SURPRISE, SECRECY, AND DECEPTION Topic #12 Preface: Dilbert on Tactical Warning Surprise Attack • Nations are often surprised and/or successfully deceived in international relations. – – – – – – – – – German Strike in the West, May 1940 German Strike in East, June 1941 (Operation Barbarossa) Pearl Harbor, December 1941 Korea War • North Korean invasion of South, June 1950 • Inchon Landings, September 1950 • Chinese intervention, November 1950 Cuban Missile Crisis • SU surprised US prior to October 14, 1962 • US surprised SU on October 22, 1962 Israeli pre-emptive attack on Egyptian Air Force, Six-Day Way Egyptian attack on Israeli forces at Suez Canal, Yom Kippur War Iraqi invasion of Kuwait, August 1990 9/11 attacks on US “Signals vs. Noise” • Why do surprise attacks (etc.) so often succeed? – A few “signals” are buried in a lot of “noise.” • Signals : in this context, bits of information giving advance indications about an upcoming attack (or other surprise). • Noise (or static): the much more numerous bits of information that are essentially random or meaningless, in any case – are not advance indications of anything unusual or threatening. • Signal are typically (and “naturally”) hidden in or camouflaged by noise. Kermit Tyler: RIP 1913-02/24/2010 Signals, Noise, and Expectations • Because of noise, a variety of expectations about the immediate future are plausible, and – usually the most plausible one is that the immediate future will be the same as the present (and recent past). • Decision makers usually have premises/predispositions/mind sets) that lead them to overlook signals inconsistent with the most plausible expectation. – It is difficult to “look at evidence with an open mind,” • contrary to “the doctrine of immaculate perception.” • “Things must be believed to be seen [quickly].” Signals, Noise, and Expectations (cont.) • US before Pearl Harbor: “Japan would be crazy to directly tangle with the U.S.” • SU before Barbarosa: “We have a non-aggregation with Germany – and Germany’s main lesson from WWI was: don’t get into a two-front war.” • US before Chinese intervention in Korea: “The Communist regime needs time to consolidate its rule.” • US before Missile Crisis: “SU would not run the risk of stationing nuclear weapons outside of the SU.” – Also Cuban refugee reports had been “crying wolf” for months. • Such expectations sometimes work the other way. – US in Vietnam: “China intervened unexpectedly in Korea – they may do the same in Vietnam.” Signals, Noise, and Expectations (cont.) • The “signals vs. noise” distinction can also work in the opposite fashion. – What may be interpreted as signals of hostile intent may really just be meaningless noise. • In the middle of the Cuban Missile Crisis, a US U2 spy plane accidently overflew the Chukotka Peninsula (eastern Siberia). – This can lead to “self-fulfilling prophecy” of hostile intent. • “The Spiral Model” • • • • • • Barbara Tuchman, The Guns of August [origins of WWI] Rationale for “appeasement” prior to WWII. Historical controversy regarding origins of the Cold War. Stable vs. Unstable Nuclear Deterrence. “War-by-Accident” scenarios: Failsafe, Dr. Strangelove. Schelling, Arms and Influence, Chapter 6 (“The Dynamics of Mutual Alarm”) Warning and Decision • In summary, it is hard to pick signals out of noise (to “connect the dots”) in advance, – though it may be easy to identify and connect them out later. • And, on the whole, a false sense of security is more prevalent than a false sense of insecurity. • To avoid spiral model: “look ahead and reason back” thinking of ExCom in Cuban Missile Crisis. Secrecy • We saw earlier that a player may have (though does not always have) an incentive to keep his strategy (plan of action) secret from the other player, – particularly in a non-strictly determined zero-sum game. – In the D-Day Game, the Allies wanted to deceive the Germans as to where the invasion would take place and therefore needed to keep their actual plans secret. • In a Chicken Game, a player may be ostensibly committed to a “stand firm” strategy, – but if this really is a bluff, this fact must be kept secret. • So while there is tendency toward “natural deception” resulting from the signal vs. noise distinction, there are also incentives for “artificial [player-made] deception” as well, – that is, to “damp down” signals indicative of their intentions. “Signals vs. Indices” • Another pair of concepts is relevant to consideration of secrecy and deception. – “Signals” vs. “Indices,” • due to Robert Jervis, The Logic of Images in IR. – Unfortunately, the term “signal” is used here in a somewhat different sense from in the “signals vs. noise” distinction. • Signals and Indices are both means that can be used by a player (an “actor” in IR) to project an image of itself that induces preferred perceptions and actions by other players. Signals • A signal is conveyed by words, actions, or other communications the meaning of which is established by convention, i.e., – tactic or explicit understandings among players. • In game theory, signals are now commonly referred to as “cheap talk,” – because it is as easy project a false image when using signals as it is to project a true image. • Examples of signals in IR include: – “words” such as public speeches and messages, diplomatic notes, press releases, confidential messages sent through intermediaries, etc., and – “actions” such as expelling diplomatic personnel, extending or breaking diplomatic relations, good