Fm3 13 4 Deception
Fm3 13 4 Deception
Fm3 13 4 Deception
4
Army Support to Military Deception
FEBRUARY 2019
DISTRIBUTION RESTRICTION:
Approved for public release; distribution is unlimited.
HEADQUARTERS, DEPARTMENT OF THE ARMY
This publication is available at the Army Publishing Directorate site
(https://armypubs.army.mil/) and the Central Army Registry site
(https://atiam.train.army.mil/catalog/dashboard).
FM 3-13.4
Field Manual Headquarters
No. 3-13.4 Department of the Army
Washington, DC, 26 February 2019
i
Contents
Figures
Figure 2-1. Planning steps ........................................................................................................... 2-12
Figure 3-1. Monitoring activities .................................................................................................... 3-4
Figure B-1. Sample Appendix 14 (Military Deception) to Annex C (Operations) ........................... B-1
Tables
Table 1-1. Deception differences ................................................................................................... 1-2
Table 1-2. Sample deception techniques ...................................................................................... 1-8
Table 2-1. The Army tactical deception planning process in the military decisionmaking process 2-4
Table 2-2. Sample terminations ................................................................................................... 2-14
CATEGORIES OF DECEPTION
1-4. Deception activities support objectives detailed in concept plans, operation plans (OPLANs), and
operation orders (OPORDs) associated with approved military operations or activities. Deception applies
during any phase of military operations to establish conditions to accomplish the commander’s intent. The
Army echelon that plans a deception activity often determines its type. The levels of war define and clarify
the relationship between strategic and tactical actions. The levels have no finite limits or boundaries. They
correlate to specific authorities, levels of responsibility, and planning. The levels help organize thought and
approaches to a problem. Decisions at one level always affect other levels. Table 1-1 shows the three types
of deception.
MILITARY DECEPTION
1-5. Military deception (MILDEC) is planned, trained, and conducted to support military campaigns and
major operations. MILDEC activities are planned and executed to cause adversaries to take actions or
inactions that are favorable to the commander’s objectives. The majority of MILDEC planned for and
executed by the combatant command (CCMD) to create operational-level effects. MILDEC is normally
planned before, and conducted during, combat operations. CCMD instructions add guidelines, policies, and
processes that must be adhered to in their respective commands. MILDEC is a joint activity to which the
Army, as the primary joint land component, contributes. Army forces do not unilaterally conduct MILDEC.
MILDEC must adhere to the regulatory requirements found in Army policy and regulations, CJCSI 3211.01
series, and applicable CCMD instructions.
TACTICAL DECEPTION
1-6. Tactical deception is an activity planned and executed by, and in support of, tactical-level
commanders to cause enemy decision makers to take actions or inactions prejudicial to themselves and
favorable to the achievement of tactical commanders’ objectives. Commanders conduct tactical deception
(TAC-D) to influence military operations to gain a relative, tactical advantage over the enemy, obscure
vulnerabilities in friendly forces, and enhance the defensive capabilities of friendly forces. In general, TAC-D
is a related subset of deception that is not subject to the full set of MILDEC program requirements and
authorities. In most circumstances, Army commanders can employ TAC-D unilaterally if certain criteria are
met. In description, TAC-D differs from MILDEC in four key ways:
MILDEC is centrally planned and controlled through CCMD-derived authorities, but TAC-D is
not. TAC-D can be employed unilaterally by tactical commanders with an approved plan.
TAC-D actions are tailored to tactical requirements of the local commander and not always linked
or subordinate to a greater MILDEC plan.
The TAC-D approval process differs from the MILDEC approval process in that it is only required
to be approved at two echelons higher, provided that it adheres to the joint policy for MILDEC
addressed in CJCSI 3211.01. CCMD instructions add guidelines, policies, and processes that must
be adhered to in their respective commands.
Planning for TAC-D is usually more abbreviated, but still focuses on influencing the action or
inaction of enemy decision makers, to gain a tactical advantage over an enemy. TAC-D gains this
relative advantage using deception activities that affect the enemy’s perceptions of friendly
activities and possibly targeting lower-echelon enemy combatants to affect their operations.
1-9. The deception goal is the commander’s statement of the purpose of military deception as it contributes
to the successful accomplishment of the assigned mission (JP 3-13.4). It is always written from the
perspective of the friendly force commander. In initial planning guidance, a deception goal may be general
in nature, requiring refinement during the development of the deception estimate. The deception goal is
usually stated as a positive friendly advantage or condition such as: “Deception will create a decisive combat
power advantage for the coalition main effort attack along AXIS MONTANA.” Like any other form of
military operation, the measure of success for deception is its direct contribution to the accomplishment of
the mission. Deception plans often require investments in effort and resources that would otherwise be
applied against the enemy in a more direct fashion. Consequently, it is important for the commander to first
envision the deception goal in terms of its specific contribution to accomplishing the designated mission.
Some additional examples include—
“I want to use deception to improve the friendly force advantage.”
“I want to use deception to increase freedom of maneuver.”
1-10. The deception objective is the desired result of a deception operation expressed in terms of what the
adversary is to do or not to do at the critical time and/or location (JP 3-13.4). It is the action or inaction that
directly leads to the advantage or condition stated in the deception goal. For example, “Cause the enemy to
hold its armored reserve in a position or status unable to impact friendly forces along AXIS MONTANA
through H+36 hours.”
1-11. The deception target is the adversary decision maker with the authority to make the decision that will
achieve the deception objective (JP 3-13.4). The target thus directs the action or inaction of the military
capability described in the deception objective. The deception target or target set is key individuals on whom
planners focus the deception plan. Understanding the target’s process for receiving and processing
information, assessing a situation, and deciding a COA is critical to a successful deception plan. For more
information on deception targets, see chapter 2.
1-12. In military deception, desired perception is what the deception target must believe for it to make the
decision that will achieve the deception objective (JP 3-13.4). They are personal conclusions, official
estimates, and assumptions that the deception target must believe in order to make the decision that will
achieve the deception objective. These enemy perceptions will form from both objective (observation and
analysis) and subjective (intuition and experience) analysis. They are also heavily impacted by biases,
preconceptions, predispositions, and filters applied in the collection, analysis, delivery, and reception of
information.
1-13. Within military deception, conduits are information or intelligence gateways to the deception target,
such as foreign intelligence entities, intelligence collection platforms, open-source intelligence, and foreign
and domestic news media (JP 3-13.4). They are the pathways to the deception target. Collectively, they define
how the enemy will observe activity in the information environment and how those observations are
transmitted, processed, and ultimately delivered to the decision maker. For more discussion on conduits and
conduit analysis, see discussion beginning in paragraph 2-33.
1-14. In operations security usage, an indicator is data derived from friendly detectable actions and open-
source information that an adversary can interpret and piece together to reach conclusions or estimates of
friendly intentions, capabilities, or activities (JP 3-13.3).
1-15. A filter is any node within a conduit that aggregates, synthesizes, or applies bias information on its
path to the deception target. A node is an element of a system that represents a person, place, or physical
thing (JP 3-0). Planners understand that filters make every conduit unique, affecting the way information is
transmitted through them. To create the most effective portrayal of the deception story, planners assess each
conduit and the filters involved, ensure redundancy with other conduits, and appreciate the relative value of
each conduit as perceived by the target.
1-16. A link is a behavioral, physical, or functional relationship between nodes (JP 3-0). The key link
between selected indicators and the deception story is the tentative identification of one or more enemy
conduits to which the plan exposes the indicator. Observable activities and the threat conduits combine to
produce indicators that can be seen or perceived to aid in collection and decision-making processes. Unless
exposed to one or more active conduits, an indicator is ineffective in conveying the observable or indicator:
the enemy cannot register or respond to what it cannot see. Executions are the tasks or activities that the
friendly unit conducts to put an observable into action.
1-17. A deception event is a deception means executed at a specific time and location in support of a
deception operation (JP 3-13.4). A deception event aims to portray an observable that contributes to desired
perceptions in the deception target.
1-18. In military deception, an observable is the detectable result of the combination of an indicator within
an adversary’s conduit intended to cause action or inaction by the deception target (JP 3-13.4). Observables
are often made up of executions, which can include events, activities, or elements of information that must
be seen or sensed by the target to form the desired perceptions. Observables may gain credibility through the
use of supporting observables. To enhance the probability that the target will receive or accept one or more
of the required observables.
1-19. MDOs may need to develop supporting observables. Supporting observables enhance the deception
story and help create a believable context for the required observables. Planners identify all the activities
normally associated with a specific activity or event (the required observable). From those activities, the
planner analyzes which of those associated activities the target would normally collect against and use as a
significant indicator of usual or consistent friendly behavior. The activities must be fully compatible with all
elements of the deception story and carefully sequenced with other observables to have their desired effects.
1-20. Within military deception, a competing observable is any observable that contradicts the deception
story, casts doubt on, or diminishes the impact of one or more required or supporting observables (JP 3-13.4).
To minimize the impact of competing observables on enemy analysis, they must be mitigated as part of the
deception plan. Examples of mitigation for competing observables include protection with OPSEC, including
DISO; neutralization of the enemy conduit to which competing observables are likely to be exposed; or
assumption of risk based on detailed analysis of minimal impact to the operation. The availability of resources
and time are often limiting factors in preparing such supporting measures, but they can be extremely valuable
in raising the credibility and verifiability of the deception story and the probability of deception success.
1-21. Patterns are multiple-repetitive indicators that give the enemy an operational profile. Enemies use their
intelligence collection assets to analyze patterns to identify the unit and predict its mission. Changes in pattern
can affect how an enemy perceives friendly actions.
1-22. The deception story is a scenario that outlines the friendly actions that will be portrayed to cause the
deception target to adopt the desired perception (JP 3-13.4). It is a succinct statement or narrative of exactly
what the MDO wants the target to believe to be the true situation, then decide and act on that basis. It is
usually made up of the deception observables and the deception desired perceptions in a specific sequence to
create deception events. MDOs write the deception story from the perspective of the enemy so it reads like
the enemy’s intelligence estimate about friendly forces’ actions and intentions.
PRINCIPLES OF DECEPTION
1-23. Just as the principles of war provide general guidance for the conduct of military operations, the six
principles of deception provide guidance to plan deception. The principles of deception are—
Focus.
Objective.
Centralized planning and control.
Security.
Timing.
Integration.
FOCUS
1-24. The deception plan should focus on the thought process of the threat decision maker who has the
authority and capability of causing the desired actions. The enemy’s intelligence, surveillance, and
reconnaissance is normally not the target; rather, it is a primary conduit used in the deception plan to convey
selected information to the decision maker. Planners must clearly understand the difference between
intermediate conduits and the intended target. Focused deception must cause an action or inaction of the
enemy force. In order to do this, there must be existing conduits to the deception target or a reasonable
expectation that conduits can establish.
OBJECTIVE
1-25. Deception plans focus actions and resources that motivate an enemy to decide to take (or not to take)
specific desired actions. The plan cannot focus solely on motivating the target to believe certain things; it
must lead to the target making a specific decision to act or not act.
organizations adhere to a single plan. Once the commander approves the deception plan, the designated
operational element monitors the situation and its effects on the target, as well as friendly and partnered
forces. The MDO, working with the deception working group (DWG), ensures synchronization,
deconfliction, and OPSEC.
SECURITY
1-27. Successful deception requires strict security that begins before execution with measures to deny the
enemy knowledge of the friendly force’s intent to deceive. Successful planners apply strict need to know
criteria to each aspect of the deception plan. Maintaining the security of the deception means limiting the
number of informed planners and participants to those needed. The MDO must develop and maintain access
rosters and other security controls to limit exposure of operational deception activities.
TIMING
1-28. The most critical aspects of deception planning are beginning proper synchronization with the
commander’s intent and maintaining synchronization during execution. Timing in deception operations is
crucial. The challenge is to get the deception target to act in accordance with the deception objective within
the timelines required by the friendly operation. Planners must conduct a thorough conduit analysis to
understand the amount of time required for an observable to pass through filters and nodes before reaching
an enemy decision maker. This means that friendly deception executions must be completed in a manner that
accounts for the time consumed by the enemy’s intelligence collection and analysis process, the enemy’s
decision-making process, and the enemy’s activity that is to be exploited by friendly forces. Timing must be
synchronous among friendly deception actions taken, the assimilation and reaction processes of the enemy,
and dependent friendly operations.
