Download Two Centuries of Weapons, 1776–1976 by C. B. Colby PDF

By C. B. Colby

In brief discusses guns utilized in the us from the innovative battle to the current.

Show description

Read or Download Two Centuries of Weapons, 1776–1976 PDF

Similar military technology books

Modern Submarine Warfare

Submarines in the course of struggle

Gunboat Diplomacy 1919–1979: Political Applications of Limited Naval Force

Gunboat international relations 1919-1979: Political purposes of restricted Naval strength

Additional resources for Two Centuries of Weapons, 1776–1976

Example text

V. Jones is a concise, clear specification of the ways to hide something real (dissimulation) and the corresponding ways to show something false (simulation) in its place. The Principles of Security I hope that, without being historically comprehensive, the examples that I have given above will illustrate the principles of deception as far as I know them. As a first step, what has to be done is to prevent the enemy from deducing at least one of the following: 1. 2. 3. 4. 5. 6. 7. 8. Where you are, and/or where he is.

8. Where you are, and/or where he is. What weapons and forces you have at your disposal. What you intend to do. Where you intend to do it. When you intend to do it. How you intend to do it. Your knowledge of the enemy’s intentions and techniques. How successful the enemy’s operations are. All these objectives are in a sense negative, but they may be sufficient to achieve surprise. Basically they involve security rather than deception. Wolfe, for example, surprised Montcalm at Quebec because Montcalm had not thought that the Heights of Abraham could be scaled;2 and the introduction of centimetric radar helped to change the balance in the battle of the Atlantic because the Germans were unaware that we had developed this new technique.

4-40. 39 Deception Maxims: Fact and Folklore 7. 8. 9. 10. 40 cycle folks continually contend with “our threat,” while friendly commanders employ it at the time and place of their choosing. Sequencing Rule: Deception activities should be sequenced to maximize the portrayal of the deception story for as long as possible. Unit activities indicating the true mission should be masked (operational security, or OPSEC) to the last possible instant. Importance of Feedback: An intelligence collection scheme should be employed to determine if the deception is being adopted, rejected, or deceptively countered.

Download PDF sample

Rated 4.64 of 5 – based on 27 votes