RULE
Deception activities should be sequenced so as to maximize the portrayal of the deception story for as long as possible. In other words, red-handed activities-indicators of true friendly intent-should be deferred to the last possible instant.
-
"This principle is illustrated by an example from World War II--the Allied surprise at the German attack on Norway. The Allies had detected German ships moving toward Norway but misinterpreted their mission intent because they had expected an attempt to break through the Allied blockade into the Atlantic.10
IMPORTANCE OF FEEDBACK
A scheme to ensure accurate feedback increases the chance of success in deception. This principle is virtually self-evident.
Perhaps the most dramatic example of the role of feedback in wartime deception was the intelligence provided by ULTRA, the top-secret espionage and cryptographic breakthrough that enabled the British to read the German codes. In the view of many, ULTRA information was a key element in the success of the Allied invasion of Normandy. As Lewin pointed out in ULTRA Goes to War: The First Account of World War II's Greatest Secret Based on Official Documents:
-
"(Colonel John) Bevan, head of LCS, and (Lt. Col. T.A.) Robertson, head of the BIa section of MI5, have jointly testified that . . . without ULTRA the great web of deception spun round the Germans could never have been devised. Yet without their efforts, OVERLORD might have been a disaster.11
Ironically, the Allies knew through ULTRA that German troops remained in Norway, and concluded on the basis of this feedback that the deception was successful. "On Sherlock Holmes' famous observation about the importance of the dog that did not bark in the night, the significant fact for the deceivers in London was that no such major movement of troops from Norway was disclosed on ULTRA up to and beyond the time of D-Day. Here was clinching evidence that the deception plans were working.12 Yet it was a completely wrong assessment. Hitler did not move his forces because Norway was his "zone of destiny," not because he believed the British deception plan.
THE MONKEY'S PAW
Deception efforts may produce subtle and unwanted side effects. Planners should be sensitive to such possibilities and, where prudent, take steps to minimize these counterproductive aspects.
Deception security is one of the causes of such side effects. One of the cardinal principles of deception folklore is that deception security is of highest importance. It is generally acknowledged that the number of knowledgeable people should be minimized, even to the point of misleading your own forces.
A good example of short circuiting an unwanted side effect occurred during World War II. Propagandists needed to convince the Germans that an Allied attack was imminent. They needed to accomplish this without encouraging resistance groups to go into action in support of an attack that would never materialize and without exposing them to German reprisals.
-
"In any case, it was bad for morale if hopes of liberation were raised by 'the voice of London' only to be dashed. . . But in France the PWE had already cried "wolf" twice. and there was a real danger that French Resistance would cease to believe anything London said.13
-
"In connection with the otherwise unsuccessful operation 'STARKEY,' for instance, the BBC broadcast this subtle message: 'Be careful of German provocation. We have learned that the Germans are circulating inspired rumors that we are concentrating armies on our coasts with intentions of invading the continent. Take no notice, as these provocations are intended to create among you manifestations and disorders which the Germans will use as an excuse for repressive measures against you. Be disciplined, use discretion, and maintain order, for when the time comes for action you will be advised in advance."14
Another example of the Monkey's Paw effect concerns the unanticipated consequences of an otherwise successful German use of decoy V-2 sites. As Jones stated in "Irony as a Phenomenon in Natural Science and Human Affairs," Chemistry and Industry (1968);
-
"Here the Germans, perhaps following their experience of our bombing of their V-1 sites, sought to decoy us with spoof sites for their V-2 rockets. Actually, we had a very incomplete picture of their rocket organization in France, until we landed on D-Day and afterwards captured a map showing the deployment of the rocket organization west of the Seine. This included not only the actual storage sites with legends bearing their actual capacities, but also the spoof sites as well. These were individually numbered from 15 to 20, running east to west. It was therefore a fair inference that there were 14 spoof sites east of the Seine, and it was reasonable to assume that German thoroughness would have decided on a fixed ratio of spoof sites per rockets stored on a genuine site. On this assumption, it was possible to estimate the number of rockets stored east of the Seine, and hence to estimate the intended monthly rate of fire. The answer came out at about 800: after the war, we found that the intended rate of fire had been 900 a month. We had, therefore, managed to achieve an 88 percent accuracy in our estimate, which would not have been possible had the Germans not tried to deceive us.15
-
"The deception went very well and the Italians fell for the story of the attack in the south, with a result which was exactly the reverse of what Wavell wanted. They drew back in the south, presumably in the expectation that the attack there was bound to succeed and the damage to their forces would be less if a withdrawal was made perhaps to a shorter line and no pitched battle was joined. At the same time, they sent what they could spare to reinforce the Northern Flank where they did not expect an attack but which was the true British objective. The valuable lesson learned was that the deception plan must be based on what you want the enemy to do, never on what you want him to think. Next time, also in Abyssinia, Dudley arranged for the Italians to find out exactly where the British attack was to be made and this ensured that there was no opposition."16
CARE IN THE DESIGN OF PLANNED PLACEMENT OF DECEPTIVE MATERIAL
Great care must be exercised in the design of schemes to leak notional plans to the enemy. Apparent windfalls are subject to close scrutiny and often disbelieved. On the other hand, genuine leaks often occur under circumstances thought improbable.