INTEGRATION
1-29. Deception is an integral part of an operation that planners must integrate, at all levels, throughout the
planning process. This integration includes developing a concept for deception that supports the overall
mission as part of COA development. Planners must also integrate deception plans with higher headquarters
plans. Deceptions must be consistent with Army doctrinal norms. The MDO assists the staff in integrating
the deception operation throughout all phases of the operation. This begins with planning, continues through
execution, and concludes with the termination of the deception.
AMBIGUITY-INCREASING DECEPTION
1-31. Ambiguity-increasing deception provides the enemy with multiple plausible friendly COAs.
Ambiguity-increasing deception is designed to generate confusion and cause mental conflict in the enemy
decision maker. Anticipated effects of ambiguity-increasing deception can include a delay to making a
specific decision, operational paralysis, or the distribution of enemy forces to locations far away from the
intended location of the friendly efforts. Ambiguity-increasing deception is often directed against decision
makers known to be indecisive or risk-adverse.
1-32. These deceptions draw attention from one set of activities to another. They can create the illusion of
strength where weakness exists, or create the illusion of weakness where strength exists. They can also
acclimate the enemy to particular patterns of activity that are exploitable later. For example, ambiguity-
increasing deceptions can cause the target to delay a decision until it is too late to prevent friendly mission
success. They can place the target in a dilemma for which no acceptable solution exists. They may even
prevent the target from taking any action at all. This type of deception is typically successful with an
indecisive decision maker who is known to avoid risk.
AMBIGUITY-DECREASING DECEPTION
1-33. Ambiguity-decreasing deceptions manipulate and exploit an enemy decision maker’s pre-existing
beliefs and bias through the intentional display of observables that reinforce and convince that decision maker
that such pre-held beliefs are true. Ambiguity-decreasing deceptions cause the enemy decision maker to be
especially certain and very wrong. Ambiguity-decreasing deceptions aim to direct the enemy to be at the
wrong place, at the wrong time, with the wrong equipment, and with fewer capabilities. Ambiguity-
decreasing deceptions are more challenging to plan because they require comprehensive information on the
enemy’s processes and intelligence systems. Planners often have success using these deceptions with strong-
minded decision makers who are willing to accept a higher level of risk.
TACTICS
1-34. Deception tactics can be characterized as operational-level constructs that encompass a broad range of
deceptive activity and information integrated as a component of the overall plan. Deception plans apply five
basic tactics: diversions, feints, demonstrations, ruses, and displays. These tactics are often best employed in
TAC-D to support the commander’s objectives. The selection of tactics and their use depends on planners’
understanding the current situation as well as the desired deception goal and objective.
DIVERSION
1-35. A diversion is the act of drawing the attention and forces of an enemy from the point of the principal
operation; an attack, alarm, or feint that diverts attention (JP 3-03). The goal of diversion is to induce the
enemy to concentrate resources at a time and place that is advantageous to friendly objectives.
FEINT
1-36. In military deception, a feint is an offensive action involving contact with the adversary conducted for
the purpose of deceiving the adversary as to the location and/or time of the actual main offensive action
(JP 3-13.4). A feint is designed to lead the enemy into erroneous conclusions about friendly dispositions and
concentrations. A series of feints can condition the enemy to react ineffectively to a future main attack in the
same area.
DEMONSTRATION
1-37. In military deception, a demonstration is a show of force similar to a feint without actual contact with
the adversary, in an area where a decision is not sought that is made to deceive an adversary (JP 3-13.4). A
demonstration’s intent is to cause the enemy to select a COA favorable to friendly goals.
RUSE
1-38. In military deception, a ruse is an action designed to deceive the adversary, usually involving the
deliberate exposure of false information to the adversary’s intelligence collection system (JP 3-13.4). A ruse
deceives the enemy to obtain friendly advantage. A ruse in deception is normally an execution based on guile
or trickery that contributes to the larger deception plan.
DISPLAY
1-39. In military deception, a display is a static portrayal of an activity, force, or equipment intended to
deceive the adversary’s visual observation (JP 3-13.4). Displays include the simulation, disguise, or portrayal
of friendly objects, units, or capabilities in the projection of the deception story. Such objects, units, or
capabilities may not exist but are made to appear that they exist.
TECHNIQUES
1-40. The application of techniques varies with each operation depending on time, assets, and objectives.
Planners assess which techniques to apply based on feasibility, availability, and effectiveness. Table 1-2
provides sample deception techniques.
Table 1-2. Sample deception techniques
Technique Deception created
Amplifying signatures To make a force appear larger and more capable or to simulate
the deployment of critical capabilities.
Suppressing signatures To make a force appear smaller and less capable or to conceal
the deployment of critical capabilities.
Overloading enemy sensors To confuse or corrupt their collection assets by providing
multiple false indicators and displays.
Repackaging known organizational To generate new or deceptive profiles that increase or decrease
or capability signatures the ambiguity of friendly activity or intent.
Conditioning the enemy To desensitize to particular patterns of friendly behavior and to
induce enemy perceptions that are exploitable at the time of
friendly choosing.
Reinforcing the impression To mislead by portraying one course of action when actually
taking a different course of action.
Conditioning the target by To believe that an apparently standard routine will be pursued,
repetition whilst in fact preparing a quite different course of action.
Leading the enemy by substitution To believe that nothing has changed by covertly substituting the
false for the real, and vice versa.
Leading the enemy by mistake To believe that valuable information has come into their
possession through a breach of security, negligence, or
inefficiency.
DECEPTION MAXIMS
1-41. The military derives deception maxims from game theory, historical evidence, social science, and
decision analysis theory. These maxims are offered to enhance the deception concepts provided in this
publication. They provide additional insight that commanders and their staffs can use to develop their plans.
Note. These deception maxims originated in Deception Maxims: Fact and Folklore. See the
Source Notes.
MAGRUDER’S PRINCIPLE
1-42. Magruder’s principle states that it is generally easier to induce the deception target to maintain a pre-
existing belief than to deceive the deception target for the purpose of changing that belief. Magruder’s
principle exploits target biases and the human tendency to confirm exiting beliefs. Magruder’s principle
alludes to two paths. A path of the deceiver changing the belief of a target and a path of maintaining a present
belief. The principle then advises the better of the two paths. Magruder’s principle is named for Major
General John Magruder. During the Civil War, he was tasked with impeding Major General George
McClellan’s advance on Richmond with a numerically superior force. Magruder deceived McClellan by
encouraging McClellan’s belief that he faced a larger enemy than he actually faced. In using Magruder’s
principle, MDOs provide the targeted decision makers with information that reinforces their expectations for
what they believe to be true. This reinforces the target’s pre-existing perceptions. Any bias is potentially
exploitable. Most targets are unaware of how deeply their biases influence their perceptions and decisions.
Most people resist letting go of existing opinions and tend to seek information that reinforces their own bias.
1-43. An example of this principle occurred with the selection of the invasion site and its cover plan for the
D-Day invasion of France. Using reconnaissance and communications intercepts, the Allies learned that
Hitler and his senior military advisors believed that the most likely place for the Allied invasion would be in
the Pas de Calais region. This was a viable plan as it provided better air cover and a shorter transit time from
England; in fact, it was a reverse of their plan to invade England in 1940. The Allies were able to exploit and
reinforce the enemy’s expectations to the extent that the Germans had a difficult time reacting to the actual
landings in Normandy.
JONES’ DILEMMA
1-48. This principle is named after Reginald Victor Jones, a British professor heavily involved in solving
science and technology intelligence challenges. In this deception, the target receives information through
multiple means and methods, from many angles, throughout an operational environment. Deception generally
becomes more difficult as the number of conduits available to the deception target to confirm the real situation
increases. However, the greater the number of conduits that are deceptively manipulated, the greater the
chance the target will believe the deception. Planners must balance the need to disrupt or deny enemy
capabilities with the need to preserve select deception conduits to the enemy decision maker.
natural manner. The harder the target has to work to acquire it, the more likely the target will believe it as
credible.
1-50. Important military information that is too easy to obtain is usually suspect. Information that falls into
the enemy’s hands must appear to be the result of legitimate collection activities. People naturally tend to
believe information earned more than information given. An example of this technique could be feeding
mission information to the enemy through a trusted source instead of making the information general
knowledge.
1-51. A common characteristic of successful deceptions is that they were designed to co-opt skepticism by
requiring the target to participate either by physically obtaining the evidence or analytically by interpreting
it. However, if the deception is too subtle, it risks that the target will fail to perceive the deception story at
all.
1-52. An example of this principle is from early in World War II, when a German aircraft heading for
Cologne became lost and made a forced landing near Malines in Belgium. Belgian authorities soon arrested
the three passengers, two Wehrmacht officers and a Luftwaffe major. They were taken to the police station
and left alone briefly. They attempted to burn some documents they were carrying. They were top secret
documents containing attack plans for Holland and Belgium. However, the documents failed to burn and fell
into the hands of Belgian authorities. The authorities believed that the documents were a part of a deception
plan because the Germans could not be careless enough to allow actual war plans to fall into the hands of the
Allies. This example shows a misclassification error in which a real windfall was dismissed as false because
it was too easy to obtain.
MINIMIZE FALSEHOOD
1-54. The less the deception relies on false information, the greater the chance of success. Although
deception, by its nature, implies the use of false information to shape the target’s perceptions, each portrayal
of falsehood increases the risk of failure by increasing susceptibility to competing observables. This
deception principle resembles the principle of economy of force—use only the amount of false information
needed to produce the desired perceptions. Any falsehoods should be supported by elements of truth. This
way the target discovers that, everywhere it turns, it finds verifiable information that makes any questionable
part of the deception more believable.
SEQUENCING RULE
1-57. Planners must sequence deception activities and maintain them for as long as possible to maximize the
deception story. OPSEC measures can help planners mask unit observables that would otherwise reveal the
unit’s mission and intent until the last possible instant. To be effective, deception and OPSEC activities must
be sequenced and coordinated in both time and space, and in conjunction with adjacent or pre-existing
operations.
IMPORTANCE OF FEEDBACK
1-58. Planners must develop indicators that will determine the success or failure of the deception. An
assessment plan uses measures of effectiveness (MOEs) to determine if the enemy has adopted, rejected, or
countered the deception plan. Assessing MOEs gives the commander the necessary feedback to continue,
adjust, or terminate a deception plan. When developing the deception plan, planners should build associated
MOEs for key events.
1-59. An example of the importance of feedback happened during World War II. The British developed a
top-secret cryptographic tool called ULTRA that enabled the British to read German codes. The information
that ULTRA provided to the Allies was a critical element to the success of the Allied invasion of Normandy.
The Allies knew through ULTRA that the German troops remained in Norway and concluded through
feedback that the deception was successful.
DECEPTION MEANS
1-61. Deception means are methods, resources, and techniques that can be used to convey information to the
deception target (JP 3-13.4). There are three basic categories of deception means: physical, technical, and
administrative. An individual deception means may have multiple attributes that allow it to be characterized
in more than one category. Planners normally employ deception means in complementary variety to mislead
multiple types of enemy sensors to increase credibility and the likelihood of creating the desired perception.
Means provide the signatures, associations, and profiles of friendly purported activities to the enemy. For
additional deception means and the authorities to employ them, refer to CCMD instructions and request
guidance from the CCMD.
PHYSICAL MEANS
1-62. Physical means are resources, methods, and techniques used to convey or deny information or
signatures normally derivable from direct observation or active sensors by the deception target. Most physical
means also have technical signatures visible to sensors that collect scientifically or electronically. Planners
typically evaluate physical means using characteristics such as shape, size, function, quantity, movement
pattern, location, activity, and association with the surroundings. Examples might include—
Movement of forces.
Exercises and training activities.
Decoy equipment and devices.
Tactical actions.
TECHNICAL MEANS
1-63. Technical means are resources, methods, and techniques used to convey or deny selected information
or signatures to or from the deception target. These means manipulate electromagnetic, acoustic, or other
forms of energy or through olfaction. Technical means often use technical equipment.
1-64. Technical means may be applied with corresponding physical means or alone to replicate something
physical that is absent from direct visual observation. As with any use of friendly military material resources,
any use of technical means to conduct deception must comply with U.S. and international law. Planners
integrate technical means with other technical activities of the operation. Examples of technical means might
include—
The establishment of communications networks and interactive transmissions that replicate a
specific unit type, size, or activity.
The emission or suppression of chemical or biological odors associated with a specific capability
or activity.
Multispectral simulators that replicate or mimic the known electronic profile of a specific
capability or force.
Selected capabilities that disrupt an enemy sensor or affect data transmission.
1-65. Electromagnetic deception is the deliberate change of electromagnetic energy intended to convey
misleading information to an enemy or to enemy electromagnetic-dependent weapons. The misinformation
results in degrading or neutralizing the enemy’s combat capability. Types of electromagnetic deception
include manipulative, simulative, and imitative deception. Manipulative deception involves actions to
eliminate revealing—or to convey misleading—electromagnetic telltale indicators that an enemy can use.
Simulative deception involves actions to simulate friendly, notional, or actual capabilities to mislead hostile
forces. Imitative deception introduces electromagnetic energy into enemy systems that imitate enemy
emissions. For more information on electromagnetic deception, see FM 3-12. For more information on
acoustic, other energy, or olfactory means, see ATP 3-53.1.
ADMINISTRATIVE MEANS
1-66. Administrative means are resources, methods, and techniques to convey or deny selected written, oral,
pictorial, or other documentary information or signatures to or from the deception target. They normally
portray information and indicators associated with coordination for ongoing or planned military activity to
the deception target. Examples of administrative means normally visible to an enemy at some level might
include—
Movement, transit, or overflight requests including flight planning, port call, or traffic control
coordination.
Basing inquiries or construction requests.
Other preparatory coordination associated with a military operation normally done through
unclassified channels.
with other deception activities to mislead enemy intelligence collection and direct the enemy’s attention away
from actual forces. Decoys must appear realistic to the enemy sensors to be effective. See ATP 3-37.34 for
additional information on camouflage, concealment, and decoys.
INFORMATION QUALITY
1-69. Information quality refers to the accuracy, completeness, relevance, and believability of information
available for decision making. Deception should affect the quality of information available for enemy
decisions in the following ways:
Portray to the enemy true information that supports the deception story.
Deliberately present misleading information and indicators to enemies to degrade the accuracy of
enemy information.
Give enemy decision makers a false sense of completeness of their understanding about friendly
forces or intentions.
Cause enemy forces to misjudge the relevance of available information and misallocate
operational or intelligence resources.
Cause enemies to doubt the veracity of their own intelligence assessments.
1-70. MDOs protect the quality of information available for friendly decisions and public dissemination by
instituting internal processes to identify and isolate information generated as a by-product of any deception
activity. This protection helps prevent the commander from reaching erroneous conclusions because the staff
unknowingly integrated the content or output of the deception efforts as accurate information. This also
ensures the information made public is not part of any deception plan that would result in a loss of public
trust.
COMMANDERS
1-72. The commander’s role is critical in planning deception. The commander determines the utility of
deception’s contribution to achieving objectives. Commanders decide to develop a deception plan after
evaluating the analysis and recommendations from the MDO. Commanders should guide applicable
deception executions while understanding their potential importance during planning and execution. The
commander has explicit and inherent responsibilities for the deception effort. The commander—
Assesses higher headquarters’ plans and orders for stated and implied deception tasks.
Considers the ways deception can support every operation, mindful of deception maxims to gain
maximum impact.
States the tentative deception objective in the initial planning guidance.
Approves the deception objective.
Allocates necessary resources.
When required, seeks appropriate approval to employ certain deception means.
Determines when to exploit deception or counterdeception.
G-2
1-73. The G-2 assists the commander by identifying deception objectives to complement operational
objectives. With the commander leading the efforts, the G-2 identifies deception objectives that apply to
operations, intelligence, and counterintelligence resources. The G-2—
Analyzes the threat and the enemy’s capability to process, filter, and evaluate intelligence on the
friendly situation.
Provides assessments on the threat’s vulnerabilities to deception.
Assesses threat targets, sensors, most dangerous and most likely COAs, acceptance of the
deception story, and MOEs.
Provides comprehensive assessments and continual feedback to the MDO in support of deception
planning, execution, and deception termination.
Supports counterdeception operations to protect friendly deception operations and to expose threat
deception attempts.
Responds to MDOs’ requests for information (RFIs) concerning analysis data for behavioral
influences or human factors for threat military, paramilitary, or violent extremist organizations.
Helps to prevent reporting of unintentionally collected deception information to the commander
as valid facts.
G-3
1-74. The G-3 recommends the use of resources including those required for deception. For deception, the
G-3—
Recommends the deception objective, story, and plan to the commander.
Coordinates the deception effort through the information operations cell.
With the staff judge advocate, ensures that the deception effort is planned and conducted in
accordance with the U.S. laws, rules of engagement, and the law of war.
Supervises execution of the deception plan.
Submits detailed and clear RFIs to the G-2 for information and intelligence that is key to deception
planning, execution, and assessment.
Provides feedback to the G-2 on intelligence products to include clarification or additional RFIs
if needed.
G-5
1-79. The G-5 has staff planning and supervisory responsibility for—
Maintaining contingency plans and initiating crisis action planning efforts.
Coordinating to ensure deception planning is included in OPLANs, concept plans, and campaign
plans.
Incorporating deception planning at the beginning of the planning process.
PREPLANNING
2-1. The complexity and sensitivity of deception requires detailed planning that begins with preplanning.
MDOs have three preplanning considerations: capability development, planning guidance, and mission
analysis. A successful deception plan incorporates preplanning considerations as well as flexibility to lessen
the risk of failure. When preplanning, MDOs create a baseline analysis, prepare deception planning guidance,
and complete mission analysis.
BASELINE ANALYSIS
2-2. Baseline analysis is preplanning that ensures the organization has the requisite staff, methods, and tools
to plan deception. Baseline analysis entails acquiring basic information on available deception means. This
includes information on friendly doctrine and tactics as well as technical characteristics of employed combat
systems. It also includes basic data on friendly intelligence and counterintelligence resources and operations.
MISSION ANALYSIS
2-7. All military planning includes mission analysis. Mission analysis involves gathering, analyzing, and
synthesizing information to get oriented on current conditions of an operational environment. MDOs in
conjunction with staff planning efforts conduct mission analysis to better understand the situation and
problem and to identify what deception the unit can accomplish, when and where it should be done, and why
to do it—the purpose of the deception operation. Deception mission analysis begins before the Army tactical
deception planning process and is always properly informed by current operations and planning efforts.
2-8. The deception goal and its associated deception objectives are key outputs of deception mission
analysis, and the foundation for subsequent deception planning. They provide the commander and MDOs
with a solid understanding of how the deception supports the overall operation and establishes the conceptual
framework for the deception plan. An effective deception does not have to be elaborate or complex.
Simplicity is often preferred.
2-9. MDOs need to participate in and have their efforts informed by conventional planning efforts.
Conventional and deception planning horizons occur simultaneously in parallel. During mission analysis, the
MDO begins with analyzing and assessing an operational environment and information environment.
Deception may be a feasible option, if appropriate to the mission, and if there is a possibility of success.
Issues that planners consider when determining if deception is a viable COA include—
Availability of assets.
Understanding any potential deception targets.
Suitability.
Time.
Risk.
Availability of Assets
2-10. MDOs consider the availability of assets to determine if sufficient assets exist to support both the
operation and the deception. There are few assets specifically designed and designated for deception. This
means plans may require shifting assets from supporting the operation to the deception plan. Commanders
consider the risks to ascertain that shifting assets to support deception does not adversely affect the operation
or prevent mission success. Resource development includes collecting potential target data sources,
identifying potential conduit systems, and cataloging potential deception means. Resource development also
includes the collection of essential foreign and friendly situation and background information needed to
initially to organize operations and assess general capabilities.
Suitability
2-12. MDOs consider suitability. Some missions are better suited to deception than others are. When a unit
has the initiative and has some control over the area of operations, then deception is more suitable. In some
situations, specific personnel or organizations are better suited to execute deception operations than others
are. Deception planners determine if conditions are appropriate to conduct deception and make a
recommendation to commander. The decision ultimately resides with the commander. Conditions in which
deception are appropriate include the following:
The enemy has an advantage that cannot be overcome without using deception, for example,
advantageous force strength, capability, agility, or situational awareness.
The enemy has known preconceptions that can be exploited.
The enemy has known flaws in its decision-making process.
The enemy is under pressure to act.
The enemy is susceptible to suggestion.
Time
2-13. MDOs consider time available. Time is a key element to consider when developing the deception story.
MDOs determine how much time they have to present the deception story and to estimate how much time
the deception target will use make a decision and direct the desired action. The available time may determine
the scope and depth of the story. MDOs carefully time deception events to synchronize them with the
approved plan.
Risk
2-14. An important planning consideration is the mitigation of identified risk. Risk is a key factor that must
be reexamined during all phases of deception planning and execution (see paragraph 2-126). The MDO must
evaluate any substantial risk which may include—
Risk of deception failure.
Risk of compromise.
Risks associated with a successful deception.
Exposure of means or feedback channels.
assumptions that later require validation to continue with planning. Planners track these assumptions, align
them with an open RFI, and consider them during risk analysis. During the unit’s COA analysis (war gaming),
planners help refine the estimate and may add support to key planning assumptions about probable enemy
responses to planned friendly activity. The greater the number of assumptions underpinning a deception plan,
the higher the risk that one or more assumptions will prove false and threaten the plan’s success.
2-20. The deception running estimate identifies key enemy decision makers and develops individual or group
profiles. The analysis of the enemy military decision-making structure includes identifying key decision
makers who exercise some level of direct control over the enemy capabilities. These individuals or groups
are potential deception targets. As such, the MDO works with the G-2 to collect as much available
information relating to their backgrounds, psychological profiles, personal relationships, key influencers,
known biases, predispositions or vulnerabilities, current perceptions, and previous behavior in similar
circumstances. With that information, the planner identifies the enemy’s most probable and most dangerous
COAs related to the deception goal.
2-21. The MDO briefs the initial running estimate to the commander in private during mission analysis to
seek approval of the deception goal and its objectives, receive refined commander’s planning guidance for
deception, and ensure nesting within the supported plan. The commander may provide additional guidance
concerning specific deception COAs the staff should address when preparing estimates. Once approved, the
deception goal and its objectives become the focus for all subsequent deception planning.
Step 2: Identify and analyze the deception target. Step 3: Course of action
Step 3: Identify desired perceptions of the deception target. development
Step 4: Develop deception observables and means.
Step 5: Develop the deception story. Step 4: Course of action analysis
Step 6: Develop the deception event schedule.
→ and war gaming
Step 7: Develop OPSEC and other protection measures.
Step 8: Develop feedback criteria. Step 5: Course of action
Step 9: Develop a termination plan. comparison
2-23. Because of its inherent sensitivity, MDOs usually need to protect access to deception planning. As a
result, deception planning occurs in an access-controlled area rather than through open discussion in the plans
shop. Key staff members and leadership who are part of the deception planning effort plan discretely to
integrate and deconflict deception planning outputs into the overall planning effort. Planners balance the need
to conduct adequate coordination with a parallel planning process during deception planning against the need
to maintain the secrecy required for effective deception operations. MDOs establish and use strict need to
know criteria to determine which specific staff members will participate in deception planning. The criteria
may specify separate levels of access to facilitate coordination, thus allowing more individuals access to the
less sensitive aspects of the deception plan.
2-36. Decision-making style refers to the deliberative process that a selected decision maker uses to reach a
conclusion. The selection and use of a common framework allows intelligence analysts and planners to focus
their analysis and discussions to best support achievement of objectives. Many formal and informal decision-
making styles exist. Once an enemy selects a framework, intelligence analysts and planners work to identify
what conditions might cause adjustments to that base style.
2-46. Whatever method (or combination of methods) the MDO uses, the more conduits that the planner and
supporting G-2 intelligence analysts can identify and map, the greater the chance of synchronizing friendly
deception operations to feed multiple conduits simultaneously, and the increased potential success of the
deception. Additionally, when the MDO classifies conduits as simple or complex, then the planning team can
share the context more effectively. A simple conduit transmits data to the intended decision maker without
applying an intermediate filter. A complex conduit includes one or more filters that might substantially alter
the content, add context to the observable, or alter the timeframe for delivery.
