Skip to main content

Deception in the Cyber-World

  • Chapter
  • First Online:
Book cover Cyber Security: Analytics, Technology and Automation

Part of the book series: Intelligent Systems, Control and Automation: Science and Engineering ((ISCA,volume 78))

  • 2928 Accesses

Abstract

Like any other communication medium, cyber-space has been used for deception since its inception. Originally a medium that gave immediate global range to deceptive messages, it also provided a medium to contradict any deceptive message sent. Of course, messages are not necessarily true or false but convey an opinion about reality that the recipient accepts or does not. The main concern of managers of this information has been that the messages have not been corrupted by those with malevolent intent. Hence, at its simplest level the integrity of the message (in the information security sense) is the primary objective. With more complex messages the use of propaganda techniques that attempt to influence opinions are of concern. A medium such as the public Internet with its low cost of entry and ubiquitous access is ideal for this and, because of its multi-media and interactive format, gives a much better success rate that ‘conventional’ media. Cyber-space over the last few years has rapidly entered a new phase with almost universal use of mobile online devices that many individuals and organisations are becoming increasingly dependent on. In this environment two other developments have significant implications for the practice of deception which changes the degree to which it changes the relationship of machines, deception and humans. These new factors are: the development of neuroscience and its associated technologies, and networked robotics. These are examined in this chapter and the consequences for deception at the level of individuals and large groups are examined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Barrat J (2013) Our final invention: artificial intelligence and the end of the human era. Thomas Dunne Books, New York

    Google Scholar 

  • Bell JB, Whaley B (1991) Cheating and deception. Transaction Publishers, New Brunswick

    Google Scholar 

  • Benjamin M (2013) Drone warfare: killing by remote control. Verso, London

    Google Scholar 

  • Bennett M, Waltz E (2007) Counterdeception principles and applications for national security. Artech House, Norwood

    Google Scholar 

  • Castells M (2007) Communication, power and counter-power in the network society. Int J Commun 1:238–266

    Google Scholar 

  • Clark A (2014) Mindware: an introduction to the philosophy of cognitive science, 2nd edn. Oxford University Press, Oxford

    Google Scholar 

  • Clark RM (2010) The technical collection of intelligence. CQ Press, Washington, DC

    Google Scholar 

  • Cragin K, Gerwehr S (2005) Dissuading terror: strategic influence and the struggle against terrorism. RAND, Santa Monica

    Google Scholar 

  • Fogg BJ (2003) Persuasive technology: using computers to change what we think and do. Morgan Kaufmann Publishers, San Francisco

    Google Scholar 

  • Forbes P (2009) Dazzled and deceived: mimicry and camouflage. Yale University Press, New Haven

    Google Scholar 

  • Gibson W (1984) Neuromancer. Harper Collins, London

    Google Scholar 

  • Hill H, Johnston A (2007) The hollow-face illusion: object-specific knowledge, general assumptions or properties of the stimulus? Perception 36(2):199–223. doi:10.1068/p5523

    Article  Google Scholar 

  • Libicki MC (2007) Conquest in cyberspace: national security and information warfare. Cambridge University Press, New York

    Book  Google Scholar 

  • Lukes S (2005) Power: a radical view, 2nd edn. Palgrave MacMillan, Basingstoke

    Google Scholar 

  • Machiavelli N (1532/1983) The prince (tran: Bull G). Penguin Books, London

    Google Scholar 

  • Matrix (1999) Matrix, DVD, 131 minutes. Village Roadshow Films

    Google Scholar 

  • Peacock M, Johnstone M (2013) Towards detection and control of civilian unmanned aerial vehicles. In: Valli C (ed) Proceedings of the 14th Australian information warfare conference (Perth, 2013). Edith Cowan University, Perth, pp 9–15

    Google Scholar 

  • Rao RPN (2013) Brain-computer interfacing: an introduction. Cambridge University Press, New York

    Book  Google Scholar 

  • Satel S, Lilienfeld SO (2013) Brainwashed: the seductive appeal of mindless neuroscience. Basic Books, New York

    Google Scholar 

  • Simons DJ, Chabris CF (1999) Gorillas in our midst: sustained inattentional blindness for dynamic events. Perception 28(9):1059–1074

    Article  Google Scholar 

  • Singer PW (2009) Wired for war: the robotics revolution and conflict in the 21st century. Penguin Books, New York

    Google Scholar 

  • Stahl R (2010) Militainment Inc.: war, media and popular culture. Routledge, New York

    Google Scholar 

  • Wesson K, Humphreys T (2013) Hacking drones. Sci Am 309(5):54–59

    Article  Google Scholar 

  • Willacy M (2013) Fukushima. MacMillan, Sydney

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William Hutchinson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Hutchinson, W. (2015). Deception in the Cyber-World. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Analytics, Technology and Automation. Intelligent Systems, Control and Automation: Science and Engineering, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-319-18302-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18302-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18301-5

  • Online ISBN: 978-3-319-18302-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics