[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Berlin in July 1945 - Probably the best restored film material you'll watch from that time!

Ok this is Funny

Walking Through 1980s Los Angeles: The City That Reinvented Cool

THE ZOMBIES OF AMERICA

THE OLDEST PHOTOS OF NEW YORK YOU'VE NEVER SEEN

John Rich – Calling Out P. Diddy, TVA Scandal, and Joel Osteen | SRS #232

Capablanca Teaches Us The ONLY Chess Opening You'll Ever Need

"How Bruce Springsteen Fooled America"

How ancient Rome was excavated in Italy in the 1920s. Unique rare videos and photos.

Reagan JOKE On The Homeless

The Deleted Wisdom (1776 Report)

Sicko Transfaggots video

The Englund Gambit Checkmate

20 Minutes Of Black DC Residents Supporting Trump's Federal Takeover!

"Virginia Public Schools Deserve This Reckoning"

"'Pack the Bags, We're Going on a Guilt Trip'—the Secret to the Democrats' Success"

"Washington, D.C., Is a Disgrace"

"Trump Orders New 'Highly Accurate' Census Excluding Illegals"

what a freakin' insane asylum

Sorry, CNN, We're Not Going to Stop Talking About the Russian Collusion Hoax

"No Autopsy Can Restore the Democratic Party’s Viability"

RIP Ozzy

"Trump floats 'restriction' for Commanders if they fail to ditch nickname in favor of Redskins return"

"Virginia Governor’s Race Heats Up As Republican Winsome Sears Does a Hard Reboot of Her Campaign"

"We Hate Communism!!"

"Mamdani and the Democratic Schism"

"The 2nd Impeachment: Trump’s Popularity Still Scares Them to Death"

"President Badass"

"Jasmine Crockett's Train Wreck Interview Was a Disaster"

"How Israel Used Spies, Smuggled Drones and AI to Stun and Hobble Iran"

There hasn’T been ... a single updaTe To This siTe --- since I joined.

"This Is Not What Authoritarianism Looks Like"

America Erupts… ICE Raids Takeover The Streets

AC/DC- Riff Raff + Go Down [VH1 Uncut, July 5, 1996]

Why is Peter Schiff calling Bitcoin a ‘giant cult’ and how does this impact market sentiment?

Esso Your Butt Buddy Horseshit jacks off to that shit

"The Addled Activist Mind"

"Don’t Stop with Harvard"

"Does the Biden Cover-Up Have Two Layers?"

"Pete Rose, 'Shoeless' Joe Reinstated by MLB, Eligible for HOF"

"'Major Breakthrough': Here Are the Details on the China Trade Deal"

Freepers Still Love war

Parody ... Jump / Trump --- van Halen jump

"The Democrat Meltdown Continues"

"Yes, We Need Deportations Without Due Process"

"Trump's Tariff Play Smart, Strategic, Working"

"Leftists Make Desperate Attempt to Discredit Photo of Abrego Garcia's MS-13 Tattoos. Here Are Receipts"

"Trump Administration Freezes $2 Billion After Harvard Refuses to Meet Demands"on After Harvard Refuses to Meet Demands

"Doctors Committing Insurance Fraud to Conceal Trans Procedures, Texas Children’s Whistleblower Testifies"

"Left Using '8647' Symbol for Violence Against Trump, Musk"


Status: Not Logged In; Sign In

United States News
See other United States News Articles

Title: Darpa’s Plan to Trap the Next WikiLeaker: Decoy Documents
Source: [None]
URL Source: [None]
Published: Nov 4, 2011
Author: Dawn Lim
Post Date: 2011-11-04 07:43:17 by A K A Stone
Keywords: None
Views: 236
Comments: 1

WikiLeakers may have to think twice before clicking on that “classified” document. It could be the digital smoking gun that points back at them.

Darpa-funded researchers are building a program for “generating and distributing believable misinformation.” The ultimate goal is to plant auto-generated, bogus documents in classified networks and program them to track down intruders’ movements, a military research abstract reveals.

“We want to flood adversaries with information that’s bogus, but looks real,” says Salvatore Stolfo, the Columbia University computer science professor leading the project. “This will confound and misdirect them.” (You can make your own fake doc on the research lab’s website, too.)

The program aims to scare off uninvited riff-raff as well as minimize insider threats, one of the greatest vulnerabilities in military networks. Fake “classified” documents, when touched, will take a snapshot of the IP address of the intruder and the time it was opened, alerting a systems administrator of the breach.

With that trail of digital breadcrumbs, agencies can track down prying eyes more easily. It’s not only a way to stop the new “systemic threat” demonstrated by “the recent disclosure of sensitive and classified government documents through WikiLeaks,” as a summary of the project notes. The deeper goal is to make hackers and whistleblowers jittery about whether the data they’ve stumbled on is actually real.

With Congress demanding the Defense Department work on eliminating insider threats, feds have been in overdrive trying to prevent another document-dump at the scale of WikiLeaks, even going to the extremes of threatening to prosecute airmen who let their families read the site. Jaguar

This decoy-detecting project is funded as part of Anomaly Detection at Multiple Scales, a program to design ways of sniffing out “malicious” insider threat behavior. It’s not the only Pentagon program aimed at weeding out disloyal troops. Led by Peiter “Mudge” Zatko, former hacker-rockstar of the freewheeling Boston’s L0pht collective, Darpa is dreaming ways to detect signs of subversion or infiltration as part of a program called Cyber Insider Threat.

Under this plan, the decoy docs would undermine hackers’ trust in the integrity of data, make them question whether releasing it in the public domain would be worth it, and force WikiLeakers to do more work verifying their authenticity. (Take the document we made above, for example.)

“If we implant lots of decoys in a system, the adversary has to expend own resources to determine what’s real and what’s not,” Stolfo tells Danger Room.

If a bogus document is actually released online, it would shatter the credibility of the whistleblowing website that published it, said Stolfo. So even after an attacker has hacked through firewalls, tricked intrusion detection technology and gained unfettered access into a system, he’ll hesitate before making away with the goods.

Columbia University has a pending patent application on the decoy-creating technology. Stolfo co-founded Allure Security Technology in 2009 to make products based on that technology.

“I don’t know who has the patent for the concept of deception, though,” he joked. “It possibly dates back to the time of Adam and Eve. Now we’re trying to automate the process.”

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: A K A Stone (#0)

Under this plan, the decoy docs would undermine hackers’ trust in the integrity of data, make them question whether releasing it in the public domain would be worth it, and force WikiLeakers to do more work verifying their authenticity. (Take the document we made above, for example.)

“If we implant lots of decoys in a system, the adversary has to expend own resources to determine what’s real and what’s not,” Stolfo tells Danger Room.

If a bogus document is actually released online, it would shatter the credibility of the whistleblowing website that published it, said Stolfo. So even after an attacker has hacked through firewalls, tricked intrusion detection technology and gained unfettered access into a system, he’ll hesitate before making away with the goods.

LMFAO

The problem is the 'good guys' believing this shite.

Dirty Fuckin Hippies have been playing this game since forever.

You know the truth when you read it. You know bullshite cause it's boring. And anything in between has truth in there somewhere....;}

mcgowanjm  posted on  2011-11-04   9:54:50 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com