Lawful Cyber Decoy Policy

Loading...
Thumbnail Image
Authors
Michael, James Bret
Wingfield, Thomas C.
Subjects
Deception
Law
Computer security
Advisors
Date of Issue
2013
Date
2013
Publisher
Language
Abstract
Cyber decoys provide a means for automating, to a degree, counterintelligence activities and responses to cyber attacks. Like other security mechanisms for protecting information systems, it is likely that cyber decoys will in some instances be misused. In the United States, criminal law provides us with analogies for preventing or punishing improper state use of deception, and criminal and civil law give us a range of tools to use against private actors. However, in addition to states, nongovernmental entities and individuals can employ cyber decoys. In this paper we present a principled analysis of the use of cyher decoys. We explore the absolute minima in terms of customary principles for what might be considered to be acceptable use of deception.
Type
Book Chapter
Description
The article of record as published may be found a http://doi.org/10.1007/978-0-387-35691-4_50
Series/Report No
Department
Computer Science (CS)
Organization
Naval Postgraduate School (U.S.)
Identifiers
NPS Report Number
Sponsors
U.S. Department of Justice Office of Justice Programs and Office of Domestic Preparedness
Funder
Format
6 p.
Citation
Michael, James Bret, and Thomas C. Wingfield. "Lawful cyber decoy policy." IFIP International Information Security Conference. Springer, Boston, MA, 2003.
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections