The Orientation step of the OODA loop and Information Warfare Lachlan Brumley, Carlo Kopp and Kevin Korb Clayton School of Information Technology, Monash.

Slides:



Advertisements
Similar presentations
The Robert Gordon University School of Engineering Dr. Mohamed Amish
Advertisements

Study Objectives and Questions for Observational Comparative Effectiveness Research Prepared for: Agency for Healthcare Research and Quality (AHRQ)
Grey Box testing Tor Stålhane. What is Grey Box testing Grey Box testing is testing done with limited knowledge of the internal of the system. Grey Box.
Workbook 1: Crafting Your Value Proposition Workbook Template
SEM II : Marketing Research
The Normalization of Deviance at NASA. Background January 28, 1986 Shuttle engineers were worried about launching at the predicted temperature of 31 degrees.
D-Day June 6 th, What was the situation in 1944? The Russians have defeated the Germans and are advancing in the East The Russians have defeated.
1. Review- What is Science Explain- What kinds of understandings does science contribute about the natural world Form an Opinion- Do you think that scientists.
The Ladder of Inference:
Where in the World Are We? From the Voluntary Sector Round Table.
The Role of Business Research Theory Building
Hypothesis Testing: One Sample Mean or Proportion
Lecture 2: Thu, Jan 16 Hypothesis Testing – Introduction (Ch 11)
Evaluating Hypotheses Chapter 9 Homework: 1-9. Descriptive vs. Inferential Statistics n Descriptive l quantitative descriptions of characteristics ~
Shuttle Challenger Disaster Design Implications Homework 2 Steven Callahan Design Implications Homework 2 Steven Callahan.
Business Statistics: A Decision-Making Approach, 6e © 2005 Prentice-Hall, Inc. Chap 8-1 Business Statistics: A Decision-Making Approach 6 th Edition Chapter.
Dunkirk: A Success or Failure?
C4ISR and Information Warfare
ELEMENT 8 Judgement and Decision Making Defining Judgement Defining Decision Making Decision Making Methods.
CHALLENGES AND OPPORTUNITIES FOR CRITICAL ANALYSIS IN ASSESSMENT.
Confidence Intervals and Hypothesis Testing - II
Business Statistics: A Decision-Making Approach, 6e © 2005 Prentice-Hall, Inc. Chap th Lesson Introduction to Hypothesis Testing.
Copyright © 2005 Brooks/Cole, a division of Thomson Learning, Inc Chapter 24 Statistical Inference: Conclusion.
D-Day Mr. Goddard | PLUSH | May 2009.
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
August 2006 © 2006 Kettle Creek Corporation 1 The OODA “Loop” Sketch Note how orientation shapes observation, shapes decision, shapes action, and in turn.
1 [Click (left) mouse button to advance] The OODA “Loop” Sketch Note how orientation shapes observation, shapes decision, shapes action, and in turn is.
PHARMACOVIGILANCE AND CLINICAL TRIALS DIVISION 20 August 2015 Victoria Falls Protecting Your Right to Quality Medicines and Medical Devices.
Requirements Engineering Requirements Elicitation Requirements Analysis Requirements Validation Requirements Management.
The War for Europe and North Africa. US and Britain decide on a “Germany First” policy.
SEM II : Marketing Research
National Law Enforcement and Corrections Technology Center - West Combating Terrorism: Intelligence Preparation for Operations Matt Begert
LEVEL 3 I can identify differences and similarities or changes in different scientific ideas. I can suggest solutions to problems and build models to.
Fundamentalism and Extremism. Fundamentalism is a movement within a religion that focuses on the fundamental (basic) beliefs and writings of that religion.
Educational Objectives
Bloom’s Taxonomy Benjamin S. Bloom February 21, September 13, 1999.
EVALUATION OF HRD PROGRAMS Jayendra Rimal. The Purpose of HRD Evaluation HRD Evaluation – the systematic collection of descriptive and judgmental information.
CHAPTER 12 Descriptive, Program Evaluation, and Advanced Methods.
C4ISR and Information Warfare Naval Weapons Systems.
World War II.
D-Day 6 th June Aims of the lesson By the end of this lesson you will Understand why the Allies launched a second front in June 1944 Describe the.
International Conference on cybernetics and intelligent system, p.p , Sept Modeling Large-Scale Manpower Dynamics: An Expert Systems Approach.
Introduction to Scientific Research. Science Vs. Belief Belief is knowing something without needing evidence. Eg. The Jewish, Islamic and Christian belief.
CANADIAN COAST GUARD AUXILIARY - PACIFIC PROBLEM SOLVING CANADIAN COAST GUARD AUXILIARY - PACIFIC 2008.
Software Engineering Lecture # 1.
Chapter 8 Testing. Principles of Object-Oriented Testing Å Object-oriented systems are built out of two or more interrelated objects Å Determining the.
School of Clinical Medicine School of Clinical Medicine UNIVERSITY OF CAMBRIDGE Feedback Jonathan Silverman Aarhus 2012.
The furthest extent of Hitler’s empire in 1942
The Nature of Science. Observing You have two beakers, each containing a clear liquid and an ice cube. What do you observe?
Copyright © 2011 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 1 Research: An Overview.
Scientific Inquiry. The Scientific Process Scientific Process = Scientific Inquiry.
1 Source Internet (Where else?) – Defense and the National Interest (a vetted source) For MANY additional aspects.
Perceiving the Self and Others
Crafting Your Offer & Market Value Proposition By Ed Downes.
PRA: Validation versus Participation in Risk Analysis PRA as a Risk Informed Decision Making Tool Richard T. Banke– SAIC
Chapter 9 Warranted Inferences. Chapter 9 Warranted Inferences.
D-Day June 6, 1944.
THE BUSINESS ANALYSIS PROCESS MODEL
Lecture 05 Compound Information Conflict Strategies
The MDMP Process MDMP Inputs MDMP Outputs Step 1 MDMP Inputs Step 5
D-Day June 6, 1944.
The Nature of Science.
Operation Barbarossa & The Invasion of the Soviet Union
Operation Overlord June 6, 1944 D-Day.
Chapter 12 Persuasive Speaking
How to do an INVESTIGATION
Collection of Command and Control Exercise Data
Lecture 06 Hypergames vs Information Conflict Strategies
How do you think they helped to win the war?
Presentation transcript:

