Misperception, Self-Deception and Information Warfare Lachlan - - PowerPoint PPT Presentation

misperception self deception and information warfare
SMART_READER_LITE
LIVE PREVIEW

Misperception, Self-Deception and Information Warfare Lachlan - - PowerPoint PPT Presentation

Misperception, Self-Deception and Information Warfare Lachlan Brumley, Carlo Kopp and Kevin Korb Clayton School of Information Technology, Monash University, Australia email: lbrumley@csse.monash.edu.au, carlo@csse.monash.edu.au,


slide-1
SLIDE 1

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception, Self-Deception and

Information Warfare

Lachlan Brumley, Carlo Kopp and Kevin Korb

Clayton School of Information Technology, Monash University, Australia email: lbrumley@csse.monash.edu.au, carlo@csse.monash.edu.au, korb@csse.monash.edu.au

slide-2
SLIDE 2

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Overview
  • Information Warfare strategies
  • OODA loop model
  • Misperception, Deception and Self-Deception explained in terms of

the OODA loop model and Information Warfare strategies

slide-3
SLIDE 3

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Information Warfare Strategies

The canonical Information Warfare strategies are as follows:

  • 1. Degradation or Destruction / Denial of Information
  • 2. Corruption / Deception and Mimicry
  • 3. Denial [1] / Disruption and Destruction
  • 4. Denial [2] / Subversion
  • 5. Exploitation

Exploitation is not considered to be an IW strategy, as it does not manipulate the information channel. However it has been included here for completeness.

slide-4
SLIDE 4

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Decision - Action Models
  • Information Warfare/Strategy - OODA Loop (Boyd)
  • Psychology - Perception Action Cycle (Neisser)
  • Psychology - Human Action Cycle (Norman)
  • Artificial Intelligence, Robotics - Perception Action Loop (Russell

and Norvig) Two things that these models all have in common:

  • 1. Event Loop. In all these models, the individual gathers and analyses

information, then decides what to do and finally does it

  • 2. Feedback. Actions from past decision cycles alter the world, the

results of which are observed in present and future decision cycles

slide-5
SLIDE 5

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Boyd’s OODA Loop

World Observation Orientation Decision Action Model of the World

slide-6
SLIDE 6

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Boyd’s OODA Loop

World Observation Orientation Decision Action Model of the World

slide-7
SLIDE 7

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Boyd’s OODA Loop

World Observation Orientation Decision Action Model of the World

slide-8
SLIDE 8

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Boyd’s OODA Loop

World Observation Orientation Decision Action Model of the World

slide-9
SLIDE 9

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Boyd’s OODA Loop

World Observation Orientation Decision Action Model of the World

slide-10
SLIDE 10

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Boyd’s OODA Loop

World Observation Orientation Decision Action Model of the World

slide-11
SLIDE 11

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Boyd’s OODA Loop

World Observation Orientation Decision Action Model of the World

slide-12
SLIDE 12

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception
  • Deception is another label for the Corruption Information Warfare

strategy

  • During a Deception attempt the Attacker corrupts information that

will be perceived by the Defender

  • The corrupted information is intended to alter the Defender’s model
  • f the world
  • If the deception succeeds the Defender integrates the new corrupted

information into their model of the world

  • Decisions and Actions made by the Defender based on its corrupted

model of the world will benefit the Attacker

slide-13
SLIDE 13

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception and the OODA loop

Roadrunner Coyote

Action Model of Decision Action World Observation Orientation Observation Orientation Model of the world Decision the world

slide-14
SLIDE 14

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception and the OODA loop

Roadrunner Coyote

Action Model of Decision Action Observation Orientation World Observation Orientation Model of the world Decision the world

slide-15
SLIDE 15

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception and the OODA loop

Roadrunner Coyote

Action Model of Decision Action World Observation Orientation Observation Orientation Model of the world Decision the world

slide-16
SLIDE 16

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception and the OODA loop

Roadrunner Coyote

Action Model of Decision Action World Observation Orientation Observation Orientation Model of the world Decision the world

slide-17
SLIDE 17

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception and the OODA loop

Roadrunner Coyote

World Model of the world Decision Action Observation Orientation Action Model of Decision Orientation Observation the world

slide-18
SLIDE 18

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception and the OODA loop

Roadrunner Coyote

Observation Model of the world Orientation Decision Action Observation Orientation Decision Model of Action World the world

slide-19
SLIDE 19

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Deception and the OODA loop

Roadrunner Coyote

Observation Model of the world Orientation Decision Action Observation Orientation Decision Model of Action World the world

slide-20
SLIDE 20

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception

There are two potential causes of an individual’s misperception:

