The Shadow Factory, 2008. ,
Cheating and Deception, Transaction Publishers, 1991. ,
Strategic Intelligence for American National Security, 1989. ,
Executive Order 13292 ? Further Amendment to Executive Order 12958, as Amended, Classified National Security Information, The White Housewww.archives.gov/isoo/policy-documents/eo- 12958-amendment, 2003. ,
Victory and Deceit, 2001. ,
Tactical deception in air-land warfare, Journal of Electronic Defense, vol.18, issue.6, pp.37-79, 1995. ,
Unweaving the Web ? Deception and Adaptation in Future Urban Operations, 2002. ,
The Uses and Limits of Intelligence, Transaction Publishers, 1993. ,
Sensors and Transducers, 2004. ,
The use and abuse of intelligence: An intelligence provider's perspective, Diplomacy and Statecraft, pp.1-16, 2000. ,
The US Intelligence Community, 1999. ,
A hostile land foils the quest for bin Laden, 2004. ,
Two taxonomies of deception for attacks on information systems, Journal of Information Warfare, vol.3, issue.2, pp.27-39, 2004. ,
Rice to discuss antiproliferation program, 2005. ,
Using deception to hide things from hackers: Processes, principles, and techniques, Journal of Information Warfare, vol.5, issue.3, pp.26-40, 2006. ,
Designing deception operations for computer network defense, Proceedings of the DoD Cyber Crime Conference (www.jimyuill.com/research-papers/DoD-Cyber-Crime-deceptionprocess .pdf), 2005. ,