Two incidents serve to illustrate this principle. One occurred when early in World War II, a German aircraft heading for Cologne became lost and made a forced landing near Malines in Belgium. The three passengers, two Wehrmacht officers and a Luftwaffe major, were soon arrested by Belgian authorities. They were taken to the police station and left alone briefly. They made an attempt to burn some documents they were carrying. They were top secret documents containing attack plans for Holland and Belgium. However, the documents failed to burn and fell into the hands of Belgian authorities. The authorities believed that the documents were a part of a deception plan, because the Germans could not be careless enough to allow actual war plans to fall into the hands of the Allies.
A second example occurred in the North African campaigns. Alam el Halfa, a ridge roughly 15 miles behind the Alamein line, was a natural stronghold. It was an excellent defensive position for the British at that stage in the war. It could, however, be outflanked by advancing Germans who might be able to attack on to Alexandria. The British maps of the area were excellent, being based on captured Italian maps corrected by aerial photographs. One type of British map was thought particularly valuable by both British and German armies--the so-called "going map." This map showed color-coded regions denoting how difficult the terrain was, and what speeds could be maintained by various vehicles.
The British decided to print a false going map showing that a flanking movement would present rough going, whereas the route direct to the Alam el Halfa region was easily plausible. The map was secretly printed and placed in an armored car to be captured by the Germans. The plan worked and the Germans came directly to Alam el Halfa (over rough going, incidentally).
These examples show both kinds of misclassification error. In the Belgian case, a real windfall was dismissed as false. In North Africa, a false map was accepted as real.
A common characteristic of successful deceptions is that they were designed to co-opt skepticism by requiring some participation by the target: either a physical effort in obtaining the evidence or an analytic effort in interpreting it. The danger of this is that it is possible to be too subtle, which carries with it the risk that the deception story will not be perceived at all.
There is a delicate balance to be struck between obviousness and subtlety, with the attendant twin risks that the message will be either misunderstood or dismissed as a plant. To the deception professional, this is the essence of the art.
DECEPTION FAILURES
There are generally two categories of deception failures:
- Those resulting from detection by the intended victim--the target.
- Those resulting from inadequate design or implementation by the deceiver.
- Incomplete or misunderstanding of the target's intelligence apparatus.
- Incomplete or incorrect modeling of the deception process.
- Inadequate or improper channels or means to convey the deception story.
- Incomplete or inadequate control over the important variables of the deception process.
- Incorrect assessment of the target's reaction.
- Deception story falls outside the deception window: too sophisticated to be received, or too simplistic to be believed.
- Unreasonable expectations.
- Target's inability to react in the intended manner even if deception is considered credible.
- Inadequate time for the deception process to run its course.
- Plain bad luck can cause detection or inadequacy, or both.
ALBION
The first deception plan was code-named Albion. It was an elaborate deception to cover the mobilization and movement of forces to the East for the attack on Russia. The plan contained two major operational components, SHARK and HARPOON.
SHARK was intended to convey the impression that a large combined force would invade the southeast coast of England at four locations between Folkestone and Worthing. The combined force, to include eight infantry divisions, was to be preceded by an airborne unit to 'secure beachheads and, if possible, to take a number of airfields.' The Luftwaffe was to achieve air superiority, protect the invasion fleet, drop the airborne units, support the ground forces, and airlift additional ground troops. Naval units were also supposed to participate in clearing invasion routes through the British minefields, transport the invasion force, and provide covering fire during the landing.
Originally intended to begin in March and April 1941, directions and planning were slow, probably because of the press of real operations which almost invariably took precedence over deception. Preliminary actual steps included highly visible training exercises, swimming instructions for nonswimmers, paradrops and beach assaults using blank cartridges but real landing craft. This latter activity was a major deficiency in the deception story. Since only 5 landing barges and 10 fishing smacks were available to transport the assault force, the deception activities were not believable.
A cover operation for SHARK, designated HARPOON, was notionally intended to draw British forces away from the 'intended assault' area. This added credibility to the 'attack.' Two operations were planned:
- HARPOON NORTH was to be an attack from Norway and Denmark in the area between Tynemouth and Berwick.
- HARPOON SOUTH was to be launched from the Brittany Peninsula against the southwest coast of England in the area of Lyme Bay.
- Hitler's unreasonable expectation that the British were more vulnerable than they actually were.
- A lack of physical resources may have been known to the British, who correctly perceived that five landing barges would not be sufficient for any invasion.
ELEPHANTIASIS
The second example is a World War II German tactical deception attempted against the Russians in early 1942 which had a very unpleasant result. Code-named ELEPHANTIASIS, the operation consisted of deceptive radio transmissions. They were intended to convince the Russians that a lightly held sector of the front in the area east of Vyasma, 200 kilometers southwest of Moscow, was actually defended by a heavy force of the Fourth Army. The Russians quickly attacked with a superior force and to quote one participant: "It was a mess."It is unclear whether the Russians saw through the deception, or simply decided their forces were adequate to overcome the large force the Germans were trying to portray. In either case, the deception was not successful. It probably failed for the following reasons:
- It was single channel, relying totally on radio transmission rather than a blend of other means and measures.