  • 1. Malfunctioning information receiver
  • Occurs during the Observation step of the OODA loop
  • An information receiver could be eyes, ears, a radar receiver, a

video camera

  • The malfunction could be due to an IW attack against the infor-

mation receiver (Denial [1] / Disruption and Destruction) or due to other causes

  • 2. Existing bias or flawed analysis methods
  • Occurs during the Orientation step of the OODA loop
  • Prevents the correct interpretation or integration of the new in-

formation

slide-21
SLIDE 21

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception and the OODA loop

Coyote

World Observation Orientation Decision Action Model of the World

slide-22
SLIDE 22

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception and the OODA loop

Coyote

World Observation Orientation Decision Action Model of the World

slide-23
SLIDE 23

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception and the OODA loop

Coyote

World Observation Orientation Decision Action Model of the World

slide-24
SLIDE 24

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception and the OODA loop

Coyote

World Observation Orientation Decision Action Model of the World

slide-25
SLIDE 25

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception and the OODA loop

Coyote

World Observation Orientation Decision Action Model of the World

slide-26
SLIDE 26

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Misperception and the OODA loop

Coyote

World Observation Orientation Decision Action Model of the World

slide-27
SLIDE 27

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception
  • Self-Deception is a special type of Deception where the Attacker and

the Defender are the same entity

  • There are two different proposals for how self-deception may aid the

self-deceiver

  • 1. Self-Deception used to aid Deception (Trivers)
  • 2. Self-Deception used to hide information that will be harmful if

perceived (Ramachandran)

  • It is not necessary that a Self-Deceiver benefits from their Self-
  • Deception. An individual may use Self-Deception to create a model
  • f the world that is greatly different from reality. Decisions and Ac-

tions made based upon this model will not have the effects intended by the Self-Deceiver

slide-28
SLIDE 28

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception (1)

Self-Deception aiding deception

  • The Attacker (Self-Deceiver) intentionally adds corrupted informa-

tion to their perceived model of the world

  • The Attacker then allows the Defender (Deception Victim) to per-

ceive the corrupted information, as in normal Deception

  • The Defender will also perceive the Attacker’s behaviour, which will

indicate that they believe the corrupted information. This will in- crease the chance that the Defender will be deceived by the corrupted information

  • The Attacker can later remove the corrupted information from their

world model and then take advantage of the Defender’s actions

slide-29
SLIDE 29

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Action World the world Observation Orientation the world Decision Action Model of Model of Observation Orientation Decision

slide-30
SLIDE 30

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Decision Model of Decision Action World Observation Orientation Action Observation Orientation Model of the world the world

slide-31
SLIDE 31

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

the world Model of Decision Action Observation Orientation World Observation Action Decision Orientation Model of the world

slide-32
SLIDE 32

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Model of Model of Decision Action World Observation Orientation Action Observation Orientation Decision the world the world

slide-33
SLIDE 33

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Action the world Decision Action Observation Orientation World Observation Orientation Model of the world Decision Model of

slide-34
SLIDE 34

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Action Model of Decision Action Observation Orientation World Observation Orientation Model of the world Decision the world

slide-35
SLIDE 35

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Action Model of Decision Action Orientation Observation World Observation Orientation Model of the world Decision the world

slide-36
SLIDE 36

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Decision Model of Decision Action World Observation Orientation Action Observation Orientation Model of the world the world

slide-37
SLIDE 37

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Action Model of Decision Action Observation Orientation World Observation Orientation Model of the world Decision the world

slide-38
SLIDE 38

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

World the world Model of Decision Action Observation Action Decision the world Model of Orientation Observation Orientation

slide-39
SLIDE 39

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Decision the world Model of Decision Action World Observation Action Observation Orientation Model of the world Orientation

slide-40
SLIDE 40

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Roadrunner Coyote

Decision the world Model of Decision Action World Observation Action Observation Orientation Model of the world Orientation

slide-41
SLIDE 41

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception (2)

Self-Deception used to hide information that will be harmful if per- ceived

  • The Self-Deceiver is unable to integrate or process this information,

as it is incompatible with their perceived model of the world

  • The Self-Deceiver is then forced to Corrupt the new information and

their own model of the world until the two are compatible. Then the new information can be successfully integrated

  • The danger of using this behaviour is that the Self-Deceiver’s model
  • f the world becomes more inaccurate, increasing the chance of

future Misperception

slide-42
SLIDE 42

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Coyote

the World Observation Orientation World Model of Decision Action

slide-43
SLIDE 43

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Coyote

Model of Observation Orientation World the World Decision Action

slide-44
SLIDE 44

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Coyote

Model of Observation Orientation World the World Decision Action

slide-45
SLIDE 45

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Coyote

Model of Observation Orientation World the World Decision Action

slide-46
SLIDE 46

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Coyote

Model of Observation Orientation World the World Decision Action

slide-47
SLIDE 47

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Self-Deception and the OODA loop

Coyote

Model of Observation Orientation World the World Decision Action

slide-48
SLIDE 48

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Summary
  • Demonstrated how Misperception, Deception and Self-Deception

can be modelled in terms of the OODA loop

  • Misperception, Deception and Self-Deception each may be caused

by the use of an Information Warfare attack

  • Cyclic Decision - Action models with feedback demonstrate how

information used in previous decision iterations can affect present and future decisions

  • Information Warfare strategies allow individuals to affect their own

perceived world state and that of their opponents

slide-49
SLIDE 49

CLAYTON SCHOOL OF INFORMATION TECHNOLOGY

  • Questions?