Abstract
The paper examines deceptions employed during the Cold War with the purpose of exploring their underlying conceptions, mechanisms, and applications. It focuses on the interactions between the deceiver and the deceived, analyzing both sides’ perspectives. The examination centers on declassified guides, recently published as The Official C.I.A. Manual of Trickery and Deception, which contain detailed instructions concerning how spies should carry out their activities of deception. Three kinds of procedures were selected for analysis: behavior in public for men and women, group infiltration, and the use of secret recognition signals. To provide a practical visualization, the 2012 movie Argo, based on a real-life operation using the same principles, is complementarily analyzed. Merleau-Ponty’s approach to perception and sensation is considered along with Husserl’s concepts of sedimentation and lifeworld, while narrative semiotics and its framework guide the treatment of textuality and the approach to persuasion. The article conceives of sedimentation and contemplation of the lifeworld as mandatory components of a kind of deception that is primarily acted, reflecting upon how the spies’ interference affects the environment. The results indicate a common structure for deceptions that builds on what Greimas calls a “fiduciary contract.”
1 Introduction
Although all kinds of deception involve a make-believe situation, they tend to display many particularities, which at times may lead one to wonder about what constitutes a deception. With the purpose of exploring this configuration and possible variations, we might start by questioning: why and how does one come to be fooled? Here, “why” does not mean the mere existence of a deceiving determination of the deceiver, but rather the gap between the deceiver’s purpose and the reason why the victim ends up being deceived. The victim has to believe in order to be deceived, and confirm that there is no deception at play. In most cases, the victim will eventually realize that deception was involved. In some other cases, the victim might never realize it at all. If those two kinds of deception are examined together, the first one is deemed to be discovered after being employed, but not the second one. A truly successful deceit is one that is noticed neither during nor after the act. In that manner it becomes a sort of anti-action, an interaction where only one of the subjects is aware of what really took place. Still, in both cases the deceiver operates by directing the target’s judgement about a specific state of affairs.
When a failed deception is contemplated, such as those where swindlers deceive others for money, the frame for manipulation, according to narrative semiotics, becomes evident: an object of value is offered, the target is enticed, and the exchanged object is not real in the end. It usually involves the transmission of a fake object to the target through a bargain, and this means that this kind of deception is meant to be discovered sooner or later by the victim. The schemes of manipulation and veridicality (Greimas and Courtés 1993 [1979]) are very useful to understand this kind of occurrence because there is an evident shift in the victim’s line of action; it is displaced from its ordinary course to the one proposed by the deceiver.
However, the other kind of manipulation which is addressed here works differently since it does not involve a direct fooling, but a more silent one; a lateral action or faire à côté, with the capability of never being discovered. This would primarily be the case of a disguise or camouflage (Fabbri 2012), which consists in a manipulation but does not fall into the traditional narrative semiotic frame. This is because the expected action, or response of the target, is null. Contrarily to the case mentioned in the last paragraph, here there is no intention of changing the victim’s line of thought and action. Still, this is a modality whose purpose is to make-believe, even if the offered object of belief is the negation of a particular implication: that a trickster is indeed a trickster. The purpose of such an action is to not be noticed, which means: if a disguise is recognized as one, from this point on it becomes a guise; a successful disguise will never be acknowledged. In order to accomplish such a deception, deceivers must not state explicitly what they are not, but instead provide an alternative association that consists in the fabricated lie. Even so, the disguise is not a simple dormant secret, as per the modalities of veridicality, since it may direct the whole course of actions around subjects and objects. For this reason, it requires a detailed investigation.
Since an object overtly addressing deceptions would be ideal for examining them, The Official C.I.A. manual of trickery and deception (Melton and Wallace 2009) was selected as the main material for the following analysis. The main content presented in the book is part of a guide written in the 1950s by John Mulholland, a then well-known stage magician, on behalf of the U.S. Central Intelligence Agency. It consists in the adaptation of illusions and principles from magic tricks to real situations involving espionage during the Cold War, and it was supposed to be used as learning material by the CIA’s field agents. The totality of this material remains confidential until today, but two of its sections were declassified in 1977 – entitled “Some operational applications of the art of deception” and “Recognition signals” – and were later published as chapters in the book by Melton and Wallace. The practical instructions presented by the guides, often accompanied by figures describing the details, are particularly pertinent to the purpose of the present analysis. In order to provide a better visualization of the process of deception, the movie Argo (2012) will also be examined. The movie depicts a homonymous actual operation, mentioned by Melton and Wallace as well, which employed deception according to the principles taught by the manual.
Throughout Mulholland’s guides, the modus operandi of the deception is described as not deceiving the eye, but the mind (Melton and Wallace 2009: 32);[1] not somatic but cognitive. The deception is cognitive precisely because the trickster removes the deception’s traces from sight by masking them, as stated further on:
… The basic principle in performing a trick is to do it so that the secret actions are not observed. As Alphonse Bertillon said, “One can only see what one observes, and one observes only things which are already in the mind.” A trick does not fool the eye but fools the brain. In order to do that, it must be performed so that the secret parts are not noticed. (Mulholland 2009: 66)
Nevertheless, the perception of the subjects involved is present even when there is nothing to see or witness. Mulholland indicates that the target engages with the cognitive domain, which can be interpreted in this context as perception in the sense of perceiving thought (Merleau-Ponty 1945: 42, 47). Here, “observing” refers to the initial bodily perception as opposed to the act of “seeing.” Coquet distinguishes between these types of perception, arguing that seeing implies a judging subject and is secondary to feeling. Feeling, in contrast, originates directly from our bodily perceptions and does not require a judging subject (Coquet 2006: 16).
Furthermore, just as a visual element is visually masked according to the environment for each deception, the secret in itself is placed within what is already in the witnesses’ minds. As the manual deepens into this perception and how it is handled, it expresses that: “There are several points which should be known about the things spectators will notice and those things they will not notice and about some of the spectators’ thinking processes which can be depended upon” (Mulholland 2009: 69). Hence it is not enough to disguise the somatically perceivable part of the trick; in addition to that the trickster must ponder what the witness is thinking and how, and in which way the trickster might take advantage of that. The “things they will not notice … which can be depended upon” are understood here in terms of sedimented experience (Husserl 1970: Appendix 6). In a more specific example, someone looking for oddities in a crowd has an original inquiry, which is to find a foreign spy. But spies are aware of that and try to cover any trace connecting them to elements that allow this correlation, through the overlaying of common elements from the social environment they are working in. When employing this method, the observer is confronted primarily with typical elements of the environment, yet anomalies may arise due to updates that diverge from the observer’s original inquiry. This divergence places the spy in a position further removed from the original inquiry. The strategy of removing the deception from sight, or rather from the field of perception as a whole, has its roots in the somatic configuration of elements, even though this process might be developed with reasonable freedom from these same elements.
Basically, the magician premises that only what is already in the mind is susceptible of sedimentation, implying the importance of not only comprehending the target’s perception but also of placing oneself in the same world of experiences given through perception, or lifeworld (Husserl 1970: 48–53). The pre-construed world of experiences, with its history of updates over time and, consequently, of sedimentations, is the opposite of the world of idealities in what concerns a spy, in this case.
There are other possibilities to examine the concept of lifeworld as already explored in semiotics, such as the notion of Umwelt (Fontanille 2019; Uexküll 2010) as well as subjectal semiotics (Coquet 2007). The same can be said about the key elements of the concept of sedimentation, which have been explored in the semiotics of transmission (Rastier 2013) and in Eco’s concept of encyclopedia (1997). Some elements from these theories are addressed here in regard to the study’s purpose, although we focus on the Husserlian perspective due to how those main concepts are connected.
