<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>THING2THING &#187; DARPA</title>
	<atom:link href="http://thing2thing.com/?feed=rss2&#038;tag=darpa" rel="self" type="application/rss+xml" />
	<link>http://thing2thing.com</link>
	<description>A History of Wikileaks</description>
	<lastBuildDate>Sat, 25 Apr 2026 04:33:14 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.0.3</generator>
		<item>
		<title>DARPA DUM DUM ?</title>
		<link>http://thing2thing.com/?p=1666</link>
		<comments>http://thing2thing.com/?p=1666#comments</comments>
		<pubDate>Thu, 10 Nov 2011 11:16:46 +0000</pubDate>
		<dc:creator>CaTⓋ</dc:creator>
				<category><![CDATA[EDITORIAL]]></category>
		<category><![CDATA[NEWS]]></category>
		<category><![CDATA[Colombia University]]></category>
		<category><![CDATA[DARPA]]></category>
		<category><![CDATA[Salvatore Stolfo]]></category>
		<category><![CDATA[Wikileaks]]></category>

		<guid isPermaLink="false">http://thing2thing.com/?p=1666</guid>
		<description><![CDATA[If the information is to be believed, it must contain stories of wrong-doing by governments and/or corporations – in other words, bad publicity for the institutions DARPA is trying to protect. And if the information is distributed before they catch the hackers (whether that’s necessary or not to prosecute them) many people WILL believe the stories and react.  <a class="more-link" href="http://thing2thing.com/?p=1666">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p><strong><a title="Wikileaks.org" href="http://wikileaks.org/" target="_blank"><span style="color: #f10000;">Wikileaks</span></a></strong> recently tweets: <strong><span style="color: #888888;">&#8220;Colombia university, administer of the Pulitzer Prize, engages in program to catch WikiLeaks whistleblowers | Fox </span></strong><a title="Darpa sets traps for future wikileakers" href="http://www.foxnews.com/scitech/2011/11/07/darpa-sets-traps-for-future-wikileakers/" target="_blank"><span style="color: #f10000;">http://www.foxnews.com/scitech/2011/11/07/darpa-sets-traps-for-future-wikileakers/</span></a></p>
<p><a href="http://thing2thing.com/wp-content/uploads/darpa-465x310.gif"><img class="alignleft size-full wp-image-1668" title="darpa" src="http://thing2thing.com/wp-content/uploads/darpa-465x310.gif" alt="" width="465" height="310" /></a></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p>Here we discover DARPA&#8217;s brilliant new program for <span style="color: #c0c0c0;"><strong><span style="color: #999999;">&#8220;automatically generating and distributing believable misinformation&#8221;</span></strong></span>. The idea is to get hackers to distribute the material that <strong><span style="color: #999999;">&#8220;rings home&#8221;</span></strong> when opened, <strong><span style="color: #999999;">&#8220;perhaps&#8221;</span></strong> revealing the location of the computer on which it is being read. OK&#8230; I see two problems here:</p>
<p>If the information is to be believed, it must contain stories of wrong-doing by governments and/or corporations &#8211; in other words, <strong><span style="color: #f10000;">bad publicity</span></strong> for the institutions DARPA is trying to protect. And if the information is distributed before they catch the hackers (whether that&#8217;s necessary or not to prosecute them) many people WILL believe the stories and react. Nice one. We&#8217;ll call it: <strong><span style="color: #f10000;">Operation-Cut-Off-Your-Nose-To-Spite-Your-Face</span></strong></p>
<p>The other problem is that hackers may re-distribute data without opening it. In that case, once again, they get the wrong guy.</p>
<p><strong><span style="color: #888888;">“We want to flood adversaries with information that’s bogus, but looks real,”</span></strong> Salvatore Stolfo chuckles.</p>
<p>Surprisingly, he&#8217;s leading the Department of Defence project from the Computer Science department of Columbia University, but the idea was not born there. <strong><a title="HB Gary propose false leaks" href="http://www.salon.com/2011/02/11/campaigns_4/singleton/" target="_blank"><span style="color: #f10000;">HB Gary</span></a></strong> proposed the virtual honeypots &#8220;master plan&#8221; about a year ago.</p>
<p><a href="http://thing2thing.com/wp-content/uploads/marc-thiessen.jpeg"><img class="alignleft size-full wp-image-1683" title="marc-thiessen" src="http://thing2thing.com/wp-content/uploads/marc-thiessen.jpeg" alt="" width="228" height="350" /></a><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p><span style="color: #000000;">-</span></p>
<p>Marc Thiessen <em>(pictured above)</em> rejoices in his article: <a title="Three ways to undermine Wikileaks" href="http://blog.american.com/2011/11/three-ways-to-undermine-wikileaks/" target="_blank"><strong><span style="color: #f10000;">&#8216;Three ways to undermine WikiLeaks&#8217;</span></strong></a> that this <span style="color: #888888;"><strong><span style="color: #888888;">&#8220;could be the death blow to Julian Assange’s criminal conspiracy&#8221;</span></strong></span>.  He is particularly delighted with Part 3: DENIABILITY.</p>
<p><strong><span style="color: #999999;">&#8220;Perhaps most important, the existence of the fake documents creates plausible deniability the next time WikiLeaks publishes what it claims are classified documents. Even if the leaked documents are real, the U.S. government can claim they are not—and the leaking organization would be hard-pressed to prove otherwise. Foreign partners of the United States whose confidential conversations and information is exposed can similarly deny the accuracy of the information, mitigating the damage of any future leaks.&#8221;</span></strong></p>
<p>Well tell me this Marc: if a government agency openly admits it is disseminating lies to discredit truth-tellers, how can they avoid simply undermining their own credibility?</p>
<p>When one reads: <strong><span style="color: #888888;">&#8220;allowing them to follow the “digital breadcrumbs” as the documents are shared, so they can identify anyone involved in the conspiracy&#8221;</span></strong>, one must conclude that DARPA is proposing to track EVERYONE who opens the document! Well that certainly could lead to a lot of <span style="color: #888888;"><strong><span style="color: #888888;">&#8220;adversaries&#8221;</span></strong></span> that would have to be lied to&#8230;</p>
<p>In a month or so, we are guessing that this plan will be fondly remembered as DARPA&#8217;s DOA, given its penchant for risk-taking with client reliability.</p>
]]></content:encoded>
			<wfw:commentRss>http://thing2thing.com/?feed=rss2&amp;p=1666</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