- It had, to some degree, an unrealistic expectation of success.
- There was an intelligence failure to anticipate the possib le Russian reaction of deploying a greater force to attack .
SOVIET TACTICAL RADIO DECEPTION
The third example occurred during World War II, when Soviet radio deception attempts against the Germans along the Eastern Front were common, but generally unsuccessful. Careful German analyses of other available intelligence (air reconnaissance and agent reporting) revealed the true deceptive nature of the attempts. They were, as in the ELEPHANTIASIS operation, single-channel efforts with no additional means or measures used to support the deception and enhance plausibility.
Probably more significant was the frequency of the attempts. A deception occurred about once every two weeks. It is probable that the Soviet command structure and intelligence apparatus were desensitized to the point of ignoring the ploys. While such repetitive actions are sometimes used to lull an adversary into a false sense of security prior to a genuine attack, the careless and poorly structured nature of these efforts probably revealed them as deceptions.
COCKADE
The fourth example is probably the largest scale deception failure on record. It was the World War II Allied operation code-named COCKADE. Conceived in early 1943, its major objective was to conceal the weaknesses of Allied forces in Britain. COCKADE was intended to discourage the transfer of enemy forces to the Russian front. It had three subelements: STARKEY, TINDALL, and WADHAM.
STARKEY, the major component, was composed of a number of separate but presumably mutually supporting operations, including actual training exercises, air and naval operations, and combined operations (commando) teams.
-
"The story was to imply a large-scale amphibious attack against the coast of France. Its objective was to lure German aircraft into major air engagements on terms favorable to the Allies, which would result in inflicting heavy losses on the Luftwaffe.
Planning began in April 1943 with a target launch date of September 8. However, the process of cutting back on the scale of the plan began early. This was demanded by Allied leadership, due to the fact that there were fewer resources available than earlier in the war."18
-
"It was suggested at one point, for example, that when the invasion convoy returned to England without landing in France, the troops would be told that the assault had been cancel led because the German coastal defenses were too strong. Not long after this was disapproved, it was proposed that after the STARKEY operation had been terminated, the press should be permitted to report that the invasion had not failed but was instead a deception, and close-up photographs of the decoy equipment would be made public. While the revelation of the failed deception. . . "19
-
"A series of 14 commando-type raids code-named FORFAR formed a subelement of STARKEY. They were intended to appear as intelligence-gathering missions in preparation for the notionally imminent cross-channel invasion of STARKEY. Some internal deception of friendly forces was also employed. For security reasons, the commandos were told their missions were to capture a German soldier, assigned to coastal defense duties, for interrogation. This ruse had a dual purpose. In the event of capture the raiders could not be forced to reveal the deception if they knew nothing about it. Also, it was recognized that Allied troop morale would probably have suffered if they had known their personal risk was merely to support a deception."20
"FORFAR BEER made three attempts. The first turned back after sighting a German trawler. The second was aborted due to bad weather and the third terminated when the troops could not scale the cliffs of the French coast.
- FORFAR DOG scaled the cliffs but could not penetrate the barbed wire defenses. The raiding party cut out a small sample of barbed wire so as not to return empty handed.
- FORFAR EASY landed, but, failing to make contact with the enemy after an hour and a half, also clipped out a section of barbed wire and returned home.
- FORFAR HOW could not land due to heavy surf.
- FORFAR LOVE, a team of two two-man canoes launched from a motor gunboat, spotted so much enemy activity they too aborted prior to landing."21
-
"TINDALL was intended to portray an impending attack in the area of Stavanger, Norway. The objective was to freeze German forces in Scandinavia, rather than permitting their deployment to Europe or the Mediterranean. Again, this required considerable preparation in the display of physical resources needed for such an invasion. Airfield improvement and increased air defenses, along with the display of decoy bombers and troop-carrying gliders and their tow planes, were undertaken at several airfields in Scotland."22
WADHAM was intended to portray the story of a large-scale combined air and sea attack on the Brittany peninsula. The objective, again, was to freeze German forces in that area. In this case, American and British forces were involved in an assault planned for September 30, 1943. A prime objective was to capture Brest and implicitly neutralize its U-boat pens and those at Lorient and St. Nazaire.
-
"A number of passive and active measures were involved. Leaks regarding troop strength, training and readiness, decoy aircraft and assault gliders, "planning leaks," and a short newsreel film titled 'Invasion Preparation at Fever Heat,' were the passive demonstrations of the deception."23
Active measures included actual bombing of the submarine pens and a less-than-convincing commando raid, code-named POUND.
"The target was the Isle of Ushant. All this was intended to support the story that an intelligence sortie was attempting to determine the strength of defenses in the area."24
COCKADE and its subelements suffered from some fairly major deficiencies in the resources available for execution. The Germans' disdainful reaction may also be explained in terms other than poorly constructed deception. Two writers have indicated a major German intelligence success branded COCKADE as a hoax, when a July 29 transatlantic telephone call between Roosevelt and Churchill revealed that COCKADE was a trick. Although the call was presumed secured by the A-3 scrambler, the Germans had in fact broken that system by the fall of 1941. They had routinely monitored a broad spectrum of mid- and high-level voice communications.