Intention – understood here in the everyday sense of purpose, or intention to act – is one last important element that must be considered for the trick, according to the manual:
Sellers of goldbricks (also confidence men and others of like ilk) rely in the main on the cupidity of their dupes. The only person who can be sold a goldbrick must have such avarice that he ignores the obvious fact that the “bargain” he is offered must be untrue or illegal. The chief skill of the seller is in discovering properly greedy victims. (Mulholland 2009: 66)
More precisely, the trickster attributes intentions to others, which plays a role in how they conceal their own intention. Based on the observation of how someone interacts with the surroundings, conmen are able to attribute intentions to them and thus select a suitable victim. Contrarily to conmen, the trickster spy will rather stay away from people whose intention is anything different from carrying on their daily lives. The trickster provides support to their targets for the idea that nothing out of the ordinary is happening.
The following analysis will adopt aspects of Husserl’s (sedimentation and lifeworld / Lebenswelt) and Merleau-Ponty’s thought (sensation, perception, and association). These aspects are essential for analyzing both the initial conception and the execution of a deception. Perception and sensation are crucial in the execution of a deception, while sedimentation and lifeworld mainly influence its conception. Following Mulholland’s indications, the analysis will emphasize the cognitive dimension.
I adopt the plural form lifeworlds to stress the diversity of social contexts and subdivisions that shape everyday experiences within a broader framework, and to explore how these “lifeworlds” intersect and influence one another. While they are still part of a single, overall lifeworld, they have particularities of their own that must be addressed in order to understand the process of deception.
Due to the narrative process involved in the application of the tricks, the dimension of persuasion, and the textuality of the object examined, the framework of narrative semiotics was chosen to lay the groundwork for the analysis. However, since the deceptions examined here cannot be fully understood through an exclusively narrative semiotic approach, those concepts from narrative semiotics which serve the purpose of the study will be considered along with the phenomenological concepts indicated above.
The following section is divided into four subsections. Subsection 2.1 addresses the CIA manual’s guidelines indicating how women and men should respectively behave in order to avoid suspicion. Subsection 2.2 examines instructions for the infiltration of groups, and 2.3 analyzes the use of secret recognition signals. Subsection 2.4 addresses the management of lifeworlds as required from the spy. This subsection also contains an analysis of the concrete deception employed in the CIA/Canadian operation “Argo,” which involved a particularly dangerous environment and required a complex deception. The concluding section (3) establishes a common structure of deceptions based on the analysis in Section 2. In this section, I will also discuss how a deception can become part of the environment despite being undetected, and demonstrate how deceptive structures can be expanded to other practices that are not formally considered deceptions.
2 Analysis
In the following analysis, the selection of instructions for deception from the CIA manual focuses on those supposed to be openly performed and therefore depending on different kinds of situational assessments to be accomplished. The examination also turns to the assessment of their underlying conception, when this is provided by the manuals.
I will employ various terms referring to the parties of “deceiver” and “deceived,” such as spy and trickster versus target, victim, observer, and witness. With a few exceptions, these terms are interchangeable in each of the two categories. Some deceptions demand more than one spy; in these cases, one spy may be responsible for performing the precise act of deceiving while another becomes an assistant. On the other side, a target or victim is a person primarily related to the mission of the deceiver. An observer or witness is any other person present during the deception whose presence demands precautions from the deceiver lest they be spotted. A spy will want to deceive all witnesses as well.
2.1 Gender dynamics and behaviors
There are several elements to be considered when a determined conduct is to be adopted in a given situation involving espionage. This conduct is ruled by factors such as the nature of the place – encompassing a larger sphere such as the country, and smaller ones such as the kind of activity expected to be performed there – the degree of formality, the frequenters, and others. In the manual, a prominent factor is the gender of the performers, and it should be noted that it takes into account societies in the 1950s, when certain actions were only expected from men and other actions were expected from women. These actions are, of course, circumscribed by “invisible rules,” which might very easily be broken on several occasions in the case of ordinary people, although not in the case of the spies because deviating from normality would attract attention, according to the guides. Attracting attention might be considered for that matter an anti-value object. There is a chapter dedicated to what should be only considered by women, with some parts hinting at the recommended behavior for men. There is no section exclusively dedicated to men. The chapter in question states the following overall guidelines for each group:
… trickery basically depends upon a manner of thinking and that such thinking must not violate the manners or custom of the spectator. For a woman to do some action a woman normally would not do would violate manners and customs at least by being unusual, and the unusual will attract attention which the trickster should avoid. It is not enough for the woman trickster never to perform an action which would appear unfeminine to a man; she also must never do anything which would seem unusual to another woman. In other words, a woman trickster, to be successful, always must act in the manner of a woman and never do anything in the man’s way. Of course this should not be interpreted as suggesting being girly-girly, but merely not being masculine in actions or manners.
… Earlier in this manual there were instructions for men to follow in order to appear to be stupid. A form of this technique very valuable for the woman’s pose is that she just does not understand the subject. She tries to look blank rather than dumb. This is not at all difficult when working in front of a man or men. The reason for this is (and ladies, we might as well face it) that men are never astonished when a woman does not know something. There is a major exception in this regard, for men expect their wives to know all manner of subjects. (Mulholland 2009: 120)
What is stated here is merely that the general content is ambivalent among the genders, although there are exceptions concerning women in particular which consequently highlight the content intended for men only. These are not detailed orientations but rather wide ones, orientations to be considered before deciding to engage in a given action. Still, they portray quite practical situations, allowing the learner to pre-visualize their unfolding and possibly to rehearse.
The situation presented assumes different kinds of interaction, dealing with how to maintain the disguise through a pattern of behavior, which is therefore wider than a visual disguise. The behavioral pattern is not detailed but summed up as avoiding the men’s way. The same route of avoidance is suggested for men, since stupidity will easily be utilized to stay away from interactions. The variations suggest that the majority of judgements – especially from men, we might add – would consider that a woman does not need to appear stupid because she cannot comprehend despite her efforts, in the first place. A stupid man, on the other hand, is not trying to figure anything out. A man will promote a woman to a “wiser” stereotype when she becomes his wife. These patterns of behavior may be understood as an “isotopy” according to Greimas (1966, 1970,[2] a reiteration of semantic categories that standardize a text’s reading, just as any other behavioral pattern. For the witnesses, this pattern is expected because it fits the ordinary course of events. This means that unusual behavior will draw attention and prompt further inspection, both from ordinary people and from law enforcement. The continuity of usual behavior means that observers do not need to alter their own actions, thus distinguishing an isotopy related to the search for a spy from an isotopy related to discovering one; whereas the former focuses on identifying behavioral anomalies, the latter recognizes that such anomalies are likely to be concealed by a trained trickster. For the deceiver, the flow of continuity represents the weaving of a web where each thread aims to remove suspicions (discontinuity).
The realization of an odd element within the patterns of ordinary life is directly associated with what Merleau-Ponty writes in connection with sensation: “It is sometimes the adherence of the perceived object to its context, and, as it were, its viscosity, sometimes the presence in it of a positive indeterminate which prevents the spatial, temporal and numerical wholes from becoming articulated into manageable, distinct and identifiable terms” (1996: 12).[3] An out-of-place object that encounters the emptiness of its surroundings may become undefinable, plunging sensation into an abyss. This undefined sensation, arousing attention, might remain on the focused object or not.
