It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

A 'fog of disinformation' is coming

page: 1
4

log in

join
share:

posted on Jul, 6 2012 @ 08:27 AM
link   
americafirstsite.com...

Misinformation feeds the tabloid journalism sites, ATS included. More could be coming but the one who leaks it will be caught.


Pentagon-funded researchers have come up with a new plan for busting leakers: Spot them by how they search, and then entice the secret-spillers with decoy documents that will give them away.

Computer scientists call it it “Fog Computing” — a play on today’s cloud computing craze. And in a recent paper for Darpa, the Pentagon’s premiere research arm, researchers say they’ve built “a prototype for automatically generating and distributing believable misinformation … and then tracking access and attempted misuse of it. We call this ‘disinformation technology.’”



The first goal of Fog Computing is to bury potentially valuable information in a pile of worthless data, making it harder for a leaker to figure out what to disclose.



The next step: Track those decoy docs as they cross the firewall. For that, Stolfo and his colleagues embed documents with covert beacons called “web bugs,” which can monitor users’ activities without their knowledge. They’re popular with online ad networks. “When rendered as HTML, a web bug triggers a server update which allows the sender to note when and where the web bug was viewed,” the researchers write. ”Typically they will be embedded in the HTML portion of an email message as a non-visible white on white image, but they have also been demonstrated in other forms such as Microsoft Word, Excel, and PowerPoint documents.”


The old white text on a white background in an email is easily revealed by selecting the entire message (or non text portions) and changing the font color, thus revealing and allowing you to then erase the web bug.

All in all, is this clever, brilliant or as expected?

It now appears that the person who buried the valuable information will have to be the one who leaks it.


edit on 6-7-2012 by oghamxx because: (no reason given)

edit on 6-7-2012 by oghamxx because: (no reason given)

edit on 6-7-2012 by oghamxx because: (no reason given)



posted on Jul, 6 2012 @ 08:32 AM
link   
It's clever that they can do that but not good that they will do that.
i understand they think leaking info is wrong and some people may agree, but i cant help but feel that info shouldnt have been kept secret to start with, meaning no leaks and no 'fogging' lol.
edit on 6-7-2012 by christafinias because: typo



posted on Jul, 6 2012 @ 08:41 AM
link   


Typically they will be embedded in the HTML
reply to post by oghamxx
 
...thats kinda scary

nice pic Vlad


edit on 6-7-2012 by SarnholeOntarable because: (no reason given)



posted on Jul, 6 2012 @ 08:57 AM
link   
Yes, and than they will cry "crazy conspiracies"...when this false info is released. Nice plan.




top topics
 
4

log in

join