[1] OODA Loop Citation - Boyd Cycle
[2] David Lambert, "A Cognitive Model for Exposition of Human Deception and Counter-deception" (NOSC Technical Report 1076 - October, 1987). [Main Table]
[3] Fred Cohen, "The Structure of Intrusion and Intrusion Detection", May 16, 2000, http://all.net/ (InfoSec Baseline Studies)
[4] Fred Cohen, "A Theory of Strategic Games with Uncommon Objectives"
[5] Fred Cohen, "Simulating Cyber Attacks, Defenses, and Consequences", IFIP TC-11, Computers and Security, 1999.
[6] F. Cohen, "A Note on the Role of Deception in Information Protection", Computers and Security 1999.
[7] F. Cohen, "A Mathematical Structure of Simple Defensive Network Deceptions", 1999, http://all.net (InfoSec Baseline Studies).
[8] James F. Dunnigan and Albert A. Nofi, "Victory and Deceipt: Dirty Tricks at War", William Morrow and Co., New York, NY, 1995.
[9] F. Cohen, "Managing Network Security: What does it do behind your back?", July, 2000, Network Security Management Magazine.
[10] Field Manual 90-02: Battlefield Deception, 1998.
[11] Bart Whaley, "Stratagem: Deception and Surprise in War", Cambridge: MIT Center for International Studies. 1969
[12] Chuck Whitlock, "Scam School", MacMillan, 1997.
[13] Bob Fellows, "Easily Fooled", Mind Matters, PO Box 16557, Minneapolis, MN 55416, 2000
[14] Thomas Gilovich, "How We Know What Isn't So: The fallibility of human reason in everyday life", Free Press, NY, 1991
[15] Al Seckel, "The Art of Optical Illusions", Carlton Books, 2000.
[16] Colonel Michael Dewar, "The Art of Deception in Warfare", David and Charles Military Books, 1989.
[17] William L. Griego, "Deception - A 'Systematic Analytic' Approach", (slides from 1978, 1983)
[18] Scott Gerwehr, Jeff Rothenberg, and Robert H. Anderson, "An Arsenal of Deceptions for INFOSEC (OUO)", PM-1167-NSA, October, 1999, RAND National Defense Research Institute Project Memorandum.
[19] Fred Cohen, "Deception Toolkit", March, 1998
[20] Bill Cheswick, Steve Bellovin, Diana D'Angelo, and Paul Glick, "An Evening with Berferd" - followed by S. M. Bellovin. "There Be Dragons". Proceedings of the Third Usenix UNIX Security Symposium. Baltimore (September 1992).
[21] F. Cohen, "Internet Holes - Internet Lightning Rods", Network Security Magazine, July, 1996.
[22] F. Cohen, Operating System Protection Through Program Evolution Computers and Security 1992.
[23] F. Cohen, A Note On Distributed Coordinated Attacks, Computers and Security, 1996.
[24] Scott Gerwehr, Robert Weissler, Jamison Jo Medby, Robert H. Anderson, Jeff Rothenberg, "Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities (OUO)", PM-1124-NSA, Novermber 2000, RAND National Defense Research Institute.
[25] Robert E. Huber, "Information Warfare: Opportunity Born of Necessity", News Briefs, September-October 1983, Vol. IX, Num. 5, "Systems Technology" (Sperry Univac) pp 14-21.
[26] Knowledge Systems Corporation, "C3CM Planning Analyzer: Functional Description (Draft) First Update", RADC/COAD Contract F30602-87-C-0103, December 12, 1987.
[27] John J. Ratey, M.D., "A User's Guide to the
Brain", Pantheon Books, 2001.
[In contrast, the auditory nerve only has about 25,000 nerve fibers.
Information must be assessed beginning in the ear itself, guided by the
brain. [28] Sun
Tzu, "The Art of War", (Translated by James Clavell), Dell Publishing,
New York, NY 10036 (1983).
[29] Gordon Stein, "Encyclopedia of Hoaxes", Gale
Research, Inc, 1993, p. 293.
[30] Fay Faron, "Rip-Off: a writer's guide to crimes
of deception", Writers Digest Books, 1998, Cinn, OH.
[31] Richard J. Robertson and William T. Powers,
Editors, "Introduction to Modern Psychology, The Control-Theory View".
The Control Systems Group, Inc., Gravel Switch, Kentucky, 1990.
[32] Charles K. West, "The Social and Psychological
Distortion of Information", Nelson-Hall, Chicago, 1981.
[33] Chester R. Karrass, "The Negotiating Game",
Thomas A. Crowell, New York, 1970.
[34] Robert B. Cialdini, "Influence: Science and
Practice", Allyn and Bacon, Boston, 2001.