The link between the perceived object and its context may be understood as continuity, or as something within the object that supports such continuity. The latter is more suitable from the perspective of the spies, as they interfere with the objects displayed, and the former facilitates an understanding based on a position of the object in the background of perception, since the objects mingle with their environment. Further on, Merleau-Ponty states the following on association:[4]
It is at this stage that the real problem of memory in perception arises …. We want to know how … at every moment, [the conscience’s] former experience is present to it in the form of a horizon which it can reopen – ‘if it chooses to take that horizon as a theme of knowledge’ – in an act of recollection, but which it can equally leave on the fringe of experience, and which then immediately provides the perceived with a present atmosphere and significance… To perceive is not to remember. The relationships “figure” and “background,” “thing” and “not-thing,” and the horizon of the past appear, then, to be structures of consciousness irreducible to the qualities which appear in them. (Merleau-Ponty 1996: 22)[5]
This establishes a link between what is perceived and memories. About the same subject, Husserl proposes the following:
Every perceived reality (real thing) can perhaps not be, and thereby in principle each and every thing posited in perception and also in memory might not be. Hence it is possible for there to be nothing real. But every perception is a rational positing of something (which possibly is not), a foundational positing, and that also holds for things revoked through conflict. Every perceptual apprehension is motivated, and in this motivation it has its right to proclaim, as it were, Being. Admittedly, however, this rational positing within perception is not an absolute positing; it is like a force that can be overwhelmed by strong counterforces. Experience is the force which guarantees the existence of the world, and it is a force which constantly draws new force from itself and continuously integrates this new force into itself. Every perception, already while it endures, integrates its force, and in the perceptual nexus every perception is augmented by every other one, corresponding to all the series of fulfillments which interweave into a manifold braid, unitarily and harmoniously, the various sides and rays of the perceptions. (Husserl 1997: 251)
From Merleau-Ponty’s perspective, memory plays a significant role in perception. Memory can be put aside when considering new phenomena that do not match it, or in the extreme opposite case, it can be forced upon perception. Moreover, memory and perception are reversible between each other (1997: 23), which impacts the aftermath of a trick. Memory and the perceived object are comparable to pieces of a puzzle that might fit together or not. In other words, memory is an entirely different picture that might be compared to what the present scene offers. A comparable reasoning directed to the assignment of meaning, and not only memory, to the environment and each of its elements is presented by Uexküll (2010: 150–157). Husserl, on the other hand, considers perception as a never-ending process. Perception is an element in the construction of everything around and within the observer, including memory, and its existence is based on experience. Husserl’s depiction goes beyond witnessing in itself, which might concern a single event in comparison to the whole day, or even to someone’s life. The observed event is not necessarily the emphasized element.
Both perspectives can portray the event of someone witnessing a spy’s behavior. For Merleau-Ponty, a perception of something starts the chain of events leading to its comprehension. For Husserl, a given experience leads to a series of processes which will result in a certain perception, in a process of synthesis. Neither author states that the final product is real, though. Hence, from this point on, assumption becomes relevant, and the subject must decide if what is being witnessed is worth further investigation or not, consequently determining its reality. Both perspectives can also describe the deceiver’s performance, because the performance will ultimately affect this final product as well, although the process to achieve it, if successful, will be accomplished by the victim: Aware that perception is constructed, the deceiver provides its building blocks, which are made of what presumably already has a place in the victim’s memory, since these components are shared by all in that context (the differentiation between what is common and what is not). The spy makes use of the edges between being and appearing, and reality and truth, which are not stable and may even intersect (Coquet 1989: 155, 177).
Although the code employed in a deception is quite simple in itself and could be solved through inference, permuting and transposing the correct elements (Eco 1997: 275–276), no information is provided about where, when, or with whom the enigma is situated. The only clue is that a random person carries it; the game is not fair without additional information.
In the usual process of assessment, the closer the object is to what the observers already know (remember, or perceive) as ordinary, the harder it will be for them to suspect anything is wrong, since it has become familiar through sedimentation. If, in a glance, the eye naturally seeks for what is odd or different, one may argue that the mind operates similarly in a mental image, trying to match experience with memory and hunting for whatever falls out of that range. When the spies forcefully remain within “normality,” avoiding the men’s way in the case of women, and looking stupid in the case of men, they are simulating their own piece of the environment-puzzle as a fitting one, for the observer. Another way to address this comes from relevance theory (Sperber and Wilson 1996: 118–171), where a dissonant behavior would gain more relevance in a given situation than an ordinary one and potentially call forth the larger context of the Cold War; a perfectly fitting behavior, on the other hand, has less relevance since it becomes a component of the general scene. The behavior that fits the lifeworld of the scene is irrelevant and nevertheless effective, demonstrating the silent work of irrelevance (Strassheim 2018: 15). The deception addressed here delineates relevance and irrelevance for the spy and observers. The disguise consists in the combination of relevant elements for the spy with irrelevant elements for the observers. The sedimentation present in each pattern for the genders becomes a tool for the spy. Therefore, the deceiver works on the borders between what he or she pretends to do and what they are doing in reality. The disguise shapes the puzzle piece to facilitate and encourage its alignment with the victim’s sedimentation, but the final alignment is done by the victim. Inherently, deceiving involves the assessment of what might be sedimented within the victim’s knowledge of behaviors and environments.
Further on the manual provides more specific guidelines for women, aligned with the general orientations presented before, which concern what must be altered in each kind of performance. Such alterations concern gestures, and the nature of objects carried by women, which must never be masculine. Merleau-Ponty also emphasizes the significance of gestures, suggesting that a gesture can embody what it represents, and that one’s intention can be transferred to someone else through gestures. Merleau-Ponty’s wider approach considers the spoken word as a gesture (1945: 214, 215). In contrast, Greimas focuses on the structure and symbolic function of words, viewing them as gestures in a different sense. Gestures are understood here as bodily movements capable of conveying meaning, as suggested by the manuals.
Returning to the particular orientations for men on how to look stupid, the manual states the following:
The fact is that physically, at the moment of doing any action requiring concentrated thought, there is an alertness of appearance which is very noticeable.
A sudden alertness on the part of the performer causes wariness on the part of the spectator. The opposite of an alert appearance is a stupid one. Assuming a mildly stupid appearance during a trick will give the appearance of disinterest. Naturally this should be done to a mild degree, for suddenly having an imbecilic expression also is warranted to attract attention. Stupidity in appearance is affected by relaxing the facial muscles and throwing the eyes out of focus. (Mulholland 2009: 82)
Intrinsic effects of a given action, such as an alertness reflected by facial muscles, must be worked on by the spies. Although the author calls this final appearance stupidity, the lack of effort projected on the facial muscles might be understood as relaxation in accordance with the usual, although functional actions that the character impersonated by the spy would be performing. Mulholland considers an observer interpreting the face like someone watching a locomotive, where the other parts of the body are the wagons; the wagons must operate according to the locomotive. When the subject decreases their facial muscles’ tension, they are imprinting minimum effort on the train while operating normally. This is an active effort masked as inaction through intentional relaxation.
Therefore, although the men’s and women’s guidelines differ in their details, they follow the same pattern which might be understood in terms of sedimentation. Just as a woman is not exerting herself when she follows regular “feminine” configurations – or when she does not pursue any non-feminine behavior – a man is not doing anything suspicious when his face demonstrates no effort. Both these behaviors are taken for granted by the observer, who merges subject and scenery into an indecomposable meaning (Merleau-Ponty 1990 [1942]: 184–185) and allows sedimentation to become raw matter for the trick.
The gender-oriented guidelines summarize what a performed lie, or a “lie acted” (Mulholland 2009: 68), means. Such behavior is quite different from acting naturally, since the precise actions that are executed intend to mislead. While the manual tends to instruct tricksters to avoid verbal interaction, the behavior of the trickster resembles the performance of an actor, a similarity indicated by Mulholland a few times through the use of “actor” as a synonym for “trickster”; and it also agrees with the semiotic definition of an actor (Greimas and Courtés 1993 [1979]: 7–8). Furthermore, if one considers a regular situation comparable to those discussed above, a minor imperfection absolutely to be avoided by the trickster is likely to occur with ordinary people. That is to say, there is a slight difference between natural and conditioned behavior. Such natural flaws will likely be remembered, although for a very short time. It is hard to picture a woman, for instance, in that period or before, who would constantly act according to the entire set of spoken and unspoken rules expected from women. In contrast to actual ordinary behavior, the trickster is trying to give the impression of an uninteresting individual rather than just an ordinary one.
The act involves a process of subject construction. Although the constructed subject is likely attained prior to the act, there is a continuing meta-goal of appearing as a non-subject (Coquet 1989: 65–66), mostly through gestures aimed to be irrelevant. The goal is to be a constructed non-subject, a deliberate no one. This, in turn, is a means to an end: to execute the spy’s task at hand. Hence, during the act, the trickster is both a spy and an extremely average citizen who is commuting, having dinner or whatever suits best the scene of the trick, which makes the trickster at least partially a meta-subject able to operate a transformation (Coquet 1989: 106). The ultimate judge of the constructed neutral subject is naturally the target or witness.