2-47. Ideally, the MDO selects multiple conduits to deliver information to the deception target and sequences
the delivery in a manner that builds and confirms the deception story. Such delivery can cause information
about the same observable to be delivered at multiple differing times and from many sources. This technique
can reinforce the desired ambiguity-increasing or ambiguity-decreasing effect. To enhance the believability
of the deception story, the MDO works with OPSEC and other IRCs to manage competing observables (any
indicator that might contradict the deception story) and to limit the function of conduits that might register
and report them.
2-48. While the initial discussion of a given conduit might address the relevant information flow in simple
terms, planners cannot actually fully exploit that conduit until they analyze it in detail. Intelligence analysts
and MDOs must understand and subsequently collaborate to diagram key elements and complete a worksheet
or other planning template that corresponds to each conduit for use in future planning.
Verifiable
2-60. A target can verify an effective deception story through multiple channels and by using all intelligence
sources. When making sure that the deception story is verifiable, deception planners avoid single-source
inputs that would provide the whole story. Multiple conduits provide pieces of a puzzle that combine to create
the deception story. Employing various conduits in a timely and believable manner is of the utmost
importance. This dynamic clearly underscores the value and importance of the IO officer in the deception
process.
Executable
2-61. A supported commander has the resources and authority to execute a deception story and the time
available. Time, and echelon when it is employed, may limit the scope and depth of the deception story,
which is why planners continually assess the synchronization and deception event schedule.
Believable
2-62. A believable deception story corresponds to the deception target’s perceptions of the friendly force’s
mission, intentions, and capabilities. An enemy will likely discount notional plans or forces that grossly
distort actual friendly capabilities. An enemy often meets unverifiable deception with suspicion and doubt.
Additionally, enemies will not believe stories that closely copy past and already exposed deception
operations. The deception story must be believable both in its parts and as a whole. If one or more of the
parts do not fit into the complete picture, they may create enough suspicion to reveal the deception.
Consistent
2-63. An effective deception story matches the target’s understanding of actual friendly doctrine, historical
force employment, campaign strategy, tactics, current operational situation, and conditioned patterns of
friendly activity. The deception element must have as complete a picture as possible of the deception target’s
level of knowledge and belief in these areas.
The location a particular activity fits in the normal sequence of events for the type of operation
being portrayed.
The time required for the enemy intelligence collection assets to collect, analyze, and report on
the activity.
The time required for the deception target to process, decide, and execute the desired action.
The time required to execute the desired action or inaction.
The impact of filters on the timeliness of observables.
2-73. The MDO anticipates that, as the plan proceeds in execution, circumstances of termination will change.
A termination concept entirely suited to the initial set of conditions often differs from what is required as the
deception matures. The termination concept identifies the timing to release information about the deception.
It may provide a cover story should questions arise about the role of deception in a particular operation.
Controlling the exposure of the existence of a deception operation or of elements of a deception may be
difficult because of the nature of the operation. A termination concept should also include classification and
dissemination instructions for deception-related information.
2-74. Potential termination scenarios are illustrated in table 2-2 on page 2-14.
during the capability development phase of the deception plan can go a long way toward alleviating
deficiencies. For information on development of data collection plans, see chapter 4.
INTELLIGENCE SUPPORT
2-78. MDOs frequently make informed assumptions on various topics to continue planning. In addition to
RFIs associated with completing the deception event schedule, MDOs often require a high level of detail and
predictive analysis. Information on potential deception conduits comes from many sources and must be
collected and available so a commander can execute a deception plan with confidence. Once combat
operations have begun and U.S. forces have disrupted or neutralized enemy pre-conflict military decision-
making structure and flow, access to sensors, and decision-making support networks, the conduits should be
reassessed. Rapid enemy adaptation to new conditions in an operational environment requires equally agile
friendly intelligence support. Unless deception RFIs are aligned with the priority intelligence requirements,
or the deception plan is supported with dedicated intelligence analysis and resources, the deception plan is at
risk of becoming desynchronized or ineffective.
2-79. Focused intelligence support is essential to the successful planning, execution, and assessment of any
deception. A well-constructed deception plan requires substantive intelligence support. Intelligence supports
the execution of effective deception in five ways:
Identifies enemy decision makers and the information conduits associated with them.
Helps complete the deception estimate. Begun during mission analysis, the deception estimate is
the foundation for effective deception planning as well as subsequent execution and assessment.
Supports the conduit analysis step of the deception planning process.
Ensures the collection plan supports the development, collection, and analysis of planned
deception measures of performance (MOPs), MOEs, and indicators.
Identifies and confirms instances of enemy deception and supporting counterdeception
exploitation.
2-80. Deception plans employed at any level of conflict (tactical, operational, and strategic) impose special
requirements for information collection and intelligence production. Examples of such specialized
intelligence production include—
Studies of the enemy’s decision-making responsibilities, logic, processes, and procedures.
Technical and operational assessments of the enemy’s intelligence collection, processing,
production, and dissemination systems (strategic, operational, and tactical).
Emulative assessments of how the enemy sees an operational environment and perceives U.S.
forces, including expectations about intentions and capabilities.
2-81. MDOs thoroughly analyze and anticipate intelligence support requirements, making information needs
and commander’s critical intelligence requirements known to supporting intelligence collection and
production organizations.
2-82. The planning and execution of deception operations demands a highly responsive system for managing
relevant information collection and intelligence support. Because of the often highly specialized nature of
the information and intelligence required, the sensitivity of the operation, and its special security
requirements, the MDO must develop internal information and intelligence synch matrixes. Although the
specific content and subject matter of these matrixes may fundamentally differ from the types of information
required of more traditional military operations, the basic objective is the same in all cases: to ensure the
timely, sufficient, and reliable flow of information and intelligence throughout all phases of the planning and
execution of the operation. Each deception operation requires a deception matrix. The matrix is a detailed
catalog of the specific information required to accomplish every element of the deception. The deception
matrix identifies when that information is required and establishes the criticality of the information to
deception planning and execution.
2-83. A deception plan is important to the overall success of the operation. MDOs prepare it in a
comprehensive and systematic manner and follow a format that facilitates the coordination and integration
of all supporting information sources and agencies. The plan is a dynamic tool that is continuously refined
and adapted as the operation proceeds.
INTELLIGENCE REQUIREMENTS
2-84. After performing functional analysis and developing threat models, the intelligence staff assists the
MDO in refining selected intelligence requirements into information categories that prioritize and ensure
their collection. These categories typically include deception target information, conduit information,
military decision-making information, and military capabilities information. Several intelligence entities can
compile this type of information, but an MDO will typically coordinate requests through the theater S-2, G-2,
or J-2 elements.
Conduit Information
2-86. MDOs collect and develop the following information on the potential means of conveying information
to key target decision makers in areas of interest:
Intelligence system and capabilities such as—
Signals intelligence capabilities that include systems and processes for collection, processing,
and dissemination.
Human intelligence capabilities that include systems and processes for collection, processing,
and dissemination.
Measurement and signature intelligence capabilities that include systems and processes for
collection, processing, and dissemination.
Operational staff structure, staff process, and information filters.
Communications and automated information systems structure and process.
Other information sources (open source, commercial satellite, third-country intelligence, or
personal contacts) and the process for integrating them into the military information system.
Command and staff process for analyzing and determining COAs (by echelon), including—
Required elements of information for COA analysis.
Assessment factors and biases.
The analytical process, to include human reasoning and automated decision aids.
Command and staff process for developing OPLANs and issuing orders (by echelon).
LEGAL CONSIDERATIONS
2-89. A number of U.S. and international legal and policy restrictions governs the conduct of deception
operations in wartime and contingency operations. MDOs ensure that they are knowledgeable on such matters
and able to reliably advise the commander. This means coordinating with the higher command echelon
deception staff element to determine applicable guidelines. MDOs also work with the command’s legal
officer to ensure that the commander’s legal responsibilities are properly reflected in deception planning and
execution.
2-90. Supporting IRCs such as public affairs activities, civil affairs operations, cyberspace operations, and
military information support operations (MISO) are controlled and regulated by their respective policies and
practices. A compliant MDO knows these policies and practices while ensuring that no aspect of the
deception plan or its execution conflicts with the governing policies of other agencies or activities.
Coordination and planning ensure an adherence to all policies and their integration in a synchronous manner.
While deception operations may leverage the resources, activities, and operations of such parallel activities
and operations, they cannot do so in a way that violates governing policy and legal responsibilities. This is
why sufficient training and experience are critical attributes of an MDO. MDOs must possess discreet
capabilities in a legally sufficient manner that insulates risk to the commander.
UNLAWFUL DECEPTIONS
2-91. Certain deception activities or techniques are prohibited because they violate the law of war, including
killing or wounding the enemy by resorting to perfidy. Acts of perfidy are acts that, by design, invite the
confidence of an enemy to lead it to believe that the enemy is entitled to, or obliged to accord, protection
under the law of war, with intent to betray that confidence. Moreover, the law of war prohibits misusing
certain protected signs such as the Red Cross or Red Crescent, fighting in the enemy’s uniform, and feigning
non-hostile relations in order to seek a military advantage. These actions are prohibited because they
undermine the protections afforded by the law of war to civilians, persons who are hors de combat, or other
protected classes of persons and objects; impair non-hostile relations between opposing belligerents; and may
damage the basis for the restoration of peace. A deception plan must follow the commander’s limitations and
agreements, and planners must consider legal implications. Staffs should always consult with the judge
advocate when developing a deception plan.
2-92. Deception operations are constrained, but not forbidden, by international agreements. Ruses of war
and the employment of measures necessary for obtaining information about the enemy and the country are
considered permissible. Ruses of war are legitimate so long as they do not involve treachery or perfidy on
the part of the belligerent resorting to them. They are, however, forbidden if they contravene any generally
accepted rule. The line of demarcation between legitimate and illegitimate ruses sometimes blurs, but the
following examples indicate the correct principles. Improper practice to secure an advantage over the enemy
includes deliberate lying or misleading conduct that involves a breach of faith or a moral obligation to speak
the truth. For example, it is improper to feign surrender so as to secure an advantage over the opposing
belligerent.
2-93. The Department of Defense Law of War Manual states deception operations will not intentionally
target or mislead the U.S. public, the U.S. Congress, U.S. news media, or any open-source (unclassified or
generally available to the public) publications. Traditionally, all Department of Defense (DOD) missions and
activities have either been determined by federal statue or, in the absence of statutory authority, through the
broad constitutional powers of the President. The President, under constitutional and statutory authority, may
issue documents that provide direction to the executive branch that apply to this field. Specific regulatory
guidance pertaining to the conduct of deception operations is promulgated by DOD and the Services.
Misinforming the media about military capabilities and intentions in ways that influence U.S. decision
makers and public opinion is contrary to DOD policy. Deceptions will comply with U.S. law, applicable
international treaties and agreements to which the U.S. is a party, DOD and Service regulations and policies,
and established rules of engagement for U.S. forces. See the Department of Defense Law of War Manual and
DODD 2311.01E.
2-94. It is expressly forbidden to make improper use of a flag of truce, of the national flag, or of the military
insignia and uniform of the enemy, as well as the distinctive badges of the Geneva Convention. Flags of truce
must not be used surreptitiously to obtain military information or merely to obtain time to affect a retreat or
secure reinforcements, or to feign a surrender in order to surprise an enemy. In practice, it has been authorized
to make use of national flags, insignia, and uniforms as a ruse. Hague Regulation (Article 23) does not
prohibit such employment but does prohibit their improper use. It is certainly forbidden to employ them
during combat, but their use at other times is not forbidden.
2-95. Legitimate ruses can include the following examples:
Surprises, ambushes, feigning attacks, retreats, or flights.
Simulated quiet and inactivity.
The use of small forces to simulate a large unit.
The transmission of false or misleading radio or telephone messages:
False orders purporting to have been issued by the enemy commander.
The use of the enemy’s signals and passwords.
Fake communication with troops or reinforcement that do not exist.
Deceptive supply movements.
Deliberate planting of false information.
The use of spies and secret agents.
The movement of landmarks.
Assembled dummy guns and vehicles or laid dummy mines.
Erected dummy installations and airfields.
picture of key friendly aspects. Those aspects can include presence, capability, strength, intent, readiness,
location of future operations or activity, timing, and method of operations.
