[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

"Trump to Attend White House Correspondents' Dinner"

"Islamic Republic of Iran Not Dead Yet, Reportedly Using Electronic Warfare in Crucial Strait of Hormuz"

"Can Britain Be Restored?"

"Trump's Big, Beautiful Cartel Crackdown: 92 Cartel Members Extradited Before Jalisco Raid"

"Why the Left is Triggered by Western Culture"

"The Uncomfortable Truth About Trans Violence and Political Radicalization"

"AOC’s Risible Performance"

"Why the Outrage Over the Cuts at the Washington Post Is So Annoying"

"New Poll Crushes Dem, Media Narrative: Americans Demand Mass Deportations, Back ICE Overwhelmingly"

"Democratic Overreach on Immigration Beckons"

How to negotiate to buy a car

Trump warns of a 'massive Armada' headed towards Iran

End Times Prophecy: Trump Says Board of Peace Will Override Every Government & Law – 10 Kings Rising

Maine's legendary 'Lobster Lady' dies after working until she was 103 and waking up at 3am every day

Hannity Says Immigration Raids at Home Depot Are Not ‘A Good Idea’

TREASON: Their PRIVATE CHAT just got LEAKED.

"Homan Plans to Defy Spanberger After ‘Bond Villain’ Blocks ICE Cooperation in VA: ‘Not Going to Stop’"

"DemocRATZ Radical Left-Wing Vision for Virginia"

"Tim Walz Wants the Worst"

Border Patrol Agents SMASH Window and Drag Man from Car in Minnesota Chaos

"Dear White Liberals: Blacks and Hispanics Want No Part of Your Anti-ICE Protests"

"The Silliest Venezuela Take You Will Read Today"

Michael Reagan, Son of Ronald Reagan, Dies at 80

Patel: "Minnesota Fraud Probes 'Buried' Under Biden"

"There’s a Word for the West’s Appeasement of Militant Islam"

"The Bondi Beach Jihad: Sharia Supremacism and Jew Hatred, Again"

"This Is How We Win a New Cold War With China"

"How Europe Fell Behind"

"The Epstein Conspiracy in Plain Sight"

Saint Nicholas The Real St. Nick

Will Atheists in China Starve Due to No Fish to Eat?

A Thirteen State Solution for the Holy Land?

US Sends new Missle to a Pacific ally, angering China and Russia Moscow and Peoking

DeaTh noTice ... Freerepublic --- lasT Monday JR died

"‘We Are Not the Crazy Ones’: AOC Protests Too Much"

"Rep. Comer to Newsmax: No Evidence Biden Approved Autopen Use"

"Donald Trump Has Broken the Progressive Ratchet"

"America Must Slash Red Tape to Make Nuclear Power Great Again!!"

"Why the DemocRATZ Activist Class Couldn’t Celebrate the Cease-Fire They Demanded"

Antifa Calls for CIVIL WAR!

British Police Make an Arrest...of a White Child Fishing in the Thames

"Sanctuary" Horde ASSAULTS Chicago... ELITE Marines SMASH Illegals Without Mercy

Trump hosts roundtable on ANTIFA

What's happening in Britain. Is happening in Ireland. The whole of Western Europe.

"The One About the Illegal Immigrant School Superintendent"

CouldnÂ’t believe he let me pet him at the end (Rhino)

Cops Go HANDS ON For Speaking At Meeting!

POWERFUL: Charlie Kirk's final speech delivered in South Korea 9/6/25

2026 in Bible Prophecy

2.4 Billion exposed to excessive heat


Status: Not Logged In; Sign In

United States News
See other United States News Articles

Title: Darpa’s Plan to Trap the Next WikiLeaker: Decoy Documents
Source: [None]
URL Source: [None]
Published: Nov 4, 2011
Author: Dawn Lim
Post Date: 2011-11-04 07:43:17 by A K A Stone
Keywords: None
Views: 355
Comments: 1

WikiLeakers may have to think twice before clicking on that “classified” document. It could be the digital smoking gun that points back at them.

Darpa-funded researchers are building a program for “generating and distributing believable misinformation.” The ultimate goal is to plant auto-generated, bogus documents in classified networks and program them to track down intruders’ movements, a military research abstract reveals.

“We want to flood adversaries with information that’s bogus, but looks real,” says Salvatore Stolfo, the Columbia University computer science professor leading the project. “This will confound and misdirect them.” (You can make your own fake doc on the research lab’s website, too.)

The program aims to scare off uninvited riff-raff as well as minimize insider threats, one of the greatest vulnerabilities in military networks. Fake “classified” documents, when touched, will take a snapshot of the IP address of the intruder and the time it was opened, alerting a systems administrator of the breach.

With that trail of digital breadcrumbs, agencies can track down prying eyes more easily. It’s not only a way to stop the new “systemic threat” demonstrated by “the recent disclosure of sensitive and classified government documents through WikiLeaks,” as a summary of the project notes. The deeper goal is to make hackers and whistleblowers jittery about whether the data they’ve stumbled on is actually real.

With Congress demanding the Defense Department work on eliminating insider threats, feds have been in overdrive trying to prevent another document-dump at the scale of WikiLeaks, even going to the extremes of threatening to prosecute airmen who let their families read the site. Jaguar

This decoy-detecting project is funded as part of Anomaly Detection at Multiple Scales, a program to design ways of sniffing out “malicious” insider threat behavior. It’s not the only Pentagon program aimed at weeding out disloyal troops. Led by Peiter “Mudge” Zatko, former hacker-rockstar of the freewheeling Boston’s L0pht collective, Darpa is dreaming ways to detect signs of subversion or infiltration as part of a program called Cyber Insider Threat.

Under this plan, the decoy docs would undermine hackers’ trust in the integrity of data, make them question whether releasing it in the public domain would be worth it, and force WikiLeakers to do more work verifying their authenticity. (Take the document we made above, for example.)

“If we implant lots of decoys in a system, the adversary has to expend own resources to determine what’s real and what’s not,” Stolfo tells Danger Room.

If a bogus document is actually released online, it would shatter the credibility of the whistleblowing website that published it, said Stolfo. So even after an attacker has hacked through firewalls, tricked intrusion detection technology and gained unfettered access into a system, he’ll hesitate before making away with the goods.

Columbia University has a pending patent application on the decoy-creating technology. Stolfo co-founded Allure Security Technology in 2009 to make products based on that technology.

“I don’t know who has the patent for the concept of deception, though,” he joked. “It possibly dates back to the time of Adam and Eve. Now we’re trying to automate the process.”

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: A K A Stone (#0)

Under this plan, the decoy docs would undermine hackers’ trust in the integrity of data, make them question whether releasing it in the public domain would be worth it, and force WikiLeakers to do more work verifying their authenticity. (Take the document we made above, for example.)

“If we implant lots of decoys in a system, the adversary has to expend own resources to determine what’s real and what’s not,” Stolfo tells Danger Room.

If a bogus document is actually released online, it would shatter the credibility of the whistleblowing website that published it, said Stolfo. So even after an attacker has hacked through firewalls, tricked intrusion detection technology and gained unfettered access into a system, he’ll hesitate before making away with the goods.

LMFAO

The problem is the 'good guys' believing this shite.

Dirty Fuckin Hippies have been playing this game since forever.

You know the truth when you read it. You know bullshite cause it's boring. And anything in between has truth in there somewhere....;}

mcgowanjm  posted on  2011-11-04   9:54:50 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com