Modeling a Cyber Deception Practitioner's Approach: Behaviorally Exploiting an American Cybercriminal with Warranting Theory and Whaley's Unpublished Work on “Unexpected Players” | IEEE Conference Publication | IEEE Xplore