Dynamic Deception *

نویسندگان

  • Axel Anderson
  • Lones Smith
چکیده

We model dynamic deception exercises in Ponzi schemes, war, terrorism, industrial/political espionage, and insider trading. We introduce a new class of competitive continuous time games with an informed player having an unbounded action intensity, whose actions are partially observed by a rival, or sequence of rivals. We find extremely strong square-root logarithm decreasing returns to deception. We provide economic formulations and analyses of espionage, disinformation, and obfuscation. Notably, we establish a globally concave value of information (espionage). Disinformation is always substantial, and pushes confidence in the wrong state above 86%. Finally, obfuscation rises as the public grows more uncertain. This paper was begun when Axel was visiting the University of Michigan. We thank seminar participants at Texas, and especially Max Stinchcombe. Earlier less focused versions of this paper were presented at GAMES 2008, Decentralization (2008), Stoneybrook (2008), George Washington, Georgetown, Michigan, Toronto, and Western Ontario. Lones thanks the NSF for research funding.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Idempotent Method for Deception Games and Complexity Attenuation

We extend the applicability of idempotent methods to deterministic dynamic games through the min-max distributive property. This induces a very high curse-of-complexity. A representation of the space of max-plus hypo-convex functions as a min-max linear space is used to obtain a method for attenuating this complexity growth. This is applied in a game of search and deception. The problem is form...

متن کامل

Deception detection: State of the art and future prospects.

BACKGROUND Deception detection has been a longstanding concern throughout human history. It has also interested scientists, who have explored psychological and behavioral differences between liars and truth tellers, as well as ways to improve detection accuracy. METHOD In recent years, substantial advances have been made in the field. Some of these advances are briefly reviewed in the current...

متن کامل

On a Text-Processing Approach to Facilitating Autonomous Deception Detection

Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinformation executed over long time periods to achieve malicious goals. Detection of such deceptive information obtained during online interactions (emails, chat room conversations) is the first step before counter strategies can be ...

متن کامل

Deception Considered Harmful

A central problem in the theory of genetic algorithms is the characterization of problems that are difficult for GAs to optimize. Many attempts to characterize such problems focus on the notion of Deception, defined in terms of the static average fitness of competing schemas. This article examines the Static Building Block Hypothesis (SBBH), the underlying assumption used to define Deception. E...

متن کامل

A Technique for Presenting a Deceptive Dynamic Network Topology

Adversaries scan Department of Defense networks looking for vulnerabilities that allow surveillance or the embedding of destructive malware weapons. In cyberspace, adversaries either actively probe or passively observe defended computer networks in attempts to determine, among other attributes, the topology of the network. We develop a novel strategic deceptive methodology, based on principles ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009