Page 1
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Misperception, Self-Deception andInformation Warfare
Lachlan Brumley, Carlo Kopp and Kevin Korb
Clayton School of Information Technology,Monash University, Australiaemail: [email protected] , [email protected] ,
[email protected]
Page 2
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Overview
• Information Warfare strategies
• OODA loop model
• Misperception, Deception and Self-Deception explained in terms of
the OODA loop model and Information Warfare strategies
Page 3
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Information Warfare Strategies
The canonical Information Warfare strategies are as follows:
1. Degradation or Destruction / Denial of Information
2. Corruption / Deception and Mimicry
3. Denial [1] / Disruption and Destruction
4. Denial [2] / Subversion
5. Exploitation
Exploitation is not considered to be an IW strategy, as it does not
manipulate the information channel. However it has been included here
for completeness.
Page 4
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Decision - Action Models
• Information Warfare/Strategy - OODA Loop (Boyd)
• Psychology - Perception Action Cycle (Neisser)
• Psychology - Human Action Cycle (Norman)
• Artificial Intelligence, Robotics - Perception Action Loop (Russell
and Norvig)
Two things that these models all have in common:
1. Event Loop. In all these models, the individual gathers and analyses
information, then decides what to do and finally does it
2. Feedback. Actions from past decision cycles alter the world, the
results of which are observed in present and future decision cycles
Page 5
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Boyd’s OODA Loop
World
Observation Orientation
DecisionAction
Model of the World
Page 6
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Boyd’s OODA Loop
World
Observation Orientation
DecisionAction
Model of the World
Page 7
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Boyd’s OODA Loop
World
Observation Orientation
DecisionAction
Model of the World
Page 8
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Boyd’s OODA Loop
World
Observation Orientation
DecisionAction
Model of the World
Page 9
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Boyd’s OODA Loop
World
Observation Orientation
DecisionAction
Model of the World
Page 10
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Boyd’s OODA Loop
World
Observation Orientation
DecisionAction
Model of the World
Page 11
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Boyd’s OODA Loop
World
Observation Orientation
DecisionAction
Model of the World
Page 12
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception
• Deception is another label for the Corruption Information Warfare
strategy
• During a Deception attempt the Attacker corrupts information that
will be perceived by the Defender
• The corrupted information is intended to alter the Defender’s model
of the world
• If the deception succeeds the Defender integrates the new corrupted
information into their model of the world
• Decisions and Actions made by the Defender based on its corrupted
model of the world will benefit the Attacker
Page 13
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception and the OODA loop
RoadrunnerCoyote
Action
Model of
Decision Action
World
ObservationOrientation
Observation Orientation
Model ofthe world
Decision
the world
Page 14
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception and the OODA loop
RoadrunnerCoyote
Action
Model of
Decision Action
ObservationOrientation
World
Observation Orientation
Model ofthe world
Decision
the world
Page 15
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception and the OODA loop
RoadrunnerCoyote
Action
Model of
Decision Action
World
ObservationOrientation
Observation Orientation
Model ofthe world
Decision
the world
Page 16
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception and the OODA loop
RoadrunnerCoyote
Action
Model of
Decision Action
World
ObservationOrientation
Observation Orientation
Model ofthe world
Decision
the world
Page 17
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception and the OODA loop
RoadrunnerCoyote World Model ofthe world
DecisionAction
Observation OrientationAction
Model of
Decision
Orientation Observation
the world
Page 18
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception and the OODA loop
RoadrunnerCoyote
Observation
Model ofthe world
Orientation
Decision Action Observation Orientation
Decision
Model of
Action
Worldthe world
Page 19
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Deception and the OODA loop
RoadrunnerCoyote
Observation
Model ofthe world
Orientation
Decision Action Observation Orientation
Decision
Model of
Action
Worldthe world
Page 20
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
MisperceptionThere are two potential causes of an individual’s misperception:
1. Malfunctioning information receiver
• Occurs during the Observation step of the OODA loop
• An information receiver could be eyes, ears, a radar receiver, a
video camera
• The malfunction could be due to an IW attack against the infor-
mation receiver (Denial [1] / Disruption and Destruction) or due
to other causes
2. Existing bias or flawed analysis methods
• Occurs during the Orientation step of the OODA loop
• Prevents the correct interpretation or integration of the new in-
formation
Page 21
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Misperception and the OODA loop
CoyoteWorld
Observation Orientation
DecisionAction
Model of the World
Page 22
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Misperception and the OODA loop
CoyoteWorld
Observation Orientation
DecisionAction
Model of the World
Page 23
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Misperception and the OODA loop
CoyoteWorld
Observation Orientation
DecisionAction
Model of the World
Page 24
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Misperception and the OODA loop
CoyoteWorld
Observation Orientation
DecisionAction
