Abstract
Text and images are classic ways to do deception because they seem more permanent and believable than direct human interaction. We will call deception in constructed text and media “fakes”. Fake documents and images have played important roles in history. “Operation Mincemeat” of World War II planted fake documents, including things like letters from home and theater tickets as well as some official letters, all suggesting that the British were planning to invade southern Europe rather than Normandy, and the deceptions were effective (Latimer 2003). Fake documents are also important for counterintelligence; if one makes the false information distinctive, it is easy to tell if an adversary has used it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Afroz S, Brennan M, Greenstadt R (2012) Detecting hoaxes, frauds, and deception in online writing style. In: Proceedings of IEEE symposium on security and privacy, Oakland, CA, pp 461–475
Altheide C, Carvey H (2011) Digital forensics with open source tools. Syngress, Waltham MA, US
Amore A (2015) The art of the con: the most notorious fakes, frauds, and forgeries in the art world. St. Martin’s, New York
Bowen B, Hershkop S, Keromytis A, Stolfo SJ (2009) Baiting inside attackers using decoy documents. Proceedings of the ICST conference on security and privacy in communication networks Athens, Greece, September, paper 19
Dang B, Gazet A, Bachaalany E, Josse S (2014) Practical reverse engineering: x86, x64, ARM, Windows kernel, reversing tools, and obfuscation. Wiley, New York
Heiderich M, Nava E, Heyes G, Lindsay D (2010) Web application obfuscation: ‘-/WAFs…Evasion.Filters//alert/Obfuscation/-‘. Syngress, Rockland, MA
Jakobsson M, Myers S (eds) (2006) Phishing and countermeasures: understanding the increasing problem of electronic identity theft. Wiley-Interscience, New York
Kaner C (2003) Liability for defective documentation. In: Proceedings of SIGDOC 2003 conference, San Francisco, CA, US, 12–15 October 2003, pp. 192–197.
Kaza S, Murthy S, Hu G (2003) Identification of deliberately doctored text documents using frequent keyword chain (FKC) model. In: Proceedings of the IEEE international conference on information reuse and integration, Las Vegas, NV. pp 398–405
Kushner D (2003) Digital decoys. IEEE Spectrum 40(5):27
Latimer J (2003) Deception in war; the art of the bluff, the value of deceit, and the most thrilling episodes of cunning in military history, from the Trojan Horse to the