The major cause of failure, however, was the total implausibility of an invasion of the continent at that stage of the war. The total picture of Allied strength and preparations that the Germans gained was from sources so numerous that they could not all be totally manipulated or controlled. Evidence showed clearly that such an attack was unrealistic in 1943.
ACCUMULATOR
The fifth example is a tactical deception which occurred later in World War II in support of OVERLORD, the invasion of France. It, too, can be classified as a technical failure. It failed because of inadequate planning, coordination, preparation, and time, combined with some degree of bad luck. It was code-named Accumulator.
-
"In June 1944, seven days after D-Day, with the success of the landings still in doubt, it was decided to create a notional diversionary attack."25
-
"The operation, conceived on very short notice, employed two Canadian destroyers, the Haida and the Huron, as platforms for electronic deception. They were to simulate an amphibious assault force to land on June 13, 1944, near the town of Granville. The deception consisted entirely of radio voice broadcasts. The initial transmission was in the clear, reporting to base that the speed of the fleet, located southwest of the Island of Jersey, had been reduced due to engine trouble on one of the ships. A discussion of the revised plan of attack followed, also in the clear. However, an unknowing Allied reconnaissance aircraft reported the two destroyers as 'unidentified warships.' Part way through the operation, the Haida abandoned the effort because her radios were not ready. This forced the Huron to continue a solo performance with a hastily-revised transmission scenario. Although British War Office records reported the operation as satisfactory, no German reaction was observed."26
The failure could also have been caused by the absence of the other aspects of an actual invasion fleet. Missing were the radar signatures of a large group of ships which would undoubtedly have been accompanied by air support and ECM. Deception story portrayals by one means have less credibility than stories portrayed over a number of means.
Also, by June 13 the magnitude of the Normandy force was clear to the German military leadership. Hitler apparently still believed an attack would come in the Pas de Calais area. This, combined with the general disorganization in northern France, probably prevented any serious thought of a major shift of forces in the west.
IRONSIDE
The sixth example was code-named IRONSIDE. In early 1944, with the Allied decision made to invade Normandy, the primary objective was to minimize opposition to the attacking force.
-
"This involved convincing the Germans to freeze their forces in place and, if possible, withdraw some from the Normandy area. An attack of southern France, code-named ANVIL, was intended to accomplish this objective."27
-
"The (Ironside) scenario included an almost totally notional series of actions:
- At D+3 a brigade-sized force would capture the airfields at Medis and Cozes.
- At division would establish a position between Le Verdon and Soulac.
- A second division would attack at Arcachon to secure the main route to Bordeaux.
- At some later time three more divisions would reinforce each beachhead and later advance along the Garonne River.
- A large scale naval force, which was to provide transportation, mine sweeping, bombardment, and even aircraft carriers, was to participate."28
ANZIO
-
"(The last example occurred) . . . Following SHINGLE, the successful Allied landing at Anzio, Italy, on January 22, 1944, (when) the Germans launched a strong but ineffective counterattack along the Via Anziate without benefit of deception or surprise. Hitler attached great strategic importance to the Allied landing, which he viewed not only as the 'Battle for Rome' but the beginning of the invasion of Europe He ordered Field Marshal Kesselring to mount a second counterattack and vetoed the subsequent plan for a thrust between Isola Bella and Ponte della Crocetta as being too close to the previously unsuccessful route of approach. Instead, Hitler ordered the attack to fall between the Astura River and the Mussolini Canal. Kesselring and von Mackessen obeyed and scheduled demonstrations to simulate flanking attacks in the areas of Sessano and Ardea/Buonriposo."29
Figure 1-4 shows the previous deception failures in easy-to-use tabular format. The intent is not to dwell on failure but, rather, to portray the immense scope of deception planning, the fragile nature of deception operations, and the absolute necessity for total integration of the deception effort into the decision-making process.
AIRLAND BATTLE
Our ability to fight in accordance with the basic tenets of AirLand Battle Doctrine--agility, synchronization, initiative, and depth--is enhanced by using battlefield deception.
The effective use of deception allows us to take the initiative by doing the unexpected and inducing the target to react to our operations. Deception allows us to--
- Capitalize on frustrated, misaligned, and misallocated enemy operations and resources.
- Extend our operations deep into enemy rear operations.
- Affect the missions of enemy reserve and second-echelon forces.
Battlefield deception operations, by their very nature, imply taking calculated, prudent risks in order to gain the tactical and operational advantage over the enemy. Planned deceptions allow us to sequence the presentation of the battlefield to the enemy in the manner in which we wish him to view it. In the defensive, battlefield deception allows us to portray inaccurate dispositions and capabilities that hide our true weaknesses. This can effectively negate the enemy's choice of the time and place of battle.
Figure 1-4. Reported Deceptions Failures.