Model of the World
Page 25
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Misperception and the OODA loop
CoyoteWorld
Observation Orientation
DecisionAction
Model of the World
Page 26
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Misperception and the OODA loop
CoyoteWorld
Observation Orientation
DecisionAction
Model of the World
Page 27
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception• Self-Deception is a special type of Deception where the Attacker and
the Defender are the same entity
• There are two different proposals for how self-deception may aid the
self-deceiver
1. Self-Deception used to aid Deception (Trivers)
2. Self-Deception used to hide information that will be harmful if
perceived (Ramachandran)
• It is not necessary that a Self-Deceiver benefits from their Self-
Deception. An individual may use Self-Deception to create a model
of the world that is greatly different from reality. Decisions and Ac-
tions made based upon this model will not have the effects intended
by the Self-Deceiver
Page 28
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception (1)
Self-Deception aiding deception
• The Attacker (Self-Deceiver) intentionally adds corrupted informa-
tion to their perceived model of the world
• The Attacker then allows the Defender (Deception Victim) to per-
ceive the corrupted information, as in normal Deception
• The Defender will also perceive the Attacker’s behaviour, which will
indicate that they believe the corrupted information. This will in-
crease the chance that the Defender will be deceived by the corrupted
information
• The Attacker can later remove the corrupted information from their
world model and then take advantage of the Defender’s actions
Page 29
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Action
Worldthe world
ObservationOrientation
the world
Decision Action
Model of Model of
Observation Orientation
Decision
Page 30
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Decision
Model of
Decision Action
World
ObservationOrientation Action
Observation Orientation
Model ofthe worldthe world
Page 31
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyotethe world
Model of
Decision Action
ObservationOrientation
World
Observation
Action Decision
Orientation
Model ofthe world
Page 32
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote Model ofModel of
Decision Action
World
ObservationOrientation Action
Observation Orientation
Decision
the worldthe world
Page 33
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Action
the world
Decision Action
ObservationOrientation
World
Observation Orientation
Model ofthe world
Decision
Model of
Page 34
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Action
Model of
Decision Action
ObservationOrientation
World
Observation Orientation
Model ofthe world
Decision
the world
Page 35
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Action
Model of
Decision Action
Orientation Observation
World
Observation Orientation
Model ofthe world
Decision
the world
Page 36
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Decision
Model of
Decision Action
World
ObservationOrientation Action
Observation Orientation
Model ofthe worldthe world
Page 37
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Action
Model of
Decision Action
ObservationOrientation
World
Observation Orientation
Model ofthe world
Decision
the world
Page 38
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner CoyoteWorldthe worldModel of
Decision Action
Observation Action Decision
the worldModel of
OrientationObservation
Orientation
Page 39
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Decision
the worldModel of
Decision Action
World
Observation Action
Observation Orientation
Model ofthe world
Orientation
Page 40
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Roadrunner Coyote
Decision
the worldModel of
Decision Action
World
Observation Action
Observation Orientation
Model ofthe world
Orientation
Page 41
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception (2)
Self-Deception used to hide information that will be harmful if per-
ceived
• The Self-Deceiver is unable to integrate or process this information,
as it is incompatible with their perceived model of the world
• The Self-Deceiver is then forced to Corrupt the new information and
their own model of the world until the two are compatible. Then
the new information can be successfully integrated
• The danger of using this behaviour is that the Self-Deceiver’s model
of the world becomes more inaccurate, increasing the chance of
future Misperception
Page 42
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Coyotethe World
Observation Orientation
WorldModel of
DecisionAction
Page 43
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Coyote Model of
Observation Orientation
World the World
DecisionAction
Page 44
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Coyote Model of
Observation Orientation
World the World
DecisionAction
Page 45
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Coyote Model of
Observation Orientation
World the World
DecisionAction
Page 46
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Coyote Model of
Observation Orientation
World the World
DecisionAction
Page 47
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Self-Deception and the OODA loop
Coyote Model of
Observation Orientation
World the World
DecisionAction
Page 48
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Summary
• Demonstrated how Misperception, Deception and Self-Deception
can be modelled in terms of the OODA loop
• Misperception, Deception and Self-Deception each may be caused
by the use of an Information Warfare attack
• Cyclic Decision - Action models with feedback demonstrate how
information used in previous decision iterations can affect present
and future decisions
• Information Warfare strategies allow individuals to affect their own
perceived world state and that of their opponents
Page 49
CLAYTON SCHOOL OF INFORMATION TECHNOLOGY
�
�
�
�
�
�
Questions?