2.2 Group infiltration and behavioral tactics
The cases presented by the instructions to be analyzed now involve what can be understood as more direct confrontations, a closer interaction between the spies and their targets. When the objective is to become a member of a group, the spy cannot avoid receiving attention from that group, which demands a strategy to deal with this fact. In a situation where an assistant is present, the assistant is free to become the focus of the group, and the trickster pretends only to accompany the assistant without further interest. The assistant can become a beacon, allowing the spy to perform the job. An assistant can do this in several different ways, including by simulating anger. Mulholland states that this method is very effective when it can be used (2009: 135–136).
When there is no assistant, the spies themselves must become the focus of attention. This is to be done in a way that keeps them away from the possibility of being discovered. The following, real-life example concerns a case where the spy resorts to sleight of hand to prepare the trick.
For example, undercover officers often face difficulties infiltrating suspicious groups who are wary when approached by strangers. One solution was a simple trick, the “magic beer coaster,” to attract attention and have the target “come to him.” A folded U.S. fifty dollar bill was inserted into a Heineken beer coaster that had been sliced apart with a razor, then reglued and placed in a book press to flatten as it dried. The officer appeared several nights at the bar and drank alone while slowly tearing apart a stack of Heineken coasters. When the bartender eventually asked why he was doing this, the officer responded, “Heineken places fifty-dollar bills as a little-known promotion in unmarked beer coasters.” An hour later, the officer employed sleight of hand to introduce a gimmicked coaster into the stack in front of him. When he later tore apart the prepared coaster and “discovered” the fifty-dollar bill, he celebrated loudly and offered to buy a round of drinks. The onlookers came to him! Though the fifty-dollar coaster attracted attention, the full effectiveness of the illusion was dependent on the officer’s stage performance and his sleight of hand. (Melton and Wallace 2009: 33–34)[6]
In cases like this, the spies do the very opposite of what was discussed in the previous subsection: they attract all attention to themselves. Intentions signal the presence of volition – which negates a non-subject – so there is no concern here with emulating a non-subject. The agent serves as a beacon, providing security for the concealed action that may also be performed by an assistant. Precisely by becoming known through an explicit appeal, the trickster ceases to be suspected. According to Sperber and Wilson, the relevance of an interpretation compared to others comes from the smaller processing effort that it requires (1996: 166); in this sense, it is “easier” not to mistrust the addresser if there is no reason for it. Every action is nevertheless oriented towards the spies’ goal of infiltration and selected according to each specific situation; only the disguise’s appearance becomes known. Considering both wills displayed in this kind of spying action, the action operates as a whole through the dichotomies between a will to do (vouloir-faire) and its contradiction (Greimas and Courtés 1993 [1979]: 30, 421–422), as per Figure 1.[7]

Juxtaposition of volitions.
The will to carry out the espionage is not only encapsulated by the lack of will implicit in the disguise, but even embodied by it: By expressing great interest in seeing a factory, a spy might gain access to it for the purposes of espionage instead of merely curious observation. In cases like this the consequential spying act is in itself translated, since seeing a factory might be indistinguishable from spying on it, constituting optimal circumstances for the trickster because there is practically no need to mask the intention.
This also means that the addressee will build a belief (croire) concerning the trickster’s fake identity and therefore stop acquiring more knowledge (savoir) about them. As soon as the addressee becomes aware of the fake identity, however, they will start to build knowledge. If the addressee becomes aware of the trickster’s real intentions, a different kind of knowledge will be formed. From each kind of knowledge, a different kind of belief results in each case, a belief that the person in disguise is a spy, or a belief that they are something else: the end of belief means the start of knowledge and vice-versa (Bastide 1982: 8–11). The establishment of a belief in the disguise sets the cognitive stage for deception, enhancing the likelihood that it will go unnoticed throughout the procedure, and increasing its chances of success.
The explicit appeals present in each operation are connected in a chain and establish a new continuity within the environment. Taking the beer coaster trick as an example, it is possible to observe each link of this chain from the perspectives of (real or attributed) intentions and attention/sensation, considering the utterances involving the trickster and the target. According to the first perspective:
overt intention of the deceiver: to be welcomed by a group of people;
as part of the intention: the will to become a beacon (by causing a mess or trying to find money), not by announcing it, but rather by being noticed;
these actions cause a rupture in the lifeworld of the bar;
this rupture ends up being euphoric or dysphoric within the respective lifeworld, but never neutral as it is embraced by the witnesses;
if successful, the deceiver is welcomed or allowed to act.
This particular intention is of course merely a decoy for the deceiving intention, which is hidden. On the other side:
intention of the deceived: to carry on their activities, while possibly being aware of their environment;
they notice that someone is performing actions which do not belong to this lifeworld;
either the understanding that what is happening is just slightly out of the ordinary or the repetition of these actions is eventually assimilated into this micro-lifeworld, reducing the sense of threat;
learning the deceiver’s fake intention and aligning with it brings the subjects closer together.
According to the perspective of sensation/attention:
the deceivers’ attention towards creating the beacon works as a trap, but is real and operates as the initial stage of a process;
the second stage of this process is to capture the attention of others, which mostly takes place slowly as the actions are assimilated;
the third stage is to gain acceptance through the sharing of the fake goal, focusing all attention on the act.
on the side of the deceived, the scattered attention of the spectators turns to a rupture of their lifeworld;
since this rupture does not affect them and repeats itself, the possibility of a threat is eventually dismissed;
learning the (fake) goal of the deceiver unfolds into a shared attention on the performance.
Observing these two processes we realize that while intention and attention may look similar, in the spy’s playbook, the first is an end, and the second is a means. One perspective does not negate the other; the perspective of intention allows the detailed contemplation of an active facet of the performance, while the perspective of attention emphasizes a passive facet. Despite these descriptions of two different perspectives, the task is not achievable at all without the due application of both “tools.” An initial intention aimed at the objective gives rise to subservient intentions throughout the performance, and attention is required to follow or adapt each of the steps as they should be, while remaining alert to the circumstances of the environment. During the performance, deliberate and compelling somatic stimuli direct the target’s attention, thereby imbuing it – on the spy’s side, with intention and purpose. But regardless of the intensity of their intention, attention cannot be held continuously against the will of its original owner. Outside of a specific task, attention and intention are not necessarily interdependent. One may have an intention without taking any action towards it, just as one may lack a specific objective and instead contemplate certain thoughts or one’s surroundings.
For the deceiver, the repetition of an action or even an outburst of rage helps establish a smaller lifeworld within the broader environment, and eventually leads witnesses to withdraw their suspicions. For the deceived, while the initial observation of such actions draws attention and generates the intention to investigate, as those actions are gradually sedimented and become part of a general continuity, the threat is dismissed, leaving only curiosity, which aids in establishing the new isotopy. However, the expectations raised by the repetition must be considered for the establishment or non-establishment of the new isotopy. The deceiver feeds expectations through the connection between the repetition presented and the most likely and understandable outcome. This is understood as a presumption of isotopy, or the facilitating effects of semantic recurrences according to Rastier, a significant process in the perception of contextual lexical meaning (1991: 220–222).
2.3 Techniques and applications of strategic signaling
Recognition signals are means applied when one spy is to recognize another without being acknowledged by potential witnesses. Although the denomination is given by the guides, these “signals” actually constitute intentional signs that convey information (Nöth 2012: 144) against a cultural background. The selection of such signs follows the same principle of the other tricks, which consists in remaining within the range of normality for each situation. For an observer, these signs constitute indices that do not necessarily have to appear intentional (Goudge 1965: 53). Therefore, a recognition signal used in a library would most likely be different from one supposed to be used in a restaurant or train station. Depending on the situation, a range of different signals could be used, each serving a different purpose, such as facilitating the recognition of partners, giving orders to proceed or stop, or updating mission status. This type of sign carries a codified message presented through the code of the place, as per Eco. A recognition signal can be understood as a cloak, where a definition corresponds to a syntagm (Eco 1997: 270), with the reference language being composed by raw elements of the pragmatic cultural environment instead of words.