2-104. MDOs consciously and continuously analyze and manage friendly operational profiles so what the
enemy can see is no more or less than what the MDOs deliberately plan. OPSEC focuses primarily on
identifying and protecting critical information and indicators associated with the planned COA. Deception
leverages the visible aspects of friendly operations and combines them with a deceptive activity to create
plausible alternative facts and conditions in an operational environment to which targeted decision makers
feel they must respond.
2-105. OPSEC planners, with the intelligence community, use OPSEC to—
Identify critical information and indicators by phase, type of operation, or mission.
Determine how the enemy collects (sees).
Determine how the enemy perceives potentially visible friendly critical information and
indicators.
Measure the enemy’s ability to collect, analyze, and respond to the critical information and
indicators to a level that generates an unacceptable risk (time and operational ability to respond).
Develop and apply OPSEC measures and countermeasures to protect and deny critical information
and indicators that enable the enemy to accurately determine and subsequently interdict planned
operations.
2-106. To achieve the desired level of control over enemy perceptions, OPSEC planners and MDOs
coordinate activities across a spectrum of influence that includes—
Truth: factual information and actions visible to all.
Denial: critical information and indicators protected by OPSEC.
Misdirection: DISO and other activities designed to confuse enemy analysts and decision makers.
Deceit: deceptive activity and information delivered as part of the approved deception plan.
2-107. While OPSEC identifies and protects critical information and indicators about the actual COA,
deception actively generates what appears to be critical information and indicators supporting the deception
story. Deception deliberately leads the enemy decision makers to the wrong conclusion, thus usurping their
decision making and subsequent action.
2-108. Deception and OPSEC planners can save significant time and resources by collaborating during the
military decisionmaking process. Enemy threat assessment in the OPSEC planning process to determine
technical aspects of how an enemy sees and perceives friendly activity correlates directly with the MDO’s
identification of conduits necessary to deliver deceptive information to military decision makers. Both
OPSEC and deception require a detailed knowledge of enemy decision making to project the impact of
planned activities. In concept development, the OPSEC planner and MDO both require detailed knowledge
of friendly indicators (signature, association, profile, contrast, and exposure). They use OPSEC to identify
and protect critical information and indicators and use deception to replicate desired indicators that
effectively portray the deception story.
2-109. OPSEC also supports deception directly during planning, preparation, and execution. The existence
of a deception plan in and of itself is critical information, and indicators require protection. Planners need an
OPSEC analysis of the planned deception to protect against an inadvertent or unintentional disclosure of
deception existence, techniques, or particular means being used. Failure to maintain good OPSEC can enable
the enemy to identify the operation as a deception effort with resulting second- and third-order effects such
as the refocusing of enemy intelligence collection and combat power against actual friendly force dispositions
and intent.
commander. It can directly influence, corrupt, disrupt, and usurp the enemy’s decision-making process and
the subsequent direction of its forces.
ELECTRONIC WARFARE
2-115. Electronic warfare is essential for protecting friendly operations and denying enemy operations
within the electromagnetic spectrum throughout an operational environment. The term electronic warfare
refers to military action involving the use of electromagnetic and directed energy to control the
electromagnetic spectrum or to attack the enemy (JP 3-13.1). Deception, in conjunction with OPSEC,
supports electronic warfare operations by protecting the development, acquisition, and deployment of
sensitive electronic warfare capabilities.
2-116. Electronic warfare can support feints, ruses, demonstrations, and displays. Positioning electronic
warfare systems in a particular location, and the electromagnetic signatures the systems present, can create
an indicator of the command’s intended main effort. By disrupting enemy communications, and other enemy
systems using the electromagnetic spectrum, electronic warfare can introduce or increase ambiguity, confuse
enemy operations, or affect the enemy’s ability to obtain and pass information about certain activities. Close
coordination is required between friendly electronic warfare, deception, communications, cyberspace and
space support elements, frequency management, and intelligence planners to ensure electronic warfare does
not disrupt enemy communications systems that are used as deception conduits or that are providing
intelligence feedback.
CYBERSPACE OPERATIONS
2-118. Deception and cyberspace operations can be mutually supportive in many ways. Since an enemy can
reside in cyberspace and leverage the same systems and processes, cyberspace operations serve as an
effective conduit for placing or delivering deceptive material to affect enemy military decision making and
subsequent action or inaction. MDOs can help protect friendly use of information systems by applying
deceptive activities similar to those used in the physical dimension for maneuver forces. Such an operation
may include constructing false servers, communications nodes, and other hardware associated with a tactical
computer network to include the replication of traffic and false data storage.
2-119. Enemy intelligence and targeting systems, which make a priority of attacking or subverting a
friendly information system, can be dissuaded from doing so via a successful deception plan. MDOs can
redirect enemy collection assets toward deceptive events (such as the presentation of a false “weakness” in
friendly information systems) and then target those assets for destruction or exploitation by friendly forces.
Any deception plan must consider the abilities and limitations of friendly and enemy cyberspace operations.
Careful and detailed planning ensures deception executions using cyberspace operations assets are tracked,
recorded, and deconflicted with other nondeceptive cyberspace operations. Planners properly classify and
avoid exposing the deception plan to unprotected computer networks or sending it via unsecured email. Any
exposure can lead to plan failure.
SPACE OPERATIONS
2-120. Space operations capabilities offer many options to influence deception activities to include satellite-
based imagery and signals intelligence collection systems against friendly forces. These collection satellites
generally operate in predetermined orbits, and thus the time they are in position to collect intelligence on
friendly forces is predictable. MDOs can use this information to portray to the enemy a desired observable
or use it to camouflage or take appropriate OPSEC measures to avoid providing indicators to enemy
intelligence operations. Additionally, the posturing of friendly force satellites capabilities may also assist in
deception efforts. For instance, the use of a friendly force intelligence, surveillance, and reconnaissance, or
the positioning of a communications satellite both illustrate methods that may help mislead the enemy
regarding friendly force intentions.
PUBLIC AFFAIRS
2-121. Deception activities, including planning efforts, are prohibited from explicitly or implicitly
targeting, misleading, or attempting to influence the U.S. Government, U.S. Congress, the U.S. public, or the
U.S. news media. Legal staff review all deception activities to eliminate, minimize, or mitigate the possibility
that such influence might occur. Planners coordinate deception plans that have activities potentially visible
to the media or the public with appropriate public affairs officers to identify any potential problems.
Coordination reduces the chance that public affairs officers inadvertently reveal information that could
undermine an ongoing or planned deception.
CIVIL-MILITARY OPERATIONS
2-122. Civil-military operations are the activities of a commander performed by military forces to establish,
maintain, influence, or exploit relationships between military forces and indigenous populations and
institutions. These operations support national objectives for host-nation and regional stability. Civil-military
operations may include military forces conducting activities and functions normally done by the local,
regional, or national government. Conducted to gain maximum support for U.S. forces from the civilian
population, civil-military operations contribute to the success of military operations and project a favorable
U.S. image throughout the operational area. MDOs coordinate deception with civil-military operations and
with MISO efforts that support civil-military operations to ensure deception plans do not inadvertently
undermine the relationships with the civilian population or with host-nation military authorities. Failure to
consider civil-military operations could compromise deception plans or have other unintended consequences.
COORDINATION REQUIREMENTS
2-123. MDOs coordinate both deception and its supporting actions with higher, adjacent, subordinate, and
supporting staffs. Within a staff, coordination is required between MDOs and other planners and analysts on
the staff. Coordination with U.S. Government department and agency personnel prevents destabilizing civil-
military relationships and an unintentional compromise of deception plans. This coordination has increased
importance in situations in which the media or general public view deception.
2-124. It is important to restrict knowledge of information relating to planned and ongoing MILDEC
operations to only those personnel who need to know. The commander provides guidance concerning the
dissemination of deception-related information. During multinational operations, the staff informs the
commander of information requirements and concerns of the non-U.S. partners. During planning, MDOs
develop need to know criteria that permit necessary coordination while limiting the number of individuals
with knowledge of the deception. Only a few individuals require access to the entire deception plan. Others
require only knowledge of limited portions of the plan. The need to know criteria should address these
different levels of required access.
2-125. When deception plans incorporate or involve multinational partners, the command’s foreign
disclosure officer helps determine appropriate access to deception information and operations. For further
information on multinational personnel access to deception plans, refer to CJCSI 3211.01.
RISK ASSESSMENT
2-126. The evaluation of the risks associated with conducting a deception does not end with the
commander’s decision to adopt a particular COA. In planning, commanders use risk assessment to determine
the potential consequences of deception failure or compromise and the consequences of unintended effects
of the deception.
2-127. As planning progresses, the MDO refines the risk assessment as each element of the plan is detailed
and aligned with the current situation. For example, the execution of a required observable by an electronic
ruse instead of by a demonstration conducted by a combat unit may reduce the risk to command resources.
Throughout the course of the deception planning process, MDOs must note significant changes in risk to the
commander and staff so their impacts can be assessed and accounted for in operational planning. The staff
records results of risk analysis during planning. The MDO then develops risk mitigation measures to ensure
risk remains within acceptable levels to the commander.
2-128. The MDO develops a risk assessment for the finalized deception plan under conditions prevailing at
that time. That risk assessment must be clearly presented during the approval process so the commander can
make a well-informed decision on whether to approve and execute the deception operation or not. If the
deception plan is not immediately implemented, the MDO continues to monitor risk to account for
implications of changes in the situation.
PREPARATION
3-1. During preparation, planners take every opportunity to refine the deception plan based on updated
intelligence and friendly information. Deception plans are not static and are continually adjusted. As
assumptions prove valid or invalid, staffs confirm enemy perceptions, or the status of friendly units change,
the MDO adjusts the deception for the commander or recommends aborting it if the deception can no longer
significantly influence the situation and achieve the deception goal. As part of the plan, OPSEC activities
also continue during preparation for the deception. OPSEC is a dynamic effort that anticipates and reacts to
enemy collection efforts.
3-2. MDOs coordinate the deception plan with every other aspect of the OPLAN. This coordination still
occurs with those only who have a need to know. The complexity of deception, its secrecy, and its many
witting and unwitting links within the staff and across operational forces requires careful coordination of the
deception plan with overall planning. Coordination also occurs with specific staff entities. Close coordination
with operations and intelligence planners is driven by the essential nature of their contribution to the
deception planning process, but most other elements of the staff have a less direct relationship.
3-3. During deception planning, OPSEC is a necessary condition and a critical planning requirement. The
planning process itself must be secure, with no inadvertent disclosures due to carelessness in staff work or
coordination. At the same time, planning must ensure that security is built into and maintained throughout
the deception operation. This security reduces the risk of compromise and protects activities and units
involved in the deception, particularly unwitting participants.
EXECUTION
3-4. The deception plan forms the basis for execution, but execution may occur in conditions more dynamic
than anticipated. Consequently, the deception plan is subject to continual reassessment and refinement. By
its nature, little flexibility exists in the concept of operations for deception. Successful monitoring involves
knowing precisely when to take the next step in conveying the deception story. MDOs often identify specific
operational feedback events identified in the plan to provide these cues. IO officers are critical in assessing
and deciding the timing, frequency, and means through which an observable is transmitted to achieve the
desired cognitive effect on the deception target.
DECEPTION EXECUTION
3-5. Deception execution includes the following activities:
Adjust the deception plan as necessary for changed conditions.
Sustain deception synchronization with an approved COA and OPSEC plan.
Sustain internal deception synchronization between the planning team and commander.
Sustain intelligence collection during deception execution.
Monitor, assess, and mitigate risk.
Keep the commander informed.
Maintain strict security and access controls throughout.
Sustain Internal Deception Synchronization Between the Planning Team and Commander
3-12. Deception executions, while planned in detail, do not remain static activities on an access-controlled
deception event schedule or operational-level synch matrix. The MDO maintains constant communication
with internal components, capability owners, and other resource providers tasked to execute or support each
event so the portrayal of the deception story proceeds as planned. This includes operational-level tasks—
such as synchronizing different deception lines of effort and balancing or shifting lines of effort as
appropriate—to sustain the desired story progression. Based on feedback, the MDO may adjust, repeat,
postpone, or cancel some planned executions or event series.
deception events based on actual operational conditions so long as they do not significantly alter the basic
operational flow of the deception.