In both the offense and defense, battlefield deception enhances the conditions which allow the friendly commander to effectively mass his forces at the decisive time and location on the battlefield. Successfully managed, deception operations give us the element of surprise over the enemy. In the defense, this includes making the enemy attack where he perceives our weaknesses to be or gearing his intelligence activities toward notional rearward activities. We inject notional combat information and intelligence into his decision-making process. This influences the outcome of his decisions and requires him to reconfirm information or dedicate additional intelligence resources toward our deceptive activity.
In the offense, battlefield deception assists our offensive spirit by giving our commanders freedom to develop a greater number of alternative courses of action. Deception operations induce the enemy to view the battlefield the way we want him to. This causes him to take actions favorable to and exploitable by friendly operations. Because of induced misperceptions of the battlefield, the enemy in the defense is not given time to identify the composition of our forces and mass his forces or supporting fires against the attack. Successfully planned and executed battlefield deceptions give our commanders the ability to act faster than the enemy can make decisions. Battlefield deception keeps the enemy reacting to false friendly dispositions, intentions, or capabilities.
As with other imperatives for success on the AirLand Battlefield, deceptions must be an integral part of the planning process. In order to optimize the desired effect upon the enemy, they must be synchronized with the true combat mission. These effects induce inappropriate focusing or diffusing of enemy combat power. They may cause the enemy to misperceive friendly capabilities and intentions in a manner which results in enemy actions that can be exploited. The former effect can create friendly advantages in terms of time, distance, location, force ratios, or mission mismatches. The latter creates friendly advantage primarily in terms of ensuring that inadequate time exists for enemy reaction to true operations, regardless of if or when they are discovered. Functional activities (such as EW, fire support, intelligence, and engineering), which have embedded deceptive intent within the operational plan, should synchronize their supporting plan tasks to achieve both operational and deception objectives. The operational plan is identified in the deception annex.
Battlefield deception, as with other operations, must be flexible and continuously synchronized with the changing friendly and enemy situations. Synchronizing deception activities, with ground truths or with the desired enemy perception, provides our commander the maximum economy of force of total combat resources.
COMMAND, CONTROL, AND COMMUNICATIONS COUNTERMEASURES
Battlefield deception is an important foundation to the C3CM strategy for AirLand Battle. Our potential adversary's ability to perceive and manage the battlefield with clarity and certainty accents the importance of planning and integrating a C3CM strategy into our combat operations. Battlefield deception is employed in concert with the three other components of C3CM:
- Jamming.
- Operations security (OPSEC).
- Physical destruction.
Battlefield deception complements the other three components of C3CM in both counter-C3 and C3-protect roles. In countering enemy C3 capabilities, battlefield deception can be used to inject false truths into the enemy's decision-making process. These false truths will distort his ability to respond to the true current situation. This is accomplished by many means including portraying false friendly intentions, capabilities, and dispositions, which can cause the enemy to--
- Mass or disperse.
- Hold in place or commit, or commit prematurely or too late.
- Adopt inappropriate force configurations.
- Adopt a style of maneuver inappropriate to friendly operations.
- Degrade the enemy's C3 capabilities.
- Make him question his intelligence collection and analysis apparatus.
- Induce incorrect maneuver, force allocation, and sustainment decisions.
Battlefield deception can also assist in a C3-protection role. For example, deception operations can nullify or degrade the enemy's target acquisition and offensive capabilities by causing him to diffuse his firepower or to commit maneuver assets at inappropriate times and locations. Deception also assists the operational security posture of the operation by masking indicators of true intent. (See AR 525-20.)
CORNERSTONES OF BATTLEFIELD DECEPTION
There are several important cornerstones for the development of successful battlefield deception operations that all commanders must thoroughly understand and apply. (See Figure 1-5 ) These considerations fall into three broad areas: intelligence support, integration and synchronization, and OPSEC.
Figure 1-5. Cornerstones of Battlefield Deception
Intelligence Support
The threat to successful AirLand Battle operations from enemy intelligence and combat operations accents the importance of using our intelligence estimates in developing operational and tactical plans. Battlefield deception operations rely extensively on the same level of timely and accurate intelligence as do combat operations. To ensure that friendly operations are viewed by the enemy as plausible, and subsequently authentic, we need to know--
- How the enemy decision and intelligence cycles operate.
- What type of deceptive information he is likely to accept.
- What source he relies on to get his intelligence.
- What he needs to confirm this information.
- What latitude he has in modifying or changing an on-going or planned operation.
Integration and Synchronization
Once we have determined where the enemy is susceptible to battlefield deception and what the objective of our deception will be, we must begin to integrate and synchronize deception operations and events into our true combat operation.
This underlines the importance of planning and executing deceptions as part of the planning and execution of our true operations. There should be no such thing as a deception planned separately from the true operation.
History has shown that the deceptions that stand the greatest chance of being accepted as our true capabilities, intentions, or dispositions are deceptions that are--
- Flexible.
- Doctrinally consistent with our actual capabilities and intentions.
- Credible as to current battlefield situations.
- Simple enough not to get confused during the heat of battle.