[35] Robert W. Mitchell and Nicholas S. Thompson,
"DECEPTION: Perspectives on human and nonhuman deceipt", SUNY Press,
1986, NY.
[36] Donald D. Hoffman, "Visual Intelligence: How We
Create What We See", Norton, 1998, NY.
[37] Charles Handy, "Understanding Organizations",
Oxford University Press, NY, 1993. img35.jpg
[38] National Research Council, "Modeling Human and
Organizational Behavior", National Academy Press, Washington, DC, 1998.
[39]
Bill Cheswick, An Evening with Berferd, 1991.
[40]
Fred Cohen, "The Unpredictability Defense", Managing Network Security,
April, 1998.
[41] David Kahn, "The Code Breakers", Macmillan Press, New York, 1967
[42] Norbert Weiner, "Cybernetics", 1954?
[43] The
HoneyNet Project web site (www.honeynet.org).
[44] Tom Keaton, "A History of Warfare", Vintage
Books, NY, 1993
[45] Andrew Wilson, "The Bomb and The Computer",
Delacorte Press, NY, 1968.
[46] Robert Greene, "The 48 Laws of Power", Penguin
Books, New York 1998
[47] Diana Deutsch, "Musical Illusions and Paradoxes",
Philomel, La Jolla, CA 1995.
[48] Fred Cohen
Cynthia Phillips, Laura Painton Swiler, Timothy Gaylor, Patricia Leary,
Fran Rupley, Richard Isler, and Eli Dart, "A Preliminary Classification
Scheme for Information System Threats, Attacks, and Defenses; A Cause
and Effect Model; and Some Analysis Based on That Model", The
Encyclopedia of Computer Science and Technology, 1999.
[49]
Richards J. Heuer, Jr., "Psychology of Intelligence Analysis", History
Staff Center for the Study of Intelligence Central Intelligence Agency
1999.
[50] Aldert Vrij, "Detecting Lies and Deceipt", Wiley,
New York, NY, 2000.
[51]
National Technical Baseline, "Intrusion Detection and Response",
Lawrence Livermore National Laboratory, Sandia National Laboratories,
December, 1996
[52] Various
documents, A list of documents related to MKULTRA can be found over the
Internet.
[53] Kalbfleisch, Pamela J.
The language of detecting deceit. Journal of Language & Social
Psychology, Dec94, Vol. 13 Issue 4, p469, 28p, 1 chart [Provides
information on the study of language strategies that are used to detect
deceptive communication in interpersonal interactions. Classification
of the typology; Strategies and implementation tactics; Discussions on
deception detection techniques; Conclusion.]
[54] Colonel John Hughes-Wilson, "Military Intelligence
Blunders", Carol & Graf, NY, 1999
[55] John Keegan, "A History of Warfare", Vintage
Books, NY 1993.
[56] Charles Mackay, "Extraordinary Popular Delusions
and the Madness of Crowds", Templeton Publications, 1989 (originally
Richard Bently Publishers, London, 1841)
[57] Donald Danial and Katherine Herbig, ed.
"Strategic Military Deception", Pergamon Books, 1982.
[58] Western Systems Coordinating Council WSCC Preliminary System Disturbance Report Aug 10,
1996 - DRAFT [This report details the August 10, 1996 major system disturbance that separated the Western
Systems Coordinating Council system into 4 islands, interrupting service to 7.5 million customers for periods
ranging from several minutes to nearly six hours.]
[59] Bob Pekarske. Restoration in a Flash---Using DS3
Cross-connects, Telephony. September 10, 1990. [This paper describes
the techniques used to compensate for network failures in certain
telephone switching systems in a matter of a millisecond. The paper
points out that without this rapid response, the failed node would cause
other nodes to fail, causing a domino effect on the entire national
communications networks.]
[60] Mimi Ito, "Cybernetic
Fantasies: Extended Selfhood in a Virtual Community", 1993.
[61] Mark Peace,
"Dissertation: A Chatroom Ethnography", May 2000
[62] Daniel Chandler,
"Personal Home Pages and the Construction of Identities on the Web", 2001
[63]
Fred Cohen, "Understanding Viruses Bio-logically", Network Security
Magazine, Aug, 2000.
[64]
Fred Cohen, "Red Teaming and Other Agressive Auditing Techniques",
Managing Network Security", March, 1998.
[65] SSCSD Tactical
DecisionMaking Under Stress
[66] Fred Cohen, "Method and Aparatus for Network
Deception/Emulation", International Patent Application No
PCT/US00/31295, Filed Octoboer 26, 2000.
[67] Heidi Vanderheiden, Boston University
"Gender swapping on the Net?", http://web.aq.org/~tigris/loci-virtualtherapy.html
[68]
[69]
[70]