Download SB2C Helldiver in Detail & Scale Vol 52 by Bert Kinzey PDF

By Bert Kinzey

Aspect & Scale SB2C Helldiver

Show description

Read Online or Download SB2C Helldiver in Detail & Scale Vol 52 PDF

Similar military technology books

Modern Submarine Warfare

Submarines in the course of conflict

Gunboat Diplomacy 1919–1979: Political Applications of Limited Naval Force

Gunboat international relations 1919-1979: Political functions of constrained Naval strength

Extra info for SB2C Helldiver in Detail & Scale Vol 52

Example text

V. Jones is a concise, clear specification of the ways to hide something real (dissimulation) and the corresponding ways to show something false (simulation) in its place. The Principles of Security I hope that, without being historically comprehensive, the examples that I have given above will illustrate the principles of deception as far as I know them. As a first step, what has to be done is to prevent the enemy from deducing at least one of the following: 1. 2. 3. 4. 5. 6. 7. 8. Where you are, and/or where he is.

8. Where you are, and/or where he is. What weapons and forces you have at your disposal. What you intend to do. Where you intend to do it. When you intend to do it. How you intend to do it. Your knowledge of the enemy’s intentions and techniques. How successful the enemy’s operations are. All these objectives are in a sense negative, but they may be sufficient to achieve surprise. Basically they involve security rather than deception. Wolfe, for example, surprised Montcalm at Quebec because Montcalm had not thought that the Heights of Abraham could be scaled;2 and the introduction of centimetric radar helped to change the balance in the battle of the Atlantic because the Germans were unaware that we had developed this new technique.

4-40. 39 Deception Maxims: Fact and Folklore 7. 8. 9. 10. 40 cycle folks continually contend with “our threat,” while friendly commanders employ it at the time and place of their choosing. Sequencing Rule: Deception activities should be sequenced to maximize the portrayal of the deception story for as long as possible. Unit activities indicating the true mission should be masked (operational security, or OPSEC) to the last possible instant. Importance of Feedback: An intelligence collection scheme should be employed to determine if the deception is being adopted, rejected, or deceptively countered.

Download PDF sample

Rated 4.26 of 5 – based on 47 votes