Upload
exopolitics-hungary
View
225
Download
0
Embed Size (px)
DESCRIPTION
Training for a new generation of online covert operations GCHQ of UK+USA joint. Source: https://firstlook.org/theintercept/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/
Citation preview
SECRET//SI//REL TO USA, FVEY
'i;m‘wprÿss
*>f; iWi
Wyou
2ÿMANThe ART of DECEPTION
”GCHQ"TRAINING FOR A NEW GENERATION OF ONLINE COVERT OPERATIONS
SECRET//SI//RELTO USA, FVEY
SECRET//SI//REL TO USA, FVEY
HSOCHUMAN SCIENCE OPERATIONS CELL
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
OnlineHUMINT
StrategicInfluence
JTRIGDisruption
and CNA
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
ANTHROPOLOGY
PSYCHOLOGY
SOCIOLOGY
***b
V
<
).i>-i
*s
ECONOMICS/
V4
\/
\\
HISTORY
BIOLOGYPOLITICAL SCIENCE
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
Culture DeceptionEthnography Influence
ANTHROPOLOGYEthnography Magic
PSYCHOLOGY
SOCIOLOGY
* fA.
Personality
'ÿ'» •
Compliance Trust
\
iElicitationt
s>/
tt
Obedience s
s
ECONOMICS/fk/
/J
Social Networks
i / Belief\x
HISTORYReligion
BIOLOGYPOLITICAL SCIENCE
Key Leader Engagement Neuroscience
Global TrendsEvolutionary Biology
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
SCIENCE SIGINT
SKILLS SYSTEMS
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
OnlineHUMINT
StrategicInfluence
JTRIGDisruption
and CNA
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
ti
- '
1
v*i%i
>
s
We want to build Cyber Magicians.
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
ocaaOnline Covert Action
Accreditation
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
ACNO KeySkill Strands
Online
HUMINT
Influence &
Info OpsDisruption & CNA
Magic Techniques & Experiment
lIndividual Psychology Professionalism
Deception
Elegance
Group
Performance Creativity
Global
IntuitionMedia
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
ACNO Key
Skill Strands
Online
HUMINT
Influence &
Info OpsDisruption & CNA
Magic Techniques & Experiment
I Decisions
[Emotional
not rational)
Individual Psychology ProfessionalismTrustBELIEF TrustPersonality (OCEAN)
|1How to
apply
x these
DeceptionRemote Assessment
in Digital Cues Persuasive
TechBehaviour Self 10 PRINCIPLES
OF SCAMS HINDSIGHT& [whoI am? Motives &
exploiting them] BIASInfluence Influence EleganceI nCONFIRMATIONPERSUASION
Hofstede
DimensionsBIAS i
Optimising Deception
ChannelsBuilding
RelationshipsHofstede
Dimensions
i
Group iANCHORING
Interaction
across culturesPrates of Reflection to assess if
weare doing op elÿantlyMirroring /
Mimicry iCONSPIRACY
STORIES
CONFORMITY
/ QBEDIANCEPRIMING
iSocial PenetrationMotives
Roles
Influence/Cascade
DIFFUSION OF
INNOVATION/Theory
Virtual Communities
IPerformance CreativitySocial Identity Theory i f
BrainstormingConstructing experience
in mind of target whichshould be accepted so
they don't realise It
How to act / behaveSocial Proof/Herding etc
NARRATIVE-FtlSelf Presentation
in Cyber context;idtr alternate
AGENTICITV Becoming /Targeting
GroupReducing
PATTERNICI ( Intel
/Analysis/
IntuitionMediaHow to do some of this in
real time so need to
understand what you are
doing in this psychology
Reading from digital tells but
going with performance to
reduce my risk but satisfytnquisition
Financial Ecosystem
of MediaThin Slicing
Design,
Retenti on
& Trust
PROPAGANDA TAA
ADVERTISING
Sell - own - EarnBRANDING
MARKETING
TO USA, FVEYSE&
SECRET//SI//RELTO USA, FVEY
ACNO Key
Skill Strands
Online
HUMINT
Influence &
Info Ops
