LET'S TALK DECEPTION OPERATIONS
"Though fraud in other activities may be detestable, in the management of war it is laudable and glorious, and he who overcomes the enemy by fraud is as much to be praised as he who does so by force."
This discussion of deception operations focuses on three aspects: (1) conceptual framework for deception; (2) doctrinal requirements, including tactics and techniques; and (3) lessons learned in planning and coordination.
Conceptual
Functions like OPSEC, jamming, and deception are often treated as isolated afterthoughts or not integrated into a total plan. To optimize the use of OPSEC, jamming, lethal attack, and deception, consider their use early in the mission-planning (estimate) process. Commanders and staffs at all levels must understand the necessity of deception and the relationship of the other aspects of C3CM to the overall operational plan.
Doctrinal
By and large, deception doctrine was developed and published as a stand-alone, functionally-specific activity. However, deception should be an integral part of the activities that occur to plan, direct, and conduct combat operations at all echelons.
Planning and Coordination
Planning and coordination are the critical phases in deception operations when key decisions are made that will affect the entire operation. The commander and G3 have to make these decisions based upon accurate and timely information, while taking into account METT-T. Without detailed planning based on accurate data and full coordination of deception, the chance of failure is high.



NEWSLETTER
|
Join the GlobalSecurity.org mailing list |
|
|