Many years ago, I think it was back in the year 2000 – I had come up with a scheme to bait red hatter hackers with decoy systems in government, military and corporate facilities. If you are you looking for more info about prohactive.com have a look at our web site.
Making the hackers think they’d gotten into the system, then simply watch where they go, what they do, and how they do it. No, I’m hardly the first person to consider this, using decoys in warfare has been talked about since the days of Sun Tzu. This is just taking a modern day spin on the topic. Trust me when I tell you this has been done in human wars or thousands of years in various forms.
Having the operational intelligence of knowing where a foreign hacking Army is trying to exploit your IT systems is of extreme value. At the Las Vegas hacker convention in 2013 there was a speech given by a gentleman who reiterated something that a governor had said at the national Governors’ convention, he explained that it may be impossible to 100% protect all of our IT data and information, but if we could protect 99% of it we’d be well on our way to eliminate most all of the hacking exploits.
It would make the cost of hacking extremely expensive for foreign hacking armies, and they wouldn’t be able to use their “B-game players” meaning they would have to pay to hire and train the best, and there are a limited number of people with the intelligence to pull off hacking at that highest level – that to me makes a lot of sense, but let’s talk about this further shall we?
You see, there was an interesting article in MIT Technology News on August 2, 2013 titled; “Chinese Hacking Team Caught Taking Over Decoy Water Plant – A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems,” by Tom Simonite.
It turns out this strategy works extremely well, and either China has to come clean, up its game, or deal with the consequences. Knowing that their hackers might be being watched will cause them to tread more carefully, thus slowing them down, and it will also mean that they will not want any of their less than super genius IQ level hackers involved in the process.