Kathianne
07-03-2012, 06:39 PM
Setting up bureaucrats to fall under the most humongous bus in history. The leaks that are causing consternation are all pro Obama re-election. So what to do? Find a fall guy:
http://www.wired.com/dangerroom/2012/07/fog-computing/
Feds Look to Fight Leaks With ‘Fog of Disinformation’
By Noah Shachtman (http://www.wired.com/dangerroom/author/noah_shachtman/)
July 3, 2012
Pentagon-funded researchers have come up with a new plan for busting leakers: Spot them by how they search, and then entice the secret-spillers with decoy documents that will give them away.
Computer scientists call it it “Fog Computing” — a play on today’s cloud computing craze. And in a recent paper (http://dsearch.dtic.mil/search?q=cache:FsgWcwTFmzAJ:www.dtic.mil/dtic/tr/fulltext/u2/a552461.pdf+%22Allure+Security%22&site=tr_all&client=dticol_frontend&proxystylesheet=dticol_frontend&ie=UTF-8&access=p&oe=UTF-8) for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built “a prototype for automatically generating and distributing believable misinformation … and then tracking access and attempted misuse of it. We call this ‘disinformation technology.’”
Two small problems: Some of the researchers’ techniques are barely distinguishable from spammers’ tricks. And they could wind up undermining trust among the nation’s secret-keepers, rather than restoring it.
...
http://www.wired.com/dangerroom/2012/07/fog-computing/
Feds Look to Fight Leaks With ‘Fog of Disinformation’
By Noah Shachtman (http://www.wired.com/dangerroom/author/noah_shachtman/)
July 3, 2012
Pentagon-funded researchers have come up with a new plan for busting leakers: Spot them by how they search, and then entice the secret-spillers with decoy documents that will give them away.
Computer scientists call it it “Fog Computing” — a play on today’s cloud computing craze. And in a recent paper (http://dsearch.dtic.mil/search?q=cache:FsgWcwTFmzAJ:www.dtic.mil/dtic/tr/fulltext/u2/a552461.pdf+%22Allure+Security%22&site=tr_all&client=dticol_frontend&proxystylesheet=dticol_frontend&ie=UTF-8&access=p&oe=UTF-8) for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built “a prototype for automatically generating and distributing believable misinformation … and then tracking access and attempted misuse of it. We call this ‘disinformation technology.’”
Two small problems: Some of the researchers’ techniques are barely distinguishable from spammers’ tricks. And they could wind up undermining trust among the nation’s secret-keepers, rather than restoring it.
...