3-20. Once planners review and validate the deception event schedule and supporting worksheets, the
controlling planner synchronizes the implementation of the plan. During implementation, participating units
and resources normally receive tasks through traditional command operational and intelligence tasking
channels. Occasionally, the controlling planner may directly engage participants outside the normal tasking
channels when special communications channels are required to protect sensitive means and sources that
reside outside normal command channels.
3-21. The controlling planner monitors feedback indicators at each stage and regulates the scheduling and
intensity of deception operations. At times, the controlling planner may need to delay or accelerate planned
deception events or, if the situation requires, add measures to achieve desired enemy perceptions in the time
indicated by the commander’s overall plan. The controlling planner informs the commander and the chief of
operations of the status of all synchronization requirements associated with the execution of the deception.
An inability to execute the deception with timing needs of other operations may prompt termination of a
deception operation.
3-24. To achieve the level of synchronized activity that the deception operation demands, the controlling
planner monitors the general military situation together with the systematic execution of the deception. The
controlling planner also understands and evaluates the status of the deception operation in the full context of
the overall operation as well as how deception activities are proceeding. At the same time, MDOs keep higher
command echelons that direct and coordinate theater-wide and strategic deception operations informed
regarding the execution of the command’s deception.
align it to changes in the situation or the target’s responses. Terminating the deception is the final control
action in the execution of the operation.
3-26. Control consists of the series of implementing decisions and actions undertaken during the course of a
deception operation. MDOs project many of these activities during the planning stage as a part of the natural
progression of events envisioned in the deception event and execution schedule. Other decisions are dictated
by the course of events revealed during monitoring. Centralized control over deception activities is imperative
to ensure synchronous operations and the integration of deception in a manner that does not conflict with
other operations. This principle requires close coordination among deception support elements operating at
various levels of command. Authority to implement changes to various aspects of the deception operation
must be specified in the deception plan.
3-27. Throughout the execution of the deception plan, the controlling planner remains prepared to support
the commander with sound recommendations when operations reach decision points. If the deception plan
has a progression of specific phases, with each new phase contingent on the success of the preceding phase,
and the commander’s approval is required for the execution of each phase, then the commander will need to
know the specific status of the deception operation at each approval phase. If it becomes apparent that the
deception story is not being successfully transmitted, the deception story is not eliciting the desired action
from the target, or the deception is not synched with larger operational requirements, then the controlling
planner may recommend to the commander to adjust the operation to fit alternative opportunities or to
terminate it. If the assessed operational risk increases during the execution, the controlling planner addresses
this change with the commander and provides a recommendation as to how the operation should proceed.
ASSESSMENT RESPONSIBILITIES
4-1. One primary responsibility of the MDO involves assessing the effectiveness of deception and DISO in
achieving supported command objectives. Assessment is the continuous monitoring—throughout planning,
preparation, and execution—and evaluation of the current situation to measure the overall effectiveness of
the operation. An essential and resource-intensive aspect of any successful deception, MDOs consider
assessment from the initiation of planning. Planners avoid developing deception objectives that cannot be
associated with a progressive and observable enemy response into a more detailed deception concept or
subsequent execution. Deception is assessed in the same manner as other operations: using MOPs to
determine if a deception event was executed according to plan and using MOEs to determine if the event
created the desired impact or effect. In deception, MOPs involve everything up to and including delivery of
the observable (filtered or unfiltered) to the deception target.
4-2. Accurately assessing MOEs for deception is complicated by the fact that MDOs need to measure
desired changes in perception, as well as the action or inaction manifested by their success. MDOs develop
MOEs that measure effectiveness, efficiency, and adaptability using the following guide:
Appropriate: MOEs should correlate to the target’s objectives.
Mission-related: MOEs must correlate to the mission.
Measurable: Quantitative MOEs reflect reality more accurately than qualitative MOEs, and
hence, are generally the measure of choice when the situation permits their use.
Useful: MOEs should detect situation changes quickly enough to enable the commander to
immediately and effectively respond at decision points identified in the deception plan.
4-3. Because of this complexity, a detailed assessment plan accompanies each planned deception event. A
detailed assessment plan includes MOPs, MOEs, and coordination with the G-2 for information collection
assets to collect and report indicators in real time. Every assessment plan begins with a baseline—the point
from which assessments are measured. Planners can generate a baseline from an initial survey, poll, or
estimate or establish a baseline from a specific time or event.
4-4. The MDO also has responsibility for continually reassessing the deception objective, target, story, and
events to ensure they are still important to the achievement of the mission objectives. Monitoring activities
include, but are not limited to—
Monitoring and evaluating the deception to ensure it continues to support operations.
Evaluating how the target is acting or not acting in response to the deception story.
Monitoring for unintended consequences resulting from the deception.
Determining when termination criteria are met.
4-5. Planners consider how to assess a deception plan at the start of the planning process. A plan to assess
a deception informs the commander if the operation is being executed as planned and achieving the desired
results. As part of the evidence-based approach to decision making, assessment is integral to the planning
process, and it must be designed as part of the initial planning process once the commander’s intent has been
articulated. By integrating assessment into the planning cycle, staff can identify potential second- and third-
order effects and unintended consequences.
ASSESSMENT PLAN
4-6. An MDO develops an assessment plan using the following steps:
Design an assessment plan.
Develop a data collection plan and an analysis plan.
Collect and treat data.
Analyze, interpret, and make recommendations.
4-12. MOE development and collection for deception focuses on the current cognitive state of the deception
target. The enemy’s cognitive state can be measured in one of two ways. First, it uses the evaluation of known
comments or public statements by the decision maker. Second, it identifies and monitors the flow of enemy
(particularly the target’s) activity to determine patterns of behavior that indicate the deception target’s
susceptibility to being moved toward the desired perception and subsequent action or inaction. The baseline
provides the first indication that friendly forces can affect the target in the manner that meets the desired
effect. However, the knowledge of this activity occurring or not occurring may not be easily available or
discernible. Sometimes, it will manifest itself at the very moment a particular effect in the deception plan is
required; thus, the controlling planner remains vigilant to indicators that suggest the current cognitive state
of the target has in some manner changed.
4-13. MOP collection for deception involves two conceptual steps:
Determining that the tasked friendly unit or capability employed the desired means to create an
indicator at the appropriate time and location.
Verifying that the intended enemy conduits cued on the friendly signature, transmitted the
collected data, and delivered the information to the deception target in a discernable context.
These two steps define the difference between a deception MOP and a traditional MOP (one that asks if
friendly forces performed the directed action). Part of every successful deception execution involves action
by the enemy. The conduit that the deception seeks to exploit must function.
4-14. MDOs determine a deception event schedule from reporting channels. The MDO coordinates this
reporting with the element controlling a particular execution as a part of finalizing the plan for appropriate
access and security controls. Verifying that the enemy conduit functioned as planned and that the desired
information reached the deception target requires focused and coordinated intelligence, surveillance, and
reconnaissance support. Using their previous conduit analysis work, MDOs, supporting intelligence analysts,
and the intelligence collection manager collaborate. They identify points at which the information
transmission might fall susceptible to enemy monitoring and analysis. The presence of filters in the conduit
pathway makes this verification process difficult because predicting the level of data aggregation or synthesis
with other friendly observables is subjective at best. In some cases, the appearance of an anticipated MOE
might be the only validation that a persuasive observable was accurately received and perceived.
4-15. To provide the commander with the information to adjust plans as needed based on timely MOEs, the
G-2 and MDO coordinate. For example, if one deception objective is for the enemy to hold the armored
reserve away from the decisive point of ground action, then MDOs develop MOEs related to achieving that
objective. MOE examples related to the action or inaction of the reserve might include such things as—
An increase or decrease in preparation of defensive positions (implying a period of static activity).
An increase or decrease in enemy intelligence collection in the vicinity of a friendly main axis of
advance at the expense of other sectors (is the enemy “telegraphing” an interest?).
An increase or decrease in route reconnaissance toward the friendly sector by armored reserve
units or leadership (is this pending or an active branch plan?).
An increase or decrease in battle drill or movement rehearsal by the enemy reserve.
4-16. Without the close support of the G-2 and a deliberate focus on the development of viable MOEs and
MOPs as part of the deception plan, the success or failure of the deception might not be known until the
moment that a planned enemy action or inaction is turned against friendly forces. This could result in a loss
of initiative or increased friendly loss of life.
COUNTERDECEPTION PLANNING
A-1. Enemies can use deception to mislead friendly analysts and decision makers about their activities,
capabilities, or intent to offset a friendly superiority or gain some other operational advantage.
Counterdeception is efforts to negate, neutralize, diminish the effects of, or gain advantage from a foreign
deception operation (JP 3-13.4). Successful friendly decision makers know of enemy deception activities to
formulate informed and coordinated responses and, more importantly, avoid placing friendly forces at an
operational disadvantage. Counterdeception contributes to situational awareness by protecting friendly
systems and decision makers from responding to deceptive manipulation or faulty analysis of an operational
environment. Counterdeception applies across the range of military operations in which enemies might use
deception in an attempt to alter friendly activities or even achieve operational surprise during hostilities.
A-2. Knowledge of an enemy’s deception plan enables a commander to act appropriately against the
deception. It provides friendly forces an opportunity to gain valuable insight into the means used to portray
the deception. It also provides friendly forces a chance to analyze enemy deception targets and objectives as
indicators of the broader context in which the enemy views friendly forces and operations. Counterdeception
becomes a tool for influencing those perceptions and could subsequently be turned effectively against the
enemy.
the intelligence enterprise to determine the enemy deception plan. Using the deception planning methodology
of see-think-do, the working group might use an abbreviated war-gaming process to construct enemy
deception goals and objectives, targets, desired perceptions and deception story narrative, probable events
and means, conduits, and anticipated MOEs. Deception planners then use outputs of this technique to focus
friendly intelligence collection assets that confirm or deny the existence and scope of an actual enemy
deception plan and related executions.
APPENDIX TEMPLATE
B-2. Commanders and staffs use Appendix 14 (Military Deception) to Annex C (Operations) to OPLANs
and OPORDs to describe how deception will support operations described in the base plan or order. See
figure B-1 for a sample format instructions. The italicized font in figure B-1 explains the information that
commanders and staffs complete.
MILITARY DECEPTION
Information and intelligence provided here must be focused and plan-specific. Do not reiterate information
available in the base plan.
a. General. Identify the overall purpose of the deception plan. In one paragraph briefly identify the
commander’s intent in employing deception—what the deception plan is designed to accomplish. Specifically
identify the friendly operation it will support. Identify any phasing for the conduct of operations. Briefly state the
expected results if the plan is successful.
b. Enemy.
(1) Enemy Intent. Identify the assessed enemy goal or condition (favorable or unfavorable, as perceived
through the opponent’s perspective) that this deception plan is designed to counter or exploit.
(2) General Capabilities. Identify significant enemy military capabilities that can affect the overall
operations in general and the deception plan in particular.
(a) Enemy Intelligence Organizations. Identify intelligence organizations, missions, and capabilities
for covert and clandestine operations. Include collection, processing, analysis, and dissemination. Specifically
note those organizations most likely to provide intelligence to the targeted decision maker and those tasked with
exposing deception.
(c) Enemy Intelligence Sharing with Other Countries. Identify other intelligence organizations
available to the enemy, the nature of intelligence exchange, and the potential for using that relationship for the
deception.
(d) Other Sources and Related Matters. Identify scientific, technical, diplomatic, or academic
contacts that might act as information conduits.
(e) Enemy Deception and Denial Activities. Provide an analysis of the enemy’s use of deception
and denial supporting its political and military goals. Identify the enemy’s deception and denial methods as well
as current deception and denial activities.
(3) Deception Targets. Describe the decision maker targeted by the deception plan. Include personality,
strengths, weaknesses, vulnerabilities, and people or factors known to influence decisions.
(4) Target Biases and Predispositions. Briefly describe those biases and predispositions of the target that
the deception plan is targeting for exploitation.
(6) Enemy Ability to Respond. Discuss the ability of the target to respond to the deception. Discuss how
the enemy has previously responded to similar events, conditions, and circumstances.
(7) Probable Enemy Courses of Action without the Deception. Discuss probable enemy courses of action
and their possible results if deception is not used.
c. Friendly. Summarize the friendly situation, critical limitation, and concept of operations.
