Operation Stonka. An Ultimate Deception Spy Game
نویسنده
چکیده
The article discusses a Cold War counterintelligence operation conducted by Polish and Soviet secret services against the Stepan Bandera Faction of the Ukrainian Nationalists Organization between 1959 and 1961. It emphasizes the methods implemented and used by communist security services, including signals intelligence, as well as the mistakes committed by the Ukrainian party. The article also briefs the measures related to code breaking employed during the operation.
منابع مشابه
Towards Deception Detection in a Language-Driven Game
There are many real-world scenarios where agents must reliably detect deceit to make decisions. When deceitful statements are made, other statements or actions may make it possible to uncover the deceit. We describe a goal reasoning agent architecture that supports deceit detection by hypothesizing about an agent’s actions, uses new observations to revise past beliefs, and recognizes the plans ...
متن کاملPhishing for Phools in the Internet of Things: Modeling One-to-Many Deception using Poisson Signaling Games
Strategic interactions ranging from politics and pharmaceuticals to e-commerce and social networks support equilibria in which agents with private information manipulate others which are vulnerable to deception. Especially in cyberspace and the Internet of things, deception is difficult to detect and trust is complicated to establish. For this reason, effective policy-making, profitable entrepr...
متن کاملSpy-Game on graphs: complexity and simple topologies
We define and study the following two-player game on a graph G. Let k ∈ N∗. A set of k guards is occupying some vertices of G while one spy is standing at some node. At each turn, first the spy may move along at most s edges, where s ∈ N∗ is his speed. Then, each guard may move along one edge. The spy and the guards may occupy the same vertices. The spy has to escape the surveillance of the gua...
متن کاملSemantic Classification of Utterances in a Language-driven Game
Artificial agents that interact with humans may find that understanding those humans' plans and goals can improve their interactions. Ideally, humans would explicitly provide information about their plans, goals, and motivations to the agent. However, if the human is unable or unwilling to provide this information then the agent will need to infer it from observed behavior. We describe a goal r...
متن کاملModeling Deception In Information Security As A Hypergame – A Primer
Hypergames are a branch of game theory used to model and analyze game theoretic conflicts between multiple players who may have misconceptions of the other players’ actions or preferences. They have been used to model military con flicts such as the Allied invasion of Normandy in 1945 [19], the fall of France in WWII [5], and the Cuban missile cri sis [7]. Unlike traditional game theory model...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Cryptologia
دوره 35 شماره
صفحات -
تاریخ انتشار 2011