will visits, conspicuous military maneuvers, etc. Indices • An index is a statement or action that carries with it some inherent evidence that the projected image is a true one, – because the index is believed to be inextricably linked to the capabilities and/or intentions of the actor. • Example of indices in IR include: – intercepted private messages; – major actions involving high costs or risk, e.g., • putting US soldiers in West Berlin or South Korea, • putting a US Navy “quarantine” around Cuba. • Homely examples of signal vs. index: – In driving, turn signal vs. slowing down/shifting lanes, etc. – Pitcher’s mannerisms indicating next pitch. Indices Can Evolve into Signals • Do “actions speak louder [have more credibility] than words”? – Deeds/indices may evolve into mere signals, • e.g., car with hood up; • expelling diplomatic personnel, etc. • Using signals, it is as easy to lie as to tell the truth. • Using indices, it is harder to lie than tell the truth, – but it is not impossible, and so – indices may be manipulated. Signals Can Evolve into Indices • In some contexts, what would be otherwise be a mere signal becomes an index, – especially in the context of “repeated play” of a game: in particular • because the actor has an established reputation for telling the truth (even in awkward circumstances), or • because the actor would be subject to severe social or other penalties for being found out as lying. – This is exemplified within established (and non“dysfunctional”) families, work groups, academic departments, circles of friends, etc. Lying vs. Deceiving • Using signals, it as easy to lie as to tell the truth. • This does not mean that it easy to deceive using signals, – precisely because others recognize that you may have an incentive to lie and it is easy to do so. • An actor cannot deceive by signals, if he has a reputation for lying. – Moreover, an actor cannot tell the truth and be believed by signals ,if he has a reputation for lying. • “The boy who cried wolf”: • Fire alarms, etc. – If you want to believed in the future, “honesty is the best policy” for the present. – Also, if you want to deceive in the future, “honesty is the best policy” for the present. Lying vs. Deceiving (cont.) • Games with “incomplete information”: – Players don’t know each others payoffs/preferences. • You suspect someone A is lying and trying to deceive you. – A may be either of two “types”: • someone who wants to tell you the truth, or • someone who is trying deceive you. – You ask A: “Are you telling the truth?” • A’s answer is uninformative, because A’s best reply (answer) will be the same (“yes”) regardless of his type. – However, asking this question may produce somewhat informative indices. • Mannerisms, evident tension or embarrassment, etc. • polygraph tests. – “A diplomat is a man who's sent abroad to lie for his country.” • JFK/Gromyko talks, October 18, 1962 Indices and Intelligence • Especially good indices of A’s intentions are intercepted and decoded signals among members of A’s “team.” – They are playing a zero-conflict coordination game in which there is no incentive to lie. • If B can intercept and decode A’s internal signals, B can get a big advantage. – – – – – Baseball signals (coded vs. uncoded) MAGIC (disclosed 1960) Enigma Machine / Ultra-Secret (disclosed 1974) Venona Project (disclosed 1995). Radio phones (vs. runners, etc.) on battlefield • Navajo Code Talkers (disclosed 1985) Using Secret Intelligence • Breaking an enemy code – may seem to present marvelous opportunities, but – it also generates many paradoxes, dilemmas, and risks requiring strategic choices. • Having broken the codes, what do you do? – Keep the fact that you have broken the code secret. • The is the purest kind of national security “ultra-secret.” • What must be kept secret from the enemy is not his decoded messages but the fact that you are reading them. • If the enemy discovers you have broken his codes, his most obvious (though not necessarily best) response is to change his codes. • So you cannot disclose your achievement publically – U-571 movie (fictionalized): • A few weeks before D-Day, US forces capture a U-boat with its Enigma Machine and codes intact. • The US forces almost wish they had not done this. • They have to keep secret from the Germans the fact that the U-Boat was captured, not sent to the bottom, or else the Germans are likely to change their codes just before D-Day. Using Secret Intelligence (cont.) • You must keep the fact that you have broken the code secret – and also the intelligence derived, – not only from the press and public – but also almost everyone in the government. • For example, the MAGIC decrypts were distributed • to only about a dozen people • only in Washington, and • they were then shredded and burned. – This made it hard to see broad patterns and to “connect the dots.” Using Secret Intelligence (cont.) • Even if you do not (deliberately or in advertently) disclose your intelligence coup, – if you make “too good” use of the intercepted messages, – your enemy will conclude that you have broken his code, and • therefore will change his code (or generate deceptive messages). • So you probably should not exploit the intelligence as fully as you might. – You need to continue to make “normal mistakes” in order not to arouse suspicion. – Down the road, more “Monday morning quarterbacking.” – Controversy and recriminations regarding bombing of Coventry, England, November 14, 1940. – Ditto some