A recognition signal is in most cases an ordinary object arranged differently (Figure 2).

Examples of recognition signals. Source: Mulholland (2009: 147).
It is imperative for the object in question to be ordinary, as this is where its connection lies to what is considered normal by a witness. Likewise, its different arrangement should not be emphasized too much, but only slightly. Other examples of such objects include a specifically colored feather in a hat, a different button in a coat or shirt – or even a missing button– a package being carried, a particular color or knot in a tie, etc. Briefly, anything acceptable which would present an insignificant meaning for a witness, but not for another spy, could be employed. It is important to notice that regardless of the chosen element, it should be completely functional. That is to say, a button will still perform its role as a button, shoelaces will be tied on somebody’s shoes, and a pen will still work as an ordinary pen. A similar process is described by Rastier when addressing the concept of a “universe,” which stands for an autonomous set of semantic graphs related to at least one actor. When there is a relation between two universes, it is possible for one of them to contain graphs that are replicated from another (1989: 82–84). Here, the replicated graphs understood as true in one universe are also true in the other one, while other graphs may be differently understood as false or possible in each universe. Just as with a social performance, acceptable elements from the expression plane are employed to configure the content plane of the detail that represents the secret code or recognition signal.
For distance signaling (other than manual) are variations in attire. These must be both permissible so as not to attract attention and yet clearly visible at a distance to the knowing observer.
… Alteration of design (such as with the shoelaces) is almost as much of an attention attractor to the person looking for it as is color. Another design variant is using one different button on a shirt or vest. (Mulholland 2009: 143, 146)
The question of rearranging a common element with a particular intent once again raises the question of implementing an intention, where the intention is placed and materialized upon an object. The partners are only able to direct their attention to this element because they are aware of this particular sign. It cannot be completely invisible, since it must attract attention to a certain degree. The problem of simultaneously attracting and dismissing attention is handled through the configuration of a sign among elements of a particular lifeworld. The codification of this configuration will not be open, and the fact that the sign is also unannounced hinders a possible interpretation through pragmatic inferences (Rastier 1991: 216).
As far as the witnesses are concerned, it is noticeable how important they are for the conception of such deceits because they are the ones in control of what is acceptable and what is not. The witness will always have the option to decide whether a different pattern of shoelace is irrelevant or not, and this ability is pondered by the trickster who will employ an object that has to be visible but yet on the margins. In order to decide what is going to be employed, although there may be a number of possibilities, the trickster’s decision will focus on what is sedimented for the witness.
For instance, all the items that the author of our manual discourages from use because they may attract attention may be understood as not sedimented. Shoelaces may be rearranged, but a shoe must not be missing; a button of a shirt might be missing, but not the shirt. Those elements of attire compose an established pattern where each one of them is an expected whole; they can be flawed but not inexistent, and they must not be completely out of pattern. Otherwise, these elements would be placed beyond the ordinary lifeworld, or they would not be recognized as following the cultural code prescribed for a particular place (Eco 1997: 298).
2.4 Maneuvering deception through different contextual realities
By considering the trickster and witness as involved subjects and analyzing the trick and its conception from two different theoretical perspectives, we can better understand the development on both sides: The tricksters, in their active performance, deal with intentions; the witnesses, in their passive performance, deal with perception and attention; and the trick is devised based on lifeworlds and sedimentation.
Nevertheless, during the employment of the trick all lifeworlds considered overlap. There are three lifeworlds that have a significant impact on this matter, each with its own history and tradition: one concerning the country and culture where the trick takes place, which would always be a foreign country; the particular location, which would usually be a space of public frequentation; and the atmosphere of suspicion particular to times of war and espionage, which is even higher where a target to be stolen from or dealt with is involved. This overlapping might also be described as different universes assigned to a single actor; not all actors will have a universe attached to them, but an actor may be placed inside the universe of other actors (Rastier 1989: 83).
Although the manuals do not approach these matters, some passages help delineate the procedure of the spies when navigating different lifeworlds:
Resuming the description of the attributes of a successful trickster, let it be repeated that he should be so normal in manner, and his actions so natural, that nothing about him excites suspicion. This does not mean that he has to be of any particular size or shape, or that he has to make gestures when he talks, or refrain from making them. It means only that he has to be himself – as he is at his calmest moments. That person who naturally speaks and acts rapidly will do well to learn to make both speech and actions more slowly. Tricks never are done rapidly and slowing up at the time the trick is done becomes noticeable. The big point is to be comfortably natural or, at least, to give that appearance. (Mulholland 2009: 71)
When Mulholland states that the spies should mimic themselves in their calmest moments, he is basically guiding them to behave as if they had nothing to worry about and to shift their concentration focus to an inner point. By doing so the trickster reaches for deeper sedimented structures, where people will take for granted the emotional state in which someone accomplishes a given kind of task. The instructions go beyond what and how something should be done, encompassing how one should act while doing it in spite of the delicate situation. This also indicates the importance of knowing how to interact with lifeworlds: When someone is calm, an observer will discard more straightforwardly the possibility of this person being in contact with different lifeworlds at the same time, a description that might easily give away a spy. In order to move freely between lifeworlds, spies need to place themselves within the first two lifeworlds and at the same time outside of the third one, which is their original and encompassing one. No further details are provided in the disclosed part of the manual regarding how this shift is to be performed, except that it requires training.
The movie Argo (2012) exemplifies in more detail how such a fluctuation process works in a practical manner.[8] The narrative portrays the real process of the exfiltration of US diplomats from Iran during the 1979 revolution (Melton and Wallace 2009: 30–31) through the use of deception. In this case, the diplomats were in a hostile environment and could not merge with the locals. They had to stay together, which nevertheless would not make the environment any safer. The trick’s conception had to involve foreigners in Iran with a very good reason to be there at that specific time. The trick could not be too difficult to learn and execute, given the inexperience of the diplomats. Furthermore, they could not reveal their nationality, and the easiest choice was for them to pose as Canadians due to several reasons, including cultural similarities.
In the plan devised, the character Tony Mendez was the trickster posing as the producer of a film called “Argo.” He would reach the hiding diplomats with fake documents, train them to act as film production staff and later rescue them on a routine flight. The initial parts of the trick were in fact agreed upon with the “host” country, since the tricksters managed to provide each detail a real movie would have, including a real film production company and related news published by entertainment magazines. Iran was open to their search for a location, but the group still had many obstacles to overcome in their plan, as they would be dealing with various kinds of people in charge, and with constant suspicion.
The paperwork and all the elements provided surrounding a film production were real, but the diplomats relied on the lifeworld of a film production as a shelter for hiding their true identities. Differently from the circumstances addressed in the previous subsections, the trickster and the diplomats were officially acknowledged as their characters from the beginning. They had complete identities assigned to them, with occupations that were not common, making them stand out. It was not required of them to actually perform their fake jobs, but only to provide trustworthy impressions. This deliberate positioning was part of the plan, as it aimed to keep the authorities focused on verifying the narrative as a whole. As long as the diplomats kept to their assigned roles, the deception would work, and within the borders of their roles they would have a reasonable range of possibilities.
The set of objects the trickster team provided to the Iranian government falls under the figure of a “fiduciary contract” (Greimas 1970; Greimas and Courtés 1993 [1979]: 70–71)[9] in its initial stage of establishment, where both parties valuate the objects to be traded and trust is established. There are multiple objects in this set: the company that was created, the advertisement for the film, the documents concerning the authenticity of the production, their contacts in the base of operations, and the identities created for the people involved, each of them with their own particularities.[10] Their behavior, the part they were supposed to perform, is connected to a subsequent stage of the contract, but still under scrutiny by the other side – blending into a trial of the subject (Greimas and Courtés 1993 [1979]: 83, 131) – so that a failure could lead to a rupture of the contract.
