Joint Task Force Olympics : monitoring potential terrorists behavior via deceptive computer means
Zodda, Daniel J.
Iatrou, Steven J.
MetadataShow full item record
The purpose of this thesis is to deploy tactical deception via a public website. The perception is to have the website be a supportive tool for the Joint Task Force Olympics. In actuality, it will be used to collect various data from those who attempt to access the site. The goal is not to implement a secure, impenetrable computer site or to capture hackers. On the contrary, the preference is to entice individuals or groups to enter the site and study its contents in the hope that we may discover why and from where they have accessed this site, and what files or directories allured them. The objective is to implement a successful deception by following the guidelines of the JP 3-58, Joint Doctrine for Military Deception, which contributes to the successful achievement of military objectives. The deception is focused on people researching information on the Internet for potential terrorist use. Although there are many threats to national security, terrorism is currently the most deadly of threats using one of the most trusted monitors: the Internet. There exists a relationship between the Internet and terrorism, and this thesis intends to exploit it with.
Showing items related by title, author, creator and subject.
West, Austin (Monterey, California: Naval Postgraduate School, 2015-03);Every day, adversaries bombard Department of Defense computer networks with scanning traffic in order to gather information about the target network. This reconnaissance is typically a precursor to attacks designed to ...
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2006);Deception is a frequent but underappreciated aspect of human society (Eckman, 2001). Deception in electronic goods and services is facilitated by the difficulty of verifying details in the limited information available in ...
Goh, Han Chong (Monterey, California. Naval Postgraduate School, 2007-03);We investigate deception in response to cyber-intrusion or trespassing on computer systems. We present a Response Framework that categorizes the types of response we can employ against intruders and show how "intrusion ...