(1) Provide information on activities by unwitting friendly forces having an impact on the deception.
Compare the time necessary to collect, process, report, and analyze intelligence (in support of deception) with
the plan’s operational timeline. Assess the impact here.
(2) Identify required capabilities and capacities for collection and identify shortfalls. Consider current
collectors’ actual capacities in relation to the projected volume of information requirements.
d. Assumptions. State the assumptions concerning friendly, enemy, or third-party capabilities, limitations,
or courses of action. State conditions that the commander believes will exist during execution.
e. Information Requirements.
(1) Identify requirements, including those of subordinate commanders, for pre-execution and execution
phases of the planned operation.
(2) List questions and answers required for further planning and as a basis for decision on execution.
(3) List the additional priority intelligence requirements and other intelligence requirements that
become relevant upon execution. (Use additional paragraphs if necessary to reflect differing requirements during
planned phases of the operation.)
a. Operational Mission. Briefly state the operational mission that the deception operation supports.
b. Deception Mission. Briefly identify the general purpose of the deception mission, including the desired
actions that the deception target is expected to take. Identify how friendly capabilities, situations, conditions, or
operations will be improved or protected if the target commits the desired actions.
(1) Deception Goal. Precisely state the commander’s purpose of the deception operation as it contributes
to the command’s mission objectives.
(2) Deception Objectives. Precisely state the intended effect of the deception on the target in terms of
the specific action or inaction the deception operation is expected to elicit from the target. State, exactly, what
friendly forces want the target to do or not to do with its forces, capabilities, and operations.
(3) Enemy Perceptions. Precisely identify the key conclusions, estimates, or assumptions that the target
will have to accept as being true in order for it to act in accordance with the deception objective.
(4) Deception Story. Briefly outline the friendly actions to portray to cause the deception target to
acquire the desired perceptions. The deception story is presented in a style that replicates what the target would
expect to read in his own intelligence estimates of the “enemy” situation (typically no more than a short
paragraph).
3. Execution.
a. Concept of Operations. Identify how the deception operation supports the commander’s overall concept of
operations. Describe how the deception is integrated into the supporting plan. If applicable, list how the deception
operation will be phased.
(1) General. Generally describe the framework for the operation. Include a brief description of the
phases of the deception.
(2) Other Capabilities or Activities. Discuss the use of other capabilities and activities in support of the
deception plan. Discuss all other capabilities and activities plans and operations pertinent to the deception.
Include coordination required to deconflict if necessary.
(3) Feedback and Monitoring. Provide a general statement of the type of feedback expected, if any, and
how it will be collected (monitored). Identify the effect of no feedback. Identify the friendly capability to identify
and collect plan-specific feedback information.
(a) Operational Feedback. Identify specific intelligence operations and indicators that will be
monitored to determine if deception events are being sensed by enemy intelligence collection, analytical, or
dissemination systems.
(4) Executions to be Conducted and Means. Briefly outline the general framework for the deception
operation and the means to employ. Identify and provide a general description of the types of executions and
means used to portray them for each operational phase. If applicable, include the timelines for major phase
executions. Use the deception event schedule to describe specific executions and events in order.
(5) Risks. Give a brief risk analysis in the categories given below. Rate risk as low, medium, or high in
each category.
(a) Deception is successful. Include likely enemy response. Describe impact on friendly forces from
enemy intelligence sharing.
(b) Deception fails. Describe the impact if the target ignores the deception or fails in some way to
take the actions intended.
(c) Deception is compromised to allies or enemies. Describe impact on friendly forces from enemy
intelligence compromise.
(6) Termination. Provide detailed instructions on conditions for termination, actions to be taken (must
be reflected in Exhibit 2 (Execution Schedule)), or emergency if there is unintended disclosure or compromise.
Focus on the termination “story” to be used if the deception succeeds, is compromised, or is ended by the friendly
commander.
b. Tasks. Specify execution and feedback tasks to organizations participating in the deception operation.
Identify how collection managers will support planners and analysts.
c. Coordinating Instructions. Identify any tasks or instructions pertaining to two or more of the units listed in
the preceding subparagraphs. List the tentative D-day and H-hour, if applicable, and any other information
required to ensure coordinated action between two or more elements of the command.
4. Administration and Logistics. State instructions regarding administrative and logistics support procedures
used in developing, coordinating, and implementing the deception plan. Do not include those administrative,
logistics, and medical actions or ploys that are an actual part of the deception operation.
a. Administration.
(1) General. Outline general procedures to be employed during planning, coordination, and
implementation of deception activities.
(2) Specific. Detail any special administrative measures required for executing the deception plan.
b. Logistics. Detail logistics requirements required for executing such as the transportation of special
material or provision of printing equipment and materials. Do not include executions conducted by logistics
elements as part of the portrayal of observables.
a. Command Relationships.
(2) Authority. Designate supported and supporting commanders as well as supporting agencies as
applicable.
(3) Oversight. Detail oversight responsibilities particularly for executions by nonorganic units or
organizations outside the chain of command.
(4) Coordination. Identify coordination responsibilities and requirements related to deception events
and execution feedback. Address in-theater and out of theater requirements.
b. Command, Control, Communications, and Computer Systems. Detail communications means and
procedures to be used by control personnel and participants in the deception plan. Include all reporting
requirements.
6. Security.
a. General. Outline general procedures to be employed during planning, coordination, and implementation
of deception activities.
b. Specific. State access restrictions, handling instructions, and authority to grant access to the deception
appendix or plan. Describe use of cover stories if applicable, code words, nicknames, and procedures for planning
and execution documents. If required, place access rosters and other detailed security considerations in a
separate document. As a general policy, any material related to planned, ongoing, or completed deception is
accorded controlled access. Address essential elements of friendly information, indicators to be managed, and
protective measures.
Did the enemy’s intelligence estimate of friendly capabilities warrant the use of deception with
the expected expenditure of personnel and equipment?
Was there adequate time for the enemy to observe the deception and react in a desired manner?
What were the results of deception activities?
Were intelligence means and indicators established to measure enemy reaction to the friendly
unit’s deception?
The glossary lists acronyms and terms with Army or joint definitions. The proponent
publication for terms is listed in parentheses after the definition. The term for which
FM 3-13.4 is the proponent is marked with an asterisk (*).
SECTION II – TERMS
competing observable
Within military deception, any observable that contradicts the deception story, casts doubt on, or
diminishes the impact of one or more required or supporting observables. (JP 3-13.4)
conduits
Within military deception, information or intelligence gateways to the deception target, such as foreign
intelligence entities, intelligence collection platforms, open-source intelligence, and foreign and
domestic news media. (JP 3-13.4)
counterdeception
Efforts to negate, neutralize, diminish the effects of, or gain advantage from a foreign deception
operation. (JP 3-13.4)
deception event
A deception means executed at a specific time and location in support of a deception operation.
(JP 3-13.4)
deception goal
Commander’s statement of the purpose of military deception as it contributes to the successful
accomplishment of the assigned mission. (JP 3-13.4)
deception means
Methods, resources, and techniques that can be used to convey information to the deception target.
(JP 3-13.4)
deception objective
The desired result of a deception operation expressed in terms of what the adversary is to do or not to
do at the critical time and/or location. (JP 3-13.4)
deception story
A scenario that outlines the friendly actions that will be portrayed to cause the deception target to
adopt the desired perception. (JP 3-13.4)
deception target
The adversary decision maker with the authority to make the decision that will achieve the deception
objective. (JP 3-13.4)
decoy
An imitation in any sense of a person, object, or phenomenon that is intended to deceive enemy
surveillance devices or mislead enemy evaluation. (JP 3-13.4)
demonstration
In military deception, a show of force similar to a feint without actual contact with the adversary, in an
area where a decision is not sought that is made to deceive an adversary. (JP 3-13.4)
desired perception
In military deception, what the deception target must believe for it to make the decision that will
achieve the deception objective. (JP 3-13.4)
display
In military deception, a static portrayal of an activity, force, or equipment intended to deceive the
adversary’s visual observation. (JP 3-13.4)
diversion
The act of drawing the attention and forces of an enemy from the point of the principal operation; an
attack, alarm, or feint that diverts attention. (JP 3-03)
electronic warfare
Military action involving the use of electromagnetic and directed energy to control the electromagnetic
spectrum or to attack the enemy. (JP 3-13.1)
feint
In military deception, an offensive action involving contact with the adversary conducted for the
purpose of deceiving the adversary as to the location and/or time of the actual main offensive action.
(JP 3-13.4)
human factors
The physical, cultural, psychological, and behavioral attributes of an individual or group that influence
perceptions, understanding, and interactions. (JP 2-0)
indicator
In operations security usage, data derived from friendly detectable actions and open-source
information that an adversary can interpret and piece together to reach conclusions or estimates of
friendly intentions, capabilities, or activities. (JP 3-13.3)
information environment
The aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on
information. (JP 3-13)
information-related capability
A tool, technique, or activity employed within a dimension of the information environment that can be
used to create effects and operationally desirable conditions. (JP 3-13)
link
A behavioral, physical, or functional relationship between nodes. (JP 3-0)
military deception
Actions executed to deliberately mislead adversary military, paramilitary, or violent extremist
organization decision makers, thereby causing the adversary to take specific actions (or inactions) that
will contribute to the accomplishment of the friendly mission. (JP 3-13.4)
military information support operations
Planned operations to convey selected information and indicators to foreign audiences to influence
their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments,
organizations, groups, and individuals in a manner favorable to the originator’s objectives. (JP 3-13.2)
node
An element of a system that represents a person, place, or physical thing. (JP 3-0)
observable
In military deception, the detectable result of the combination of an indicator within an adversary’s
conduit intended to cause action or inaction by the deception target. (JP 3-13.4)
operations security vulnerability
A condition in which friendly actions provide operations security indicators that may be obtained and
accurately evaluated by an adversary in time to provide a basis for effective adversary decision
making. (JP 3-13.3)
ruse
In military deception, an action designed to deceive the adversary, usually involving the deliberate
exposure of false information to the adversary’s intelligence collection system. (JP 3-13.4)
*tactical deception
An activity planned and executed by, and in support of, tactical-level commanders to cause enemy
decision makers to take actions or inactions prejudicial to themselves and favorable to the achievement
of tactical commanders’ objectives.
REQUIRED PUBLICATIONS
Readers require these publications for fundamental concepts, terms, and definitions.
DOD Dictionary of Military and Associated Terms. January 2019.
ADP 1-02. Terms and Military Symbols. 14 August 2018.
RELATED PUBLICATIONS
These publications are referenced in this publication.
JOINT PUBLICATIONS
CJCS issuances are available at https://www.jcs.mil/Library/. DOD issuances are available at
https://www.dtic.mil/whs/directives/. Joint publications are available at
https://jdeis.js.mil/jdeis/generic.jsp.
CJCSI 3211.01. Joint Policy for Military Deception (U). 14 May 2015. (This classified publication is
available on the SIPRNET. Contact the preparing agency of this publication for access
instructions.)
DODD 2311.01E. DoD Law of War Program. 09 May 2006.
DODI 3604.01. Department of Defense Military Deception (U). 11 March 2013. (This classified
publication is available on the SIPRNET. Contact the preparing agency of this publication for
access instructions.)
DODM 5200.01. DoD Information Security Program: Overview, Classification, and Declassification
Volume 1. 24 February 2012.
JP 2-0. Joint Intelligence. 22 October 2013.
JP 3-0. Joint Operations. 17 January 2017.
JP 3-03. Joint Interdiction. 09 September 2016.
JP 3-13. Information Operations. 27 November 2012.
JP 3-13.1. Electronic Warfare. 08 February 2012.
JP 3-13.2. Military Information Support Operations. 21 November 2014.
JP 3-13.3. Operations Security. 06 January 2016.
JP 3-13.4. Military Deception. 14 February 2017.
ARMY PUBLICATIONS
Army doctrine and training publications are available at https://armypubs.army.mil/.
ATP 3-37.34. Survivability Operations. 16 April 2018.
ATP 3-53.1. Military Information in Special Operations. 23 April 2015.
FM 3-12. Cyberspace and Electronic Warfare Operations. 11 April 2017.
FM 6-0. Commander and Staff Organization and Operations. 05 May 2014.
FM 27-10. The Law of Land Warfare. 18 July 1956.