Disruption &
Comp Net Attack
Mental
Health aPsychopathy *
71- 5 USvS3
Decision Making
— RationaleChoice
Crime & punishment
mm [•]% [ÿTag r*iriTi4
Decisions
[Emotional
not rational![ÿXI
Individual Psychology s
( BELIEF Trust FLAMMED
INTERVENTIONPersonality (OCEAN)
1 DeceptionHow to
apply
K these
Remote Assessment
in Digital Cues PersuasiveBehaviour Self 10 PRINCIPLES
OF SCAMS HINDSIGHT& [whoI am? Motives &
exploiting them] BIASInfluence Influence EleganceI CONFIRMATIONPERSUASION
Hofstede
DimensionsBIAS r Optimising Deception
ChannelsBuilding
RelationshipsHofstede
Dimensions
!Group i
ANCHORING/Interaction
across culturesPraces of Reflection to assess if
weare doing op eiÿantlyMirroring /
MimicryCONSPIRACY
STORIES
CONFORMITY
/ QBEDIANCEPRIMING i
!Social PenetrationiMotives
Roles
Influence/Cascade
DIFFUSION OF
INNOVATIONTheory
/Virtual Communities j
Performance CreativityMorality & Ethics Social Identity TheoryBrainstorming
Constructing experience
in mind of target whichshould be accepted so
they don't realise it
How to act / behave !Social Proof/Herding etc
NARRATIVE 1l
4Self Presentation
in Cyber context :>Cyber Culturesacross
Organisations
CCJ/REidtr alternate
AGENTICITV Becoming /Targeting
P !S
Group
Dynamics
Reducing
|-p| GroupEffect iveness
PATTERN 1C Intel
/Analysisj
GlobalLegitimisation ofViolence
IntuitionSOCIAL
NETWORKS ) MediaConstructing
News SystemHowto do some of this in
real time so need to
understand what you are
doing In this psychology
Reading from digital tells but
going with performance to
reduce my risk but satisfyTarget's Inquisition
Financial Ecosystem
of MediaThin Slicing
Design,
Retenti on
& Trust
PROPAGANDA TAA
fias Management
& Legend Building
(decided not to include intraining)
r±iiADVERTISING
Sell - own - EarnBRANDING
MARKETING*TO USA, FVEYSE&
SECRET//SI//RELTO USA, FVEY
Human Science Learning Pathi
AA Strategic
Influence(1day)
Ai
\A
rA Scams
AndfA
fi r
JHkr
Wj uenceit ! I I
i
PsychologyAnd Cyber -psychology “ Tells* i
Online HUMINTACoreDisruption
{1hour)i
1 Engineering
Fur CNA
(e-learning)
u
rCNA and Disruption
•I HSOCm
i* IVW(Vitwifinwlnuftlllt
ocoo
SECRET//SI//RELTO USA, FVEY
SECRET//SI//REL TO USA, FVEY
*ÿ
VI
IIIfV
1
&*I *
1 C, -
*W* I- . i1
V**> w* * L *
* «
•1* EI
41
B*v*
k,
r4r:
•Ifli*< .v*T. Md/
JCKj. _
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
•If?* V1
.«#
i-4
*
’Ii A
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
Magicians, the military and intelligence
3
fe
*rl
Vr4*
I#
* &L 4.
wa f
ri* rrf.
Vr /A-c
//Hr 4
§
(gJt1w*- 1 *ÿf
1
•Hi**
jiy4
ums
Iff
Jean Robert-Houdin
1856 mission on behalf ofNapoleon III to help quell the
Marabout-led uprising inAlgeria.
Jasper Maskelyne
1940s Camouflage workduring the Second World War.
John Mulholland
1950s CIA work on theapplication of conjuring to‘clandestine activities' .
SECRET//SI//RELTO USA, FVEY
P— -1- X Jjn . X X r-. ps . p **’ rt
Dissimulation - Hide the realRepackaging DazzlingMasking
~
ttvr
_- -
PH
HB.i IP™” r-n
1-- X
SE* 1
i*j,
jipi
Jmi w]
- ~ ud
J
W
&
i|f f**,iflV|jl
V
.m j *
t **
.V*L/Vij ivÿ.
x->B / ' J \LKPIJ ».»
. '3t
r -l t(V r
i..*'y:Lt* /
'i.w. -J pJ™
_|ÿ
Th
“ SWr"'i1it. ._. #
“IV--Jt
' 'ÿ
£’,1
V *
» rp_!
PuA"Lÿf
jiW- _rS!H-
.
*7i -‘
,
-laW
,fcJ
Mimicking
Simulation
Inventing Decoying
Show the false
SECRET//SI//RELTO USA, FVEY
SECRET//SI//RELTO USA, FVEY
The psychological building blocks of deception
Ex net
/
Attention SensemakingPerception Behaviour
1
*/ V
/
Affect
SECRET//SI//RELTO USA, FVEY