Outside of the contract, these elements occur as independent figures, as they receive semantic investment (Greimas and Courtés 1993 [1979]: 147–148). Semantic investment happens when each of the elements is converted into credibility in the eyes of the Iranian government. When put together, they function as subdivisions of the contract figure, which is in turn related to the broader theme[11] of art, and specifically to the context of the film industry. In this case, art is the value that connects deceiver and deceived, except that for the deceiver, art is merely the decoy theme required to conceive and execute the trick.
Everything that a film production is expected to provide must be included in this list forming the framework of the fiduciary contract, and anything a film should not include could raise suspicion: Figures not easily associated with cinema would present a gap which could allow them to be associated with other themes, including that of deception. It is possible to visualize this constellation of figures and themes as shown in Figure 3.

Connection of theme and figures in Argo.
If the deception is now shown as one of the figures in the lower part of the picture, it can be correlated at the same time to the theme of art and the film industry and to another theme, which in this case translates as the planned exfiltration. In Argo this figure lies in the identities of the staff, something that could not be verified aside from data provided by the diplomats themselves in various ways during their subsequent interactions.
The same configuration works for the other deceptions addressed above, so that the dual figure becomes a link between themes (Figure 4).

Connection of themes and figures in deceptions.
The matter contained by the fiduciary contract will present some variations, except for the agreement that all figures match and are acceptable within a given theme. The same can be said about the following stages of the contract, where perception plays a significant role on a somatic level. Each piece of information provided by the actors through gestures, clothing, manner of speaking, and other channels operates as an element of credibility, and the actors bear the duality of their fake and real identities. This linking process can be expanded more than once to create a chain marked by such dual figures, and in theory those figures could reference more than two themes. Although in Argo the ambiguous figure represented by the lack of expertise on the diplomats’ part was flawed – in the sense that a deeper assessment would possibly unveil the deception – in most of the other deceptions this figure was completely functional on both sides, making it an actual dual figure. Different lifeworlds can be similarly managed through the same process, by inserting a dual figure without severing its ability to be fully recognizable in both environments. When the performance is physically executed, the dual figure is embodied by the actors, who – in the ideal case – can seamlessly shift between two roles.
For this deception of a film production the trickster has likely considered an important circumstantial aspect of the place where they would be operating: Any studio would hardly choose such a complex location when they could easily pick another with similar landscapes. When the newly installed government approves a request to scout film locations to serve their own goals of propaganda and arts promotion, they are also confirming that the world, or at least a part of it, has already acknowledged what transpired there. The trickster is dealing with a recently formed lifeworld.
Furthermore, no film worker would be at ease in that situation, especially when they could be mistaken for Americans during their local interactions. The lie acted in the Argo case was not so much according to how a real unfolding of events would be, were it a real movie, but rather according to what the witnesses were possibly expecting based on how they perceived their own everyday lifeworld and that of the film industry. For this trick they were not trying primarily to fit in a given lifeworld, but first they emulated one where they could fit in, thus creating their own shelter. They fabricated a reality based on stereotypes, on what concerned merely supposed behavior, and worked for it to be judged as truth (Coquet 1989: 186). The advantage of doing this lies in the control of this universe, for what is true, possible or known is only definable for a particular universe and by a particular actor (Rastier 1989: 82).
A noteworthy example of this is presented during one of the scenes when the characters walk through the bazaar and one of them takes a picture of a shop. The shop owner argues that he should have been consulted before, demands the picture and soon a dispute takes place, with the shop owner being backed up by the crowd. In response to his arguments the trickster justifies what has just taken place by replying: “It’s okay, it’s her job to take photographs. She’s the production designer.” The picture is handed over by the photographer, which, however, does not prevent the quarrel, as the shop owner takes them for Americans and changes the topic to politics, and the tricksters have to leave. Their first response might appear as an overreaction considering the risks they were assuming: They could have apologized and asked for the shop owner’s permission, trying to avoid escalation for the sake of politeness from the beginning – even in less troubled times. However, they were being accompanied by a representative of the Minister of Culture and Guidance, a member of the collective subject that constituted the trickster’s target who was observing the argument. When the tricksters justify the photograph being taken, they do not simply stick to their roles, but they also state implicitly that the national situation is not at all affecting the lifeworld portrayed by them, and that it is perfectly acceptable for a film to be shot there. The argument’s outcome strengthens the disguise: they are exploring locations for their film and will try to stand against whatever compromises their goal. Expanding the scheme presented above, marked by the presence of a dual figure, a visual interpretation of this linkage could be the following (Figure 5).

Linkage of cognitive layers in Argo.
The two central layers of the picture (the conflict is assimilated and stereotyped entertainment industry) represent the shelter established by the trickster. The central layers are patched into the surrounding ones (the real situation and espionage/disguised diplomats). The aim of this is to create a path of acceptable possibility. For the tricksters, this kind of operation means a greater level of difficulty compared to cases where the spies can roam freely in a given space because they have not been previously identified. The inevitable high exposition is dealt with through a linking of cognitive layers as presented in the picture, all of which are ultimately connected to the somatic domain.
During the diplomats’ last performance at the airport, a similar situation is portrayed as their date of arrival is going to be checked and they know that there is no register for that, which could potentially become a problem. When the airport officers cannot verify it, the group announces, quite nonchalantly, the existence of a letter from the ministry of culture approving their exploration. Through this manner of expressing themselves, they are once more defending the planned stereotype by simply ignoring the local situation. This narrative sets the cognitive domain as a place of multiple layers, as exemplified in Figure 5. The layers created by the trickster must prioritize the execution of the trick, and they may match, conflict, or run parallel to the encompassing lifeworld. A parallel layer may be understood as irrelevant for the addressee, while a matching layer is relevant, but not as relevant as a conflicting layer would be (e.g., the declaration of a straight opposition). Being aware of this enables the subjects to control their movements at least partially. Within the cognitive domain, each pattern works as one of those layers, including the lifeworlds, which helps in building a shared cognitive space. In each case, the trickster must be careful to constitute a layer that fits the environment according to the task, allowing free movement and not attracting suspicion as to what must be concealed. The usual operation will opt for a parallel layer where the deceiver remains practically imperceptible, while Argo required a matching layer instead, since the usual “invisibility” was not an option.
3 The foundations of deception and its lingering effects
After addressing a reasonable variety of deceptions, it is possible to draw a line between their variables and invariables, delineating their main structures without dismissing other kinds of less intricate foundations of trickery. In all cases, the process of association of the single elements of a set to a given figure, and then to a theme, is the main tool of the deceiver. The elements in this set may have an infinite range of variations, depending on what is supposed to be achieved. For instance, the elements used in a deception to infiltrate a specific group are completely different from those used to remain imperceptible, or to be recognized by a partner in a crowd. The particular figures and themes to which these elements are intended to be associated depend entirely on the task. Regardless, one of these elements will invariably be dual in this context, not in terms of connotation and denotation, as it functions in both the apparent and hidden capacities, but in the sense of allowing an association with the theme presented by the disguise and at the same time with the theme of the deception. When the disguise is a literal one, made up of clothing, appearance, and behavior, and the task is to simply be somewhere without being noticed, the double element is the person, and the deception is the performance of the actor. Although there will always be a degree of acting in a deception, in some cases, the emphasis is not on the person, but on a particular item. This happens with recognition signals, where the item used as a sign is dual, and in Argo’s initial request to search for film locations, since the people involved were only defined by their documents.
The elements of deception will be accepted as figures of credibility, provided they are sufficiently well-crafted as part of the contract between deceived and deceiver. Once this contract is accepted, the double figure proceeds alongside the others and operates in both of its functions. Although this structure may be further complicated through the overlaying and addition of other elements, it represents the core of deception. As an external example, in a common scam, the set of elements would include, among others, a fake logo, a signature, a plausible narrative, and a request for information. This request is the double element, since it can be associated with the theme of deception – the provided information could be misused for theft – but is also appropriate within the fictional narrative.