OTHER SOURCES
Geneva Convention and Hague Regulation (Article 23) at
https://www.icrc.org/eng/assets/files/publications/icrc-002-0173.pdf.
Central Intelligence Agency, Office of Research and Development. Deception Maxims: Fact and
Folklore. Washington DC: Government Printing Office, 1980.
Department of Defense Law of War Manual. 12 June 2015 at
https://apps.dtic.mil/dtic/tr/fulltext/u2/1014128.pdf.
PRESCRIBED FORMS
This section contains no entries.
REFERENCED FORMS
Unless otherwise indicated, DA forms are available on the Army Publishing Directorate Website:
https://armypubs.army.mil/.
DA Form 2028. Recommended Changes to Publications and Blank Forms.
RECOMMENDED READINGS
Armstrong, LTC Richard N. Soviet Operational Deception: The Red Cloak. Fort Leavenworth,
Kansas: Combat Studies Institute, U.S. Army Command and General Staff College, 1989.
Axelrod, Robert. “The Rational Timing of Surprise.” World Politics, vol. 31, no. 2 (1979): 228–246.
Bittman, Ladislav. Deception Game, Czechoslovakian Intelligence in Soviet Political Warfare.
Syracuse, New York: Syracuse University Research Corporation, 1972.
Brown, Anthony Cave. Bodyguard of Lies. New York: HarperCollins, 1975.
Cruickshank, Charles. Deception in World War II. New York: Oxford University Press, 1979.
Daniel, Donald C. and Katherine L. Herbig, editors. Strategic Military Deception. New York:
Pergamon Press, 1982.
Dewar, Michael. The Art of Deception in War. New York: David & Charles, 1989.
Dunnigan, James F. and Albert A. Nofi. Victory and Deceit; Dirty Tricks at War. New York: Morrow,
1996.
Fisher, David. The War Magician. New York: Coward-McCann, 1983.
Gawne, Jonathan. Ghosts of the ETO. Havertown, Pennsylvania: Casemate Publishers, 2002.
Gerard, Philip. Secret Soldiers: The Story of World War II’s Heroic Army of Deception. New York:
Dutton, 2002.
Gerwehr, Scott and Russell Glenn. The Art of Darkness: Deception and Urban Operations. Santa
Monica, California: Rand, 2000.
Glantz, David M. Soviet Military Deception in the Second World War. Totowa, New Jersey: Frank
Cass, 1989.
Godson, Roy and James J. Wirtz. Strategic Denial and Deception: The Twenty-First Century
Challenge. New Brunswick, New Jersey: Transaction Publishers, 2002.
Handel, Michael, editor. Strategic and Operational Deception in the Second World War. Totowa, New
Jersey: Frank Cass, 1989.
Handel, Michael, editor. War, Strategy and Intelligence. Totowa, New Jersey: Frank Cass, 1989.
Hartcup, Guy. Camouflage: A History of Concealment and Deception in War. New York: Scribner’s,
1980.
Haswell, Jock. D-Day: Intelligence and Deception. New York: Times Books, 1979.
Haswell, Jock. The Tangled Web: The Art of Tactical and Strategic Deception. Wendover: John
Goodchild Publishers, 1984.
Hesketh, Roger. Fortitude: The D-Day Deception Campaign. Woodstock, New York: Overlook Press,
2002.
Holt, Thaddeus. The Deceivers: Allied Military Deception in the Second World War. New York:
Scribner, 2004.
Howard, Sir Michael. British Intelligence in the Second World War: Strategic Deception. Vol. 5. New
York: Cambridge University Press, 1989.
Huber, Dr. Thomas M. Pastel: Deception in the Invasion of Japan. Fort Leavenworth, Kansas: Combat
Studies Institute, U.S. Army Command and General Staff College, 1988.
Jones, R. V. The Wizard War: British Scientific Intelligence, 1939-1945. New York: Coward, McCann,
& Geoghegan, 1972.
Lloyd, Mark. The Art of Military Deception. London: L. Cooper, 1997.
Macintyre, Ben. Operation Mincemeat: How a Dead Man and a Bizarre Plan Fooled the Nazis and
Assured an Allied Victory. New York: Harmony Books, 2010.
Mahl, Thomas. Desperate Deception: British Covert Operations in the United States, 1939-44.
Washington D.C.: Brassey’s Inc., 1998.
Masterman, J. C. The Double-Cross System in the War of 1939 to 1945. New Haven: Yale University
Press, 1972.
Montagu, Ewen. The Man Who Never Was. Philadelphia: J.B. Lippincott Company, 1954.
Mure, David. Master of Deception: Tangled Webs in London and the Middle East. London: William
Kimber, 1980.
Mure, David. Practice to Deceive. London: William Kimber, 1977.
Reit, Seymour. Masquerade: The Amazing Camouflage Deceptions of World War II. New York:
Hawthorn Books, 1978.
Sun Tzu. The Art of War. New York: Oxford University Press, 1971.
The 1991 Intelligence Authorization Act.
Whaley, Barton. Codeword BARBAROSSA. Cambridge, Massachusetts: MIT Press, 1973.
Whaley, Barton. Practise to Deceive: Learning Curves of Military Deception Planners. Annapolis,
Maryland: Naval Institute Press, 2016.
Whaley, Barton. Stratagem: Deception and Surprise in War. Boston: Artech House, 2007.
control, centralized, 1-26 running estimate, 2-16–2-21 deception plan, adjusting, 3-1,
criteria, 3-26 support from, 2-6 3-6–3-9
execution, 3-25 support to, 2-10 approving, 2-76
controlling planner, execution, synchronizing, 2-64 assess, 4-5
3-18, 3-20–3-21 unlawful, 2-91–2-95 authority, 3-19
responsibilities, 3-24 viable, 2-9 benefits from, 2-101
support from, 3-27 deception activities, 2-91, 2-121 construction, 2-30
developing, 1-4, 1-7, 1-70, 2-3, coordination with, 3-13
coordination, 2-106, 3-10 cyberspace operations, 2-119
civil-military operations, 2-122 2-120
enemy, A-1, A-4 enemy, A-2
deception event schedule, executing, 3-4, 3-17–3-27
4-14 sequencing, 1-57
identifying enemy’s, A-3
deception plan, 3-2 deception assets, husbanding, implementation, 3-20
electronic warfare, 2-116 1-55–1-56 intelligence production from,
intelligence staff, A-3 deception event, 2-13, 2-65, 2-72, 2-80
MDO, 1-76, 2-111, 3-2, 3-10, 3-18, 4-3 protection of, 3-16
4-14, A-3 assessment plan, 4-3 quality, 2-83, 3-22
multinational, 2-125 defined, 1-17, 2-64 requirements of, 2-79
planning, 1-60, 2-23 risk, 2-128
requirements, 1-71, 1-75, deception event schedule, 2-70,
3-12 support from, 2-22
2-89–2-90, 2-123–2-125 support to, 4-16
completing, 2-75, 2-78, 3-20
counterdeception, defined, A-1 considerations, 2-66 deception planning, creating, 2-28
planning, A-1–A-2 developing, 2-64–2-66, 2-70, feedback and, 2-68
course of action. See COA. 4-14 guidance, 2-3–2-6
credibility, 2-45 sequencing, 2-66 methodology, 2-24–2-26
MISO, 2-114 support from, 2-66 security, 2-23
deception execution, activities, steps of process, 2-27–2-75
criteria, feedback, 2-68–2-70
3-5–3-16 support to, 2-77–2-88
termination, 2-71
deception goal, alternatives, 2-18 deception story, compromised,
cultural, bias, 2-39
approval, 2-21 3-14
cyberspace electromagnetic defined, 1-9 confirming, 2-47
activities, 1-78 determine, 2-3–2-5, 2-31–2-32 conveying, 2-64
cyberspace operations, 2-118– output, 2-8 defined, 1-22
2-119 planning, 2-27 developing, 2-58–2-59
effective, 2-59
D deception in support of operations
supporting, 2-107
security. See DISO.
data, 1-14, 2-77 time for, 2-13
collecting and treating, 4-9 deception means, 1-61–1-68,
deception target, 2-33–2-54
collection plan, 4-8 2-64, 2-65
analyzing, 2-42–2-48
categories of, 1-61
deception, assessment of, 4-1 defined, 1-11
defined, 1-61
categories, 1-4–1-7 identifying, 2-33
developing, 2-56–2-57
challenge, 4-2 information, 2-85
perceptions and, 2-57
characteristics of, 1-51 perceptions of, 2-55
confirming enemy’s, A-4 deception objective, 2-8, 2-55, understanding, 2-11
detecting enemy’s, A-3 2-58, 4-1 versus MISO target, 2-112
see-think-do, 2-26 defined, 1-10
deception task, completing, 2-111
employment of, 1-61 determine, 2-32
identifying, 1-73, 2-4 deception working group. See
exposing, A-7
focus, 2-25 planning, 2-27 DWG.
guidance for, 1-23 running estimate and, 2-18 decision making, enemy, 2-49
integrating, 2-99 deception observable, developing, influencing, 2-39
MOP and, 4-13 2-56–2-57, 2-112 decision-making process, 2-87
movement, 3-18 deception operations, constraints, decision-making structure, 2-35
OPSEC, 2-97–2-109, 3-10– 2-92, 2-93
3-11 decision-making style, 2-36
controlling, 3-25–3-27
personnel, A-3 information collection, 2-82 decoy, defined, 1-68
planning process, 2-22–2-75 monitoring, 3-22–3-24 demonstration, 2-114, 2-116
principles, 1-23–1-29 status, 3-15 defined, 1-37
restrictions to, 2-89 synchronizing, 3-24
results, 4-16 terminating, 3-28–3-30
running estimate, deception, surprise, forms of, 1-46–1-47 terms, military deception, 1-8–
2-16–2-21 sustainment, 3-10–3-13 1-22
preparing, 2-18 time, deception story, 2-13
refining, 2-19 synchronization, 3-10–3-11, 3-24
conduits and, 2-46 mission, 2-13
results, 2-17, 2-20 OPSEC and, 2-108
support from, 2-31–2-32 internal deception and, 3-12
OPSEC plan, 3-10–3-11 transmission, 2-44
ruse, defined, 1-38 timing and, 1-28 timing, planning and, 1-28
electronic warfare, 2-116
legitimate, 2-95 T tools, information management,
B-1
ruse of war, 2-92 tactical deception, defined, 1-6
planning process, 2-22–2-75 transition, 3-18
S versus military deception, 1-6 transmission time, 2-44
security, deception and, 1-27 tactics, deception and, 1-34–1-39 truth, leverage of, 1-53
maintaining, 3-16
see-think-do, 4-11
target. See also enemy. U
analyzing, 2-34, 2-41, 2-53
enemy, 2-25 decision maker, 2-70 update, 3-15
MDO, 2-24
team, commander and, 3-12 V
sequencing rule, 1-57
technical means, 1-63–1-65 validity, intelligence, 1-49
signatures, physical means, 1-62
techniques, application of, 1-40 verifiable, sources, 2-60
simple conduit, 2-46
termination, actions of, 3-29 vulnerabilities, analyzing, 2-53
space operations, 2-120 criteria, 2-71 exploiting, 2-100
staff. See also G-2, G-3, G-5. deception plan, 3-28
intelligence, 3-13 evolving, 2-73 W–X–Y–Z
responsibilities, 1-71–1-80, preparation of, 3-28 working group. See also DWG.
3-17, A-4 scenarios, 2-74 analysis by, A-4
suitability, mission, 2-12 termination plan, completing, 2-75 functions, A-5
supporting observable, 1-19 developing, 2-71–2-74
%\2UGHURIWKH6HFUHWDU\RIWKH$UP\
MARK A. MILLEY
*HQHUDO8QLWHG6WDWHV$UP\
&KLHIRI6WDII
2IILFLDO
KATHLEEN S. MILLER
Administrative Assistant
to the Secretary of the Army
1905601
DISTRIBUTION:
Active Army, Army National Guard, and United States Army Reserve: 7R EH Gistributed in
DFFRUGDQFHZLWKWKHLQLWLDOGLVWUXEXWLRQQXPEHU,'1116087UHTXLUHPHQWVIRUFM 3-13.4
This page intentionally left blank.
This page intentionally left blank.
This page intentionally left blank.
PIN 204644000