Operations Security
OPSEC is equally important for deception since it is an integral aspect of overall combat operations. OPSEC and deception are mutually supporting activities. OPSEC supports deception by eliminating or reducing the indicators which give away our true intentions or display our deceptive intent. Deception can produce signatures behind which our true operations may hide. In general, given that the primary aim of deception is to influence the enemy commander, OPSEC establishes the base of secrecy that is necessary for battlefield deceptions to be successful. OPSEC gives us the capability to look at ourselves in order to identify our vulnerabilities and the profiles that we present to the enemy. It is essential that if battlefield deceptions are to be used to gain surprise over the enemy, then our unit's true intentions, dispositions, and capabilities must be concealed, manipulated, and distorted as well as falsified. OPSEC is essential to all successful deception.
OPSEC is not an administrative security program. OPSEC is used to influence enemy decisions by concealing specific, operationally significant information from his intelligence collection assets and decision processes. OPSEC is a concealment aspect for all deceptions, affecting both the plan and how it is executed. (See AR 530-1 for additional information.)
SURPRISE AND SECURITY
Deception, employed properly, can help create surprise, thereby significantly enhancing the commander's opportunity for success.
Battlefield deception can be used during prehostilities, periods of hostilities, and open warfare. The military commander is confronted with achieving surprise over the enemy by maintaining security. It is not essential that the enemy be taken totally unaware, but only that he becomes aware too late to react effectively.
The key to successful deception is security. It is possible to hide the real and portray the false, but without good indicator security, the real operation and the supporting deception operation are at risk.
DOCTRINE
We must assume that any potential adversary is well versed in US Army doctrine--the way we conduct our operations. He will expect our units to behave in certain ways, and if we stray too far, his intelligence analysts will question our conduct. Deceptions must be consistent with doctrinal norms and how units apply those norms in combat.
If the enemy's perception of our doctrine and the doctrine itself are different, we want to play on his perception of the doctrine. The successful deception planner is the one who approaches the problem by putting himself in the enemy's shoes and developing a story believable from this vantage point.
PATTERNS
Patterns are procedural indicators that give a unit an operational profile--how units execute doctrine. Enemy analysts use these patterns to identify the unit and predict its intentions. Once the enemy notes a pattern in the unit's activities, he expects to continue seeing that pattern. Changes in the pattern lead the enemy to question friendly activity, so it is important to use established friendly patterns in the deception.
Since often we are unaware of the patterns we have established, it is difficult to ensure that the required profile detail is present. OPSEC surveys are specifically designed to provide such information. We can achieve the desired operational plausibility by ensuring that deception planners develop deceptions as if they were genuine operations.
A commander who really plans to feint left and conduct the main attack on the right might initially direct his units to plan for a simultaneous attack. During the attack preparations, subordinate unit staffs would execute their normal patterns for this action. When appropriate, the commander could change his order to the appropriate unit and direct the conduct of a feint only. An imaginative planner might find other ways to display established patterns to the enemy. It is important that the enemy sees what he expects to see.
A second consideration is the possibility of deliberately creating patterns in our deception plans. Repeated employment of a particular deception technique or measure will certainly establish a tell-tale pattern. This could signal a deception that in itself is exploitable through subsequent deceptions. Variety and creativity are vital to continued success. Battlefield deception planners must ensure that neither they nor their plans become too predictable.
FACTORS
The following factors of deception are taken from previous operations. They should be carefully considered in planning deception activities. They are as valuable today as they were when the Greeks placed the wooden horse before the walls of Troy.
- Policy. Deception is never conducted as an end in itself. It must support real plans, operations, and objectives.
- Objective. A specific, realistic, clearly defined objective is an absolute necessity. All deception actions must contribute to the accomplishment of the objective.
- Planning. Deception should be addressed in the commander's initial guidance to his staff. Deception planners must have full and continuous access to, and participate in, staff deliberations in order to fully understand and support ongoing planning. Deception planners should be knowledgeable about the operational planning process and current operations. Possibilities for achieving deception should be considered in the estimate process during formulation of the alternative courses of action. Nondeception planners should be consulted for their expertise as well.
- Coordination. There must be close coordination between the deception plan and the corresponding operations plan. Deception activities must be coordinated with other agencies and commands that support the operation and/or may be impacted by the deception. Any unit which could inadvertently compromise an operation through normal actions must also be contacted or controlled.
- Timing. Sufficient time must be allowed to--
-
-- Complete deception planning in an orderly manner.
-- Effect necessary coordination.
-- Promulgate tasks to involved units.
-- Present the deception story to the enemy decision-maker through his intelligence system.
-- Permit the enemy decision-maker to react in the desired way--to pursue a desired course of action.
- Security. Stringent security is mandatory. The true situation or plan must not be revealed to the enemy--OPSEC. Friendly forces not involved or concerned must not be aware of the deception. The specifics of a deception operation must be protected by limited access and other appropriate measures. While the need for strict security must be maintained, security restrictions should not impede timely planning, coordination, and the execution of operations.
- Realism. All deceptive information provided to the enemy must be realistic.
- Flexibility. The ability to react rapidly to changes in the situation and to modify deceptive action is mandatory.
- Intelligence. Deception must be based on the best estimates of the enemy's intelligence collection resources, his decision-making process, and probable intentions and reactions.
- Enemy Capabilities. The enemy decision-maker must be able to execute the action desired.