The difference between successful deceptions that are never found out and those that will eventually be discovered lies in the objects that, in some cases, must circulate between the subjects and can become evidence either when they are removed from the deceived or when they come into their possession. But even evidence may be, if necessary, disguised as double figures through the addition of another layer of disguise with its own contract and respective figures of credibility.
A deception does not require a certain minimum or maximum number of elements in its set, but a reasonable one. A single element in the contract might be enough to complete the task, which would be the case of the simplest possible deception: a sign with double meaning. In such a case, it is not possible to be sure of the accurate intended meaning of the sign without supplementary details. Such a deception has a fifty per cent chance of being successful; the work of the deceiver is above all to increase this percentage by placing the sign correctly. While an accurate placement will not necessarily make the deception more complex, adding to its context will. Both procedures are indispensable for the conception of a trick.
Likewise, an excess of elements might obstruct the acceptance of the contract by making it less credible. The main point to be considered is the association of figures, which is ultimately done by the victim; therefore, the chain of elements must be properly induced. Hence the deceiver’s need for a situational analysis focused on patterns of normality and lifeworlds, which stand for the cognitive environment where the deception will be planted. This environment is taken advantage of as part of the deception and works as a context that may increase the rate of success. To make sure that the association with a figure will be the intended one, the relation between deception and context must be appropriate, which does not mean that the deception will always be embedded in the context so as to become completely imperceptible. The purpose and conditions of the deception might require it to blend into the environment like a patch (as in operation Argo), or even to produce an initial stage of adversity (such as someone getting angry to draw attention).
This kind of assessment is not achievable through a quantitative consideration alone. In order to perform it, the trickster must both perceive the unfolding of events and consider possible reactions in the audience’s perception qualitatively. Perception is also responsible for realizing whether adaptations to the trick are required in the course of the activity and of what kind, which may require measuring all forms of responses. Additionally, and perhaps most importantly, the victims’ ability to perceive, or their attention, is the main tool of the trickster. All that a deception needs to succeed is a positive evaluation of the elements it presents, which will eventually stop the production of knowledge (savoir) on the part of the addressee, who then transitions to belief (croire).
Despite this prospect, deceptions might leave traces that remain in the environment. When a trick is successful, the ideal situation for the spy is that the deception goes completely unnoticed by the witnesses. However, even if details such as those used as secret recognition signals are not acknowledged, they are still present, compose the overall scenery, and consequently influence perception. Mulholland states that when something unusual happens during a trick, this may affect a possible later discovery of the trick by the witness:
Anything unusual in action or speech (unusual to the one watching or listening) will attract attention and should be avoided. Even if a spectator’s attention is focused on the actions during a trick and he does not discover that a trick is being done, he may later recall that the trickster acted oddly and possibly have his suspicions aroused. (Mulholland 2009: 69)
A single strand of irregularity, then, might lead to the discovery of a trick. Still, even when perfectly blended into the environment, a trick does not cease to be an oddity in itself, and the tampering will affect the environment regardless of the trick being noticed or not. Even when the deception is not perceived, the oddity that defines the trick does not go away; it may not be spotted by the observer, yet it remains in the perceptive field as an unidentified element that possibly does not entirely match the lifeworld where it took place. When addressing reality and possibility from a Hegelian perspective, Žižek (1999: 160) states that the derivation of reality from its possibilities of conception, via a suspension of the same reality, does not work. The reason is the category of contingency, which, in Žižek’s view, indicates a real content that cannot be based upon its own conditions of possibility only. This may also be the case for the observers of a successful trick. They contemplate elements that, for them, will remain as possibilities materialized as oddities within the lifeworld where they occur. At this point the question of domains of perception becomes relevant again. The perceptive domain may be further segmented into a perceptive-cognitive domain and a perceptive-somatic domain. Although the spies are able to practically veil any possible input to the perceptive-somatic domain (e.g., there is nothing out of the ordinary to see or hear), they have no means to erase all input to the perceptive-cognitive domain, which is not always connected to its somatic counterpart. Therefore, an impression, a feeling, or what is usually called intuition, might arise in the witness. This intuition may be understood as one of the potentialities standing out above the others despite its conditions of possibility, and relying on this intuition might drive the witness closer to the original intent.
With a view to Greimas and Courtés’s axes of immanence and manifestation (1993 [1979]: 365, 417–419), a given object falls into a category that combines being / not being (immanence) and appearing / not appearing (manifestation). When applied in a semiotic square, four terms originate from this combination: truth (what is and appears to be), secret (what is but does not appear to be), lie (what appears to be but is not), and falsity (what does not appear to be and is not). However, from the perspective of different lifeworlds, our double object, person, or behavior fits into all categories at the same time, as it can be perceived in all combinations. For instance, a singular shirt button is and appears insignificant in the common lifeworld for a witness; simultaneously, it does not appear suspicious and is not out of the ordinary, since it functions as a regular button. For the spy, however, the same object both is and appears within the spy’s lifeworld due to its configuration in context, while simultaneously appearing to belong to the common lifeworld. In this sense, it is possible to say that the trickster arranges the modalities of veridicality around the lifeworld in the process of shaping the disguised object as far as its integration with the environment is concerned. The range of possibilities of different lifeworlds and what is considered sedimented within them allows the object to be and not to be at the same time. For this reason, the trick depends upon sedimentation on the part of the witnesses in the process of judging something that could potentially be a deception; once a single variation is not actually taken for granted, the plan may not work as expected.
In the ongoing reshaping of lifeworlds, even small details like a misplaced button, a unique shoelace pattern, or an unusual briefcase can become important in shaping the future, as long as these structures and their rearrangements are allowed by law (Barthes 2005: 24). However, their hidden meaning is often ignored despite other meanings attributed to them, such as lack of worry or a singular way of expressing oneself, which are predominant in the wider lifeworld. For example, there were significant changes in the clothing – now fashion – market during the 1960s (Stafford 2005: 145), including the democratization of jewelry through the adoption of a plethora of materials (Barthes 2005: 62), but also an increase in the diversity of clothing styles during the 1960s and 1970s, largely influenced by extensive advertising, as well as the exploration of details in buttons, shoes, ties, briefcases, etc. This period saw a significantly higher level of advertisement compared to the preceding and subsequent decades (Clemente 2015: 99, 109). The same happens with the adoption of specific idioms, clothing, and mannerisms by urban groups, where a detail could represent a recognition signal that is only meaningful to those familiar with it. This can be seen as a matter of polysemy considering, as stated by Ricœur (2013 [1969]), that shifts of meaning are synchronically projected on polysemy, as the previous meaning and the new one are contemporary in the same system. Another meaning is added to the original content without replacing its main definition (Rastier 1991: 103). Simultaneously to this process, there is what might be understood as the placing of cognitive environments, a practice not exclusive to spies, whose purpose is almost always to mingle with the crowd. Often, and particularly during the period examined here, layers in conflict with the ruling cognitive environment have been explored through various globally renowned public manifestations.
Consequently, the experience of a world containing these slightly “out of place” objects evolves over time to an experience of the world where the same range of different objects is no longer out of place. Interestingly, the Cold War marked a period of significant change in the various elements in which deception was employed, and was marked by a smaller variety of such elements in comparison with subsequent times. Behavior, clothing, etc. were more strictly regulated, and tolerance for deviation was smaller. Today’s lifeworld is wider and incorporates more than before, at least as far as usual patterns and acceptance are concerned, potentially including many smaller lifeworlds with their own sedimentations and mechanisms.