Merchant Marine convoys. – Cuban Missile Crisis: great effort to maintain normal routines prior to October 22. Deception: The Man Who Never Was • After clearing German forces from North Africa, the most obvious next Allied target was Sicily – a stepping-stone to Italy. • But the Allies wanted to convince the Germans that Sardinia and Crete were the next targets, – so the Germans would defend Sicily less strongly. • Allied intelligence planted fake documents and identity papers on a body floated ashore in Spain. • German found the documents and evidently believed them, and therefore interpreted Allied preparations to invade Sicily (which could not be hidden) as an attempted deception. Deception (cont.) • The Allies had an intelligence network in occupied Holland. • The Germans got control of this network. • The Allies discovered that their network was actually under German control. • The Allies put naïve allied agents into Holland, – with orders to get information about German forces in the Calais area, – which the Germans would interpret as more evidence that the D-Day landings would be in Calais. Cycles of Deception: Interception • Suppose your opponent learns that you have broken his codes and are intercepting his messages and he believes (correctly) that you don’t know this. – Now your opponent has his own “ultra-secret.” – Since you regard intercepted messages as highly credible indices, your opponent can now turn the tables on you. • While your opponent can merely change his codes, • he can also start generating out deceptive coded messages. – But again they cannot exploit this opportunity “too much,” because • • • • you will figure out that they have found out that you have broken their codes and you will therefore no longer believe their coded messages. Cycles of Deception: Double (etc.) Agents • A has an agent X spying on B • B “finds out” that X is an enemy agent • B can arrest X but also – B can (try to) “turn” the agent into a “double agent” feeding (partially) false messages to A through X. • If A finds out his agent has been turned, – A will discount all the information coming from X, but – A should stay in contact with X, because it is useful for A to know what B wants A to believe. • But if B finds out that A knows X has been “turned,” B can feed true information though X, expecting that B will discount it. Cycles of Deception: Double (etc.) Agents (cont.) • Jervis, Logic of Images: in WWII there was a French colonel in Algeria working as a German agent. – The Allied discovered he was a German agent. – The Allied “turned him” and used him to feed false information to the Germans. – After a while, the Germans figured out he had been turned. – The Germans kept in contact with him, because it was useful for them to know what the Allies wanted you to believe. – Shortly before D-Day, the Allies discovered that the Germans knew the colonel had been turned. – The Allies had the colonel tell the Germans that the D-Day landings would take place at Normandy on June 5, 6, or 7. – To the German, this was conclusive proof that the landings would take anywhere except Normandy and any time except June 5-7. – On June 7, the colonel’s credibility shot up with Germans. – The Allies to resumed feeding false information through the colonel. The Double-Cross System • In the early days of WWII, British (counter) intelligence identified (many) German agents in Britain. • Rather than arresting these agents, the “Twenty Committee” “turned” and “ran” these agents. • This had to be very carefully orchestrated, so the German would not realize their agents had been turned. – The Double-Cross System had to feed some true and useful information to the Germans. – This obviously created difficult relationships with Allied military decision makers. The Double-Cross System (cont.) • The XX Committee “ran” the system conservatively, because the expected the Germans to check information from DoubleCross agents against information from other agents not under British control. – In fact, after the war it was discovered that the Double-Cross System controlled all German agents in Britain. • Once the XX Committee deliberately ran an agent to show that he was under British control, – in order the give German intelligence a false impression of how the British would run double-agents. – But the Germans continued to regard the agent as reliable. • The XX Committee “shot its wad” leading up to D-Day, but the Double-Cross System still didn’t collapse. The Double-Cross System (cont.) • Some ironies: – The success of the Double-Cross System and similar deception operations gave the Allies a large stake in the influence of German intelligence on German decision making. • But Hitler made the final choices, • and did so more on the basis of intuition that intelligence. – The Allies were fearful that defectors from German intelligence would inform the Allies about German agents in Britain, • whom the Germans would then expect to be arrested. • In war-time, truth is so precious that she should always be attended by a bodyguard of lies. Winston Churchill • Virtually all Allied deception efforts built up for the great (tactical) deception for D-Day. – That it would occur later rather than sooner. – That it would be in the Calais area, not Normandy. – That after a first attack, the main blow would be elsewhere. – Some forces were identified as landing in Normandy (as they did). – An entire “phantom” 3rd Army was built up in southeast England. A Bodyguard of Lies