Advertisement

Deception in the Cyber-World

  • William Hutchinson
Chapter
Part of the Intelligent Systems, Control and Automation: Science and Engineering book series (ISCA, volume 78)

Abstract

Like any other communication medium, cyber-space has been used for deception since its inception. Originally a medium that gave immediate global range to deceptive messages, it also provided a medium to contradict any deceptive message sent. Of course, messages are not necessarily true or false but convey an opinion about reality that the recipient accepts or does not. The main concern of managers of this information has been that the messages have not been corrupted by those with malevolent intent. Hence, at its simplest level the integrity of the message (in the information security sense) is the primary objective. With more complex messages the use of propaganda techniques that attempt to influence opinions are of concern. A medium such as the public Internet with its low cost of entry and ubiquitous access is ideal for this and, because of its multi-media and interactive format, gives a much better success rate that ‘conventional’ media. Cyber-space over the last few years has rapidly entered a new phase with almost universal use of mobile online devices that many individuals and organisations are becoming increasingly dependent on. In this environment two other developments have significant implications for the practice of deception which changes the degree to which it changes the relationship of machines, deception and humans. These new factors are: the development of neuroscience and its associated technologies, and networked robotics. These are examined in this chapter and the consequences for deception at the level of individuals and large groups are examined.

Keywords

Unmanned Aerial Vehicle Brain Computer Interface Term Effort Seismic Emission Improvise Explosive Device 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Barrat J (2013) Our final invention: artificial intelligence and the end of the human era. Thomas Dunne Books, New YorkGoogle Scholar
  2. Bell JB, Whaley B (1991) Cheating and deception. Transaction Publishers, New BrunswickGoogle Scholar
  3. Benjamin M (2013) Drone warfare: killing by remote control. Verso, LondonGoogle Scholar
  4. Bennett M, Waltz E (2007) Counterdeception principles and applications for national security. Artech House, NorwoodGoogle Scholar
  5. Castells M (2007) Communication, power and counter-power in the network society. Int J Commun 1:238–266Google Scholar
  6. Clark A (2014) Mindware: an introduction to the philosophy of cognitive science, 2nd edn. Oxford University Press, OxfordGoogle Scholar
  7. Clark RM (2010) The technical collection of intelligence. CQ Press, Washington, DCGoogle Scholar
  8. Cragin K, Gerwehr S (2005) Dissuading terror: strategic influence and the struggle against terrorism. RAND, Santa MonicaGoogle Scholar
  9. Fogg BJ (2003) Persuasive technology: using computers to change what we think and do. Morgan Kaufmann Publishers, San FranciscoGoogle Scholar
  10. Forbes P (2009) Dazzled and deceived: mimicry and camouflage. Yale University Press, New HavenGoogle Scholar
  11. Gibson W (1984) Neuromancer. Harper Collins, LondonGoogle Scholar
  12. Hill H, Johnston A (2007) The hollow-face illusion: object-specific knowledge, general assumptions or properties of the stimulus? Perception 36(2):199–223. doi: 10.1068/p5523 CrossRefGoogle Scholar
  13. Libicki MC (2007) Conquest in cyberspace: national security and information warfare. Cambridge University Press, New YorkCrossRefGoogle Scholar
  14. Lukes S (2005) Power: a radical view, 2nd edn. Palgrave MacMillan, BasingstokeGoogle Scholar
  15. Machiavelli N (1532/1983) The prince (tran: Bull G). Penguin Books, LondonGoogle Scholar
  16. Matrix (1999) Matrix, DVD, 131 minutes. Village Roadshow FilmsGoogle Scholar
  17. Peacock M, Johnstone M (2013) Towards detection and control of civilian unmanned aerial vehicles. In: Valli C (ed) Proceedings of the 14th Australian information warfare conference (Perth, 2013). Edith Cowan University, Perth, pp 9–15Google Scholar
  18. Rao RPN (2013) Brain-computer interfacing: an introduction. Cambridge University Press, New YorkCrossRefGoogle Scholar
  19. Satel S, Lilienfeld SO (2013) Brainwashed: the seductive appeal of mindless neuroscience. Basic Books, New YorkGoogle Scholar
  20. Simons DJ, Chabris CF (1999) Gorillas in our midst: sustained inattentional blindness for dynamic events. Perception 28(9):1059–1074CrossRefGoogle Scholar
  21. Singer PW (2009) Wired for war: the robotics revolution and conflict in the 21st century. Penguin Books, New YorkGoogle Scholar
  22. Stahl R (2010) Militainment Inc.: war, media and popular culture. Routledge, New YorkGoogle Scholar
  23. Wesson K, Humphreys T (2013) Hacking drones. Sci Am 309(5):54–59CrossRefGoogle Scholar
  24. Willacy M (2013) Fukushima. MacMillan, SydneyGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Security Research InstituteEdith Cowan UniversityJoondalupAustralia

Personalised recommendations