The Orientation step of the OODA loop and Information Warfare Lachlan Brumley, Carlo Kopp and Kevin Korb Clayton School of Information Technology, Monash University, Australia

Overview ● Boyd's OODA loop model ● Expanded model of the Orientation step ● Information Warfare and Orientation ● Case studies of Deception and Self- deception

Boyd’s OODA loop model ● Name originates from the loop’s steps ○ Observation ○ Orientation ○ Decision ○ Action ● Describes the decision-making process of an individual or organisation ● Models a feedback loop between the decision-maker and their environment

World Perceived Model of the world Gathered Information Orientation Decision Observation Actions Performed Actions Boyd's OODA loop model

Orientation step Contains a method that combines ● New information ● Previous experience ● Cultural traditions ● Genetic heritage ● Analysis and synthesis methods to produce an updated model of the world.

Orientation step However there is no description of how this process operates We now describe a model of the internal processes of the Orientation step

Proposed Orientation Step Actions ● Recognise known objects, events and relationships ● Analyse new information with known processing methods ● Evaluate the completion of aims and develop new aims ● Determine what actions may be performed how they will affect the world

OODA loop with expanded Orientation step ● Observation ● Orientation ○ Identification ○ Interpretation ○ Aims Derivation ○ Options Generation ● Decision ● Action

Gathered Information Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Expanded Orientation step

Gathered Information Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Expanded Orientation step

Gathered Information Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Expanded Orientation step

Gathered Information Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Expanded Orientation step

Gathered Information Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Expanded Orientation step

Gathered Information Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Expanded Orientation step

Gathered Information Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Expanded Orientation step

IW attacks that affect Orientation Deception ● Deception attacks provide false information that is accepted as true, before being used as input to decision-making Self-deception ● Self-deception occurs when an individual believes something to be true, despite evidence that disproves it

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Deception Attack

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Deception Attack

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Deception Attack

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Deception Attack

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Deception Attack

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Deception Attack

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Deception Attack

Self-deception ● The word Self-deception suggests that it is a reflexive deception ● Self-deception is defined as an intentional misinterpretation in order to support a desired but unsupportable belief (Szabados 1974)

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Self-deception

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Self-deception

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Self-deception

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Self-deception

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Self-deception

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Self-deception

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Self-deception

Examples ● Demonstrate where deception and self- deception cause errors in the Orientation step of the OODA loop ● Deception – Operation Fortitude ● Self-deception – Challenger Disaster

Operation Fortitude ● Deception plan for the D-Day landings during World War II ● Deceived the Germans as to the target of the invasion and the time of the invasion

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Operation Fortitude German Intelligence agencies correctly perceive information from various sources (Radio intercepts, aerial photo- reconnaissance, spies).

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Operation Fortitude German Intelligence agencies incorrectly identify the corrupt signals as those of a real army, that intends to invade at Calais.

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Operation Fortitude German Intelligence agencies Interpret that the main target of the Allied invasion will be Calais.

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Operation Fortitude Germany updates its Aims to include defending Calais from the expected Allied invasion.

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Operation Fortitude Germany determines it has the option to reinforce the defenses at Calais, which it believes will defeat the invasion.

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Operation Fortitude Germany decides it will to move its troops to reinforce Calais, to defeat the expected Allied invasion.

Gathered Information (Corrupt) Performed Actions Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Operation Fortitude Germany reinforces Calais, in expectation of an Allied invasion.

Challenger Disaster ● The space shuttle Challenger disintegrated shortly after takeoff due to an O-ring failure, caused by the low temperature at the time of the launch ● The self-deception in this disaster was performed by Morton Thiokol management ● They were warned that the O-rings were damaged more during low temperature launches, however they misinterpreted the damage as proof of a safety factor

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Challenger Disaster Managers correctly perceive warnings from engineers about O-rings.

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Challenger Disaster Morton Thiokol’s managers correctly Identify the damage to the O-rings.

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Challenger Disaster Morton Thiokol’s managers intentionally misinterpret damage to the O-rings as proof of their safety. This is self- deception.

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Challenger Disaster Morton Thiokol’s managers Aim to approve the launch if it is safe. Since they misinterpreted the warnings about the O-rings, they believe it is safe.

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Challenger Disaster Morton Thiokol’s managers determine that their available Options are to approve or forbid the launch. They expect the outcomes to be a successful launch or an unhappy customer.

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Challenger Disaster Morton Thiokol’s managers now Decide to approve the launch of the shuttle.

Performed Actions Gathered Information Identification Interpretation Aims Derivation Options Generation Orientation Decision Action Observation Perceived model of the world Challenger Disaster Morton Thiokol’s managers give NASA approval to launch Challenger.

Conclusion ● Orientation step details the updating of the decision-maker's model of the world and as such is a target for IW attacks ● Described a model of the internal processes of the Orientation step ● Difference between Deception and Self- deception

Questions?