- Friendly Force Capabilities. Capabilities of friendly forces as depicted in the deception operation must match the enemy's estimates. The deception must be conducted without unacceptable degradation of friendly capabilities.
- Forces and Personnel. Real forces and personnel required to implement the deception plan must be identified. Notional forces must be realistically portrayed.
- Means. Deception must be conveyed through all feasible and available means.
- Supervision. Planning and execution of a deception operation must be continually supervised by the deception planner. (See Appendix A ) All actions must be correlated with the objective and implemented at the proper time.
- Liaison. Constant liaison must be maintained with plans, operations, intelligence, communications, and other appropriate staff personnel to ensure they are aware of the advantage of deception and available to assist in planning and executing such operations.
- Feedback. A reliable method of feedback should exist to gage enemy reaction to the deception. Accurate feedback increases the chances for success in deception operations. Timely intelligence support is critical to obtaining feedback. Feedback may not be direct or immediate, especially in complex situations. However, the advantages to be gained certainly require that deception planners strive for good feedback.
TRAINING
Training in battlefield deception offers added benefits to commanders. The brainstorming associated with developing a workable deception plan causes a greater appreciation for enemy tactics, strengths, weaknesses, and capabilities. This process also encourages more thoughtful and imaginative approaches to friendly doctrine and habits. Deception training contributes to our understanding of--
- What we look like to the human eye, the camera, and electronic devices.
- What we look like under specific conditions.
- How long it takes us to undertake specific tasks.
- The type of indicators the enemy looks for to determine our capabilities and intentions.
- The unit must train for an operation within a scenario that allows the commander to elect deception or the superior tactical headquarters to direct it.
- There must be sufficient maneuver room and training time to permit several options to be analyzed as possible deception stories.
- There must be an opposing surveillance system available to gage the proficiency achieved.
The projection of the measures (false indicators) and the countersurveillance actions to conceal movements and dispositions need to be analyzed to determine the success of the training exercise.
Wars are fought with skills learned through schooling, exercises, operational experience, and self-study. Because of various necessary artificialities, peacetime schooling and exercises tend to lose sight of some of the harsh lessons of war. The essential need for secrecy and information control in war are among the lessons often forgotten.
Deception will work on the battlefield only if it has been practiced in training. The Vietnam War illustrates--
- The loss of operational effectiveness.
- The increase in cost to achieve objectives that resuLt from forgetting this lesson.
- The difficulty and time required to alter peacetime practices.
COMPONENTS OF BATTLEFIELD DECEPTION OPERATIONS
Battlefield deceptions are planned in a manner similar to the planning of standard combat operations. Each component of deception is applicable at operational and tactical levels, but varies in scope. The components of battlefield deception are objectives, target, story, plan, and events.
OBJECTIVES
The deception objective is the ultimate purpose of the deception operation. It is presented as a mission statement. The objective specifies what action or lack of action the enemy must be made to take at a specific place or time on the battlefield as a direct result of the friendly deception operation. Deception objectives relate directly to inappropriate actions and responses that we want the enemy to take. These actions can then be exploited by friendly operations.
TARGET
The target of battlefield deception operations is the enemy decision-maker. He has the authority to make the decision that will execute the deception objective desired by the friendly commander.
Battlefield deception targeting can occur in two ways:
- The enemy decision-maker may be personally targeted with deception operations if his behavior patterns are known and predictable.
- The enemy commander may be doctrinally targeted if the deceiver does not know the enemy decision-maker's behavior patterns.
STORY
The deception story is the friendly intention, capability, or disposition which the enemy is to be made to believe.
PLAN
The deception plan outlines which specific operations, displays, or secrets must be used to convey the deception story to the target. It takes the form of a standard operation plan (OPLAN). It is included in the deception annex. Some deception tasks contained in the deception annex should be moved to paragraph three of the OPLAN or operation order (OPORD) or other supporting functional annexes.
EVENTS
Deception events are friendly indicators and actions that present specific parts of the total deception story to the enemy's intelligence sensors. Some deception events, given the enemy and friendly situation, can be described as nonaction or delayed-action in nature. An example would be delaying the movement forward of logistic bases or artillery support until shortly before a deliberate attack.
Figure 1-6 shows the difference in scope of the deception components at various levels of deception employment.
LEGAL CONSIDERATIONS
Deception operations are constrained, but not forbidden, by international agreements. Ruses of war and the employment of measures necessary for obtaining information about the enemy and the country are considered permissible. The following excerpts are taken from FM 27-10.
-
Absolute good faith with the enemy must be observed as a rule of conduct; but this does not prevent measures such as using spies and secret agents, encouraging defection or insurrection among the enemy civilian population, corrupting enemy civilians or soldiers by bribes, or inducing enemy soldiers to desert, surrender, or rebel. In general, a belligerent may resort to those measures for mystifying or misleading the enemy against which the enemy ought to take measures to protect himself.
Ruses of war are legitimate so long as they do not involve treachery or perfidy on the part of the belligerent resorting to them. They are, however, forbidden if they contravene any generally accepted rule.
