Double Cross

Double Cross
افزودن به بوکمارک اشتراک گذاری 0 دیدگاه کاربران 5 (1)

Deception Techniques in War

مشارکت: عنوان و توضیح کوتاه هر کتاب را ترجمه کنید این ترجمه بعد از تایید با نام شما در سایت نمایش داده خواهد شد.
iran گزارش تخلف

فرمت کتاب

ebook

تاریخ انتشار

2017

Lexile Score

1240

Reading Level

9-12

نویسنده

Paul B. Janeczko

ناشر

Candlewick Press

شابک

9780763675714
  • اطلاعات
  • نقد و بررسی
  • دیدگاه کاربران
برای مطالعه توضیحات وارد حساب کاربری خود شوید

نقد و بررسی

School Library Journal

March 1, 2017

Gr 7 Up-One cannot always believe one's eyes or ears, especially if one is engaged in war. Janeczko opens with the story of the Trojan horse and explains that though it may have been based in mythology, it is still a solid example of a tactic referred to as a "feint." Janeczko then describes Gideon's biblical victory over the Midianites in the Old Testament. Readers who are familiar with the major operations of World War I and World War II will learn how an enormous number of military deceptions were planned and executed (e.g., the escape of thousands of Allied troops from Gallipoli while under the eyes of Turkish forces in the First World War). The author touches briefly on U.S. wars in Korea and Vietnam, where many of these techniques were considered to be outdated or somewhat dishonest. The last section describes how deceptions and GPS were successfully used against Saddam Hussein in the Gulf War. However, the work ends rather abruptly, with no real conclusion. VERDICT A top selection for those serious about military studies. Otherwise, a secondary purchase.-Eldon Younce, Anthony Public Library, KS

Copyright 2017 School Library Journal, LLC Used with permission.



Kirkus

February 1, 2017
In this companion to Top Secret (2006) and The Dark Game (2010), his books on secret codes and spying, respectively, Janeczko examines how subterfuge has been used in warfare for thousands of years.In an engaging, informative narrative, Janeczko chronicles how such deceptive techniques as concealment, camouflage, planted false information, double bluff, ruse, and more have been used to great success in battles and campaigns in the Civil War, world wars I and II, and the Korean, Vietnam, and Gulf wars. Carefully defining these terms of military art and beginning with the biblical account of Gideon, Janeczko explains how "demonstration" (false military preparations) and "feint" (distraction) were used to defeat the Midianites. A feigned retreat led to William the Conqueror's victory in the Battle of Hastings. Confederate Gen. "Stonewall" Jackson's masterful use of deceptive strategies made him one of the most successful Civil War commanders. The invasion of Normandy is the quintessential example of deception in extent and overwhelming success. Janeczko explains that, although principles of deception in warfare have changed little over time, the technology behind fooling the enemy has evolved dramatically. He also examines evolving attitudes about the use and effectiveness of duplicitous strategies. The narrative ends abruptly, with discussion of Gen. Norman Schwarzkopf's use of deception techniques in Operation Desert Storm. A fascinating chronicle of the longtime role of trickery in warfare. (maps, photos, source notes, bibliography) (Nonfiction. 10-14)

COPYRIGHT(2017) Kirkus Reviews, ALL RIGHTS RESERVED.



Booklist

February 1, 2017
Grades 9-12 In The Art of War, the ancient Chinese general Sun Tzu wrote, All warfare is based on deception the proof of which author Janeczko dramatically demonstrates in this survey of wartime deception techniques ranging from Gideon's rout of the Midianites, to the Trojan Horse, to the Gulf War. Janeczko cites a whopping dozen deception techniques employed by military strategists that include camouflage, planted false information, ruse, and more. He then shows their applications in times of war. Early on, deception was usually the brainchild of a single person, but by the time of WWI it had become institutionalized. It had also become increasingly complex, as the need for extremely close reading of the text amply shows. Not only does the book's battlefield action become more complicated, but so does the naming of the sometimes obscure fake-outs. For example, there were 14 code names for the D-Day invasion alone! For some readers, this may pose a considerable challenge. But for kids who enjoy reading about war, this is catnip.(Reprinted with permission of Booklist, copyright 2017, American Library Association.)




دیدگاه کاربران

دیدگاه خود را بنویسید
|