One might wonder whether the effects of this expansion could lead to the perception of a loss of grasp over life as a whole, but such a conclusion would be nothing more than a misunderstanding, as the focus of attention has been shifted towards individualism to the detriment of collectivism. Following the line of thought explored so far, this could be interpreted as a form of self-imposed misdirection. If the structure of deception can be transposed to other practices not normally considered deceptions, this would mean that it may be found more often than expected. Essentially, any fiduciary transaction where the benefits intended for the addresser are not fully disclosed to the addressee follows a similar pattern of deception, regardless of whether or not the results are satisfactory for both. Hence, deception is not necessarily malicious in itself, but is rather a mechanism supposed to drive the mind through misdirection. Magic tricks, at least, the source material of Mulholland’s guides, attest to how deception can be employed for less belligerent ends. Even being aware that a deception is taking place does not remove all of its possible effects, since, e.g., the magician’s particular method is not revealed. Even so, an awareness of the mechanisms employed certainly contributes to the identification of other mind games as well, both the malicious and the less malevolent ones. The samples examined here do not comprise all possible applications of the process, and beyond just deceiving, further exploration of this theme might certainly unlock an additional potential, enhancing awareness and promoting better ways to employ attention.
References
Barthes, Roland. 2005. The language of fashion. Oxford & New York: Berg.Search in Google Scholar
Bastide, Françoise. 1982. Exploration du « croire » dans le domaine scientifique. Documents de Travail et Pré-Publications 114. 1–19.Search in Google Scholar
Clemente, Mariana. 2015. Moda e modos de consumo no Brasil do século XX: Revistas e a construção de aparências [Fashion and consumption ways in twentieth century Brazil: Magazines and the construction of appearances]. São Paulo: Pontifical Catholic University of São Paulo MA thesis.Search in Google Scholar
Coquet, Jean-Claude. 1989. Le discours et son sujet. Paris: Méridiens Klincksiek.Search in Google Scholar
Coquet, Jean-Claude. 2006. Instances du discours et phénoménologie. In Juan Alonso Aldama, Dennis Bertrand, Michel Constantini & Sylvain Dambrine (eds.), La transversalité du sens: parcours sémiotiques, 15–22. Saint-Denis: Presses universitaires de Vincennes.10.4000/books.puv.5698Search in Google Scholar
Coquet, Jean-Claude. 2007. Phusis et logos. Une phénoménologie du langage. Saint-Denis: Presses universitaires de Vincennes.Search in Google Scholar
Eco, Umberto. 1997. Semiotica e filosofia del linguaggio. Torino: Einaudi.Search in Google Scholar
Fabbri, Paolo. 2012. Camouflage. DeSignis 20. 37–43.Search in Google Scholar
Fontanille, Jacques. 2019. La sémiotique des mondes vivants: du signe à l’interaction, de la téléologie à la structure. Actes Sémiotiques 122. https://www.unilim.fr/actes-semiotiques/6233 (accessed 25 November 2023).10.25965/as.6233Search in Google Scholar
Greimas, Algirdas Julien. 1966. Sémantique structurale. Recherche de méthode. Paris: Larousse.Search in Google Scholar
Greimas, Algirdas Julien. 1970. Du sens: Essais sémiotiques. Paris: éditions du Seuil.Search in Google Scholar
Greimas, Algirdas Julien & Joseph Courtés. 1993 [1979]. Dictionnaire raisonné de la théorie du langage. Paris: Hachette.Search in Google Scholar
Goudge, Thomas A. 1965. Peirce’s index. Transactions of the Charles S. Peirce Society 2. 52–70.Search in Google Scholar
Husserl, Edmund. 1970. The crisis of European sciences and transcendental phenomenology: An introduction to phenomenological philosophy. Evanston, IL: Northwestern University Press.Search in Google Scholar
Husserl, Edmund. 1997. Thing and space: Lectures of 1907. Dordrecht: Springer.Search in Google Scholar
Melton, H. Keith & Robert Wallace. 2009. The official C. I. A. manual of trickery and deception. New York: HarperCollins.Search in Google Scholar
Merleau-Ponty, Maurice. 1990 [1942]. La structure du comportement. Paris: Presses universitaires de France.Search in Google Scholar
Merleau-Ponty, Maurice. 1945. Phénoménologie de la perception. Paris: Gallimard.Search in Google Scholar
Merleau-Ponty, Maurice. 1996. Phenomenology of perception. Delhi: Motilal Banarsidass.Search in Google Scholar
Mulholland, John. 2009. Some operational applications of the art of deception: Recognition signals. In H. Keith Melton & Robert Wallace (eds.), The C. I. A. manual of trickery and deception, 61–152. New York: HarperCollins.Search in Google Scholar
Nöth, Winfried. 2012. Charles S. Peirce’s theory of information: A theory of the growth of symbols and of knowledge. Cybernetics & Human Knowing 1–2. 137–161.Search in Google Scholar
Rastier, François. 1989. Sens et textualité. Paris: Hachette.Search in Google Scholar
Rastier, François. 1991. Sémantique et recherches cognitives. Paris: Presses Universitaires de France.Search in Google Scholar
Rastier, François. 2013. Apprendre pour transmettre. L’éducation contre l’idéologie managériale. Paris: Presses universitaires de France.10.3917/puf.rasti.2013.01Search in Google Scholar
Ricœur, Paul. 2013 [1969]. Le conflit des Interprétations. Essais d’herméneutique. Paris: Seuil.Search in Google Scholar
Sperber, Dan & Deirdre Wilson. 1996. Relevance: Communication and cognition, 2nd edn. Oxford & Cambridge: Blackwell.Search in Google Scholar
Stafford, Andy. 2005. Clothes, fashion, and system in the writings of Roland Barthes: “Something out of nothing.” Foreword. In Roland Barthes (ed.), The language of fashion, 118–165. Oxford & New York: Berg.Search in Google Scholar
Strassheim, Jan. 2018. Relevance and irrelevance. In Jan Strassheim & Hisashi Nasu (eds.), Relevance and Irrelevance: Theories, factors and challenges, 1–15. Berlin & Boston: De Gruyter.10.1515/9783110472509-001Search in Google Scholar
Uexküll, Jakob von. 2010. A foray into the worlds of animals and humans: With a theory of meaning. Minneapolis & London: University of Minnesota Press.Search in Google Scholar
Žižek, Slavoj. 1999. Subversions du sujet. Psychanalyse, philosophie, politique. Rennes: Presses universitaires de Rennes.Search in Google Scholar
© 2024 the author(s), published by De Gruyter, Berlin/Boston
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- Frontmatter
- Editorial
- Presence in absentia: in memory of Göran Sonesson
- Lifeworldly Foundations
- Being is said in many ways
- A semiotic lifeworld. Semiotics and phenomenology: Peirce, Husserl, Heidegger, Deleuze, and Merleau-Ponty
- Symbolization and appresentational orders in lifeworldly meaning constitution
- Focusing on Relevance
- Embodied agentive habits: between sedimentation and ongoing ground
- The lifeworld and the world of life: the concept of relevance and its foundation in organic nature
- Encyclopedia in the Spotlight
- Rethinking lexical semantic fields: relevance and local holism
- A case study of Eco’s notion of encyclopedia: the (ethno)racial lexicon and its semantic sphere
- Building a Lifeworld
- Historical narrative and enrichment of the meaningful horizon of cultural worlds
- Exploring deceptions: cognitive strategies and dynamics in espionage
- Missed encounters: what may be relevant for an AI is not for a human being
Articles in the same Issue
- Frontmatter
- Editorial
- Presence in absentia: in memory of Göran Sonesson
- Lifeworldly Foundations
- Being is said in many ways
- A semiotic lifeworld. Semiotics and phenomenology: Peirce, Husserl, Heidegger, Deleuze, and Merleau-Ponty
- Symbolization and appresentational orders in lifeworldly meaning constitution
- Focusing on Relevance
- Embodied agentive habits: between sedimentation and ongoing ground
- The lifeworld and the world of life: the concept of relevance and its foundation in organic nature
- Encyclopedia in the Spotlight
- Rethinking lexical semantic fields: relevance and local holism
- A case study of Eco’s notion of encyclopedia: the (ethno)racial lexicon and its semantic sphere
- Building a Lifeworld
- Historical narrative and enrichment of the meaningful horizon of cultural worlds
- Exploring deceptions: cognitive strategies and dynamics in espionage
- Missed encounters: what may be relevant for an AI is not for a human being