ILLEGITIMATE RUSES
-
The line of demarcation between legitimate ruses and forbidden acts or perfidy is sometimes indistinct, but the following examples illustrate gaining an advantage over the enemy by deliberate lying or misleading conduct which involves a breach of faith or when there is a moral obligation to speak the truth. For example, it is improper to feign surrender so as to secure an advantage over an opposing force. Similarly, to broadcast to the enemy that an armistice had been agreed upon when such is not the case would be treacherous. On the other hand it is a perfectly proper ruse to summon a force to surrender on the ground that it is surrounded and thereby induce such surrender with a small force.
- Using a hospital or other building accorded such protection as an observation post or military office or depot.
- Firing from a building or tent displaying the emblem of the Red Cross.
- Using a hospital train or airplane to facilitate the escape of combatants.
- Displaying the emblem on vehicles containing ammunition or other nonmedical stores.
- In general using it for cloaking acts of hostility.
Figure 1-6. Deception component purpose by echelon
Treacherous or perfidious conduct in war is forbidden because it destroys the basis for a restoration of peace short of the complete annihilation of one belligerent by the other.
It is especially forbidden to make improper use of a flag of truce, the national flag, the military insignia and uniform of the enemy, or the distinctive badges of the Geneva Convention.
Flags of truce must not be used surreptitiously to obtain military information or merely to obtain time to effect a retreat or secure reinforcements, or to feign a surrender in order to surprise an enemy. In practice, it has been authorized to make use of national flags, insignia, and uniforms as a ruse. The foregoing rule (Hague Regulation (HR), Article 23, paragraph F of Treaty Series 539 (sic)) does not prohibit such employment but does prohibit their improper use. It is certainly forbidden to employ them during combat, but their use at other times is not forbidden.
The use of the emblem of the Red Cross and other equivalent insignia must be limited to indication or protection of medical units and establishments and the personnel and material protected by GWS and other similar conventions. The following are examples of the improper use of the emblem:
-
Among legitimate ruses may be counted surprises, ambushes, feigning attacks, retreats or flights, simulating quiet and inactivity, use of small forces to simulate large unit (sic), transmitting false or misleading radio or telephone messages, deception of the enemy by bogus orders purporting to have been issued by the enemy commander, making use of the enemy's signals and passwords, pretending to communicate with troops or reinforcement which have no existence, deceptive supply movements, deliberate planting of false information, use of spies and secret agents, moving landmarks, putting up dummy guns and vehicles or laying dummy mines, erecting dummy installations and airfields, removing unit identifications from uniforms, use of signal deceptive measures, and psychological warfare activities.
1 Jervis, Robert, "Hypotheses on Misperception," World Politics (APR 68), p. 455.
2 A. Tversky and D. Kahneman, "The Belief in the Law of Small Numbers," Psychological Bulletin 76 (1971), App. 105-110. (Paraphrased.)
3 A. Tversky and D. Kahneman, "The Belief in the Law of Small Numbers," Psychological Bulletin 76 (1971), pp. 105-110.
4 "Deception Maxims: Fact and Folklore," Central Intelligence Agency.
5 Roberta Wohlstetter, "Pearl Harbor: Warning and Decision," a synopsis of her ideas.
6 Eric Ambler, "Send No More Roses," (London: Weidenfeld & Nicolson Limited, 1977) p. 62.
7 C. Cruickshank, "Deception in World War II," (New York: Oxford University Press, 1979) p. 52.
8 Robert Axelrod, "The Rational Timing of Surprise," World Politics (JAN 79), pp. 228-246.
9 Robert Axelrod, "The Rational Timing of Surprise," World Politics (JAN 79), p. 244.
10 Robert Jervis, "Hypotheses on Misperception," World Politics 20, no. 3 (APR 68), Hypothesis no. 14.
11 Ronald Lewin, "Ultra Goes to War: The First Account of World War II's Greatest Secret Based on Official Documents," (1978), p. 299.
12 Ibid, p. 310.
13 Charles Cruickshank, "Deception in World War II," (1979) p. 56.
15 R. V. Jones, "Irony as a Phenomenon in Natural Science and Human Affairs," Chemistry and Industry (1968), p. 473.
16 David Mure, "Master of Deception" (1980), pp. 81-82.
17 Dr. Alan F. Wilt, "'SHARK' and 'HARPOON': German Cover Operations against Great Britain in 1941," Military Affairs, vol 38, no. 1, (FEB 74), pp. 1-2 (Discussion).
18 C. Cruickshank, "Deception in World War II," (1979), pp. 61-84. 19 Ibid.
20 C. Cruickshank, "Deception in World War II," (1979), pp. 61-84.
21 Ibid.
22 C. Cruickshank, "Deception in World War II," (1979), pp. 61-84.
23 Ibid.
25 C. Cruickshank, "Deception in World war II," (1979), pp. 200-201.
26 C. Cruickshank, "Deception in World War II," (1979), pp. 200-201.
27 Ibid, p. 159.
28 C. Cruickshank, "Deception in World War II," (1979), p. 159.
29 C.J.C. Molony et al, "The Mediterranean and Middle East," vol V, The Campaign in Sicily 1943 and the Campaign in Italy 3 September 1943 to 31 March 1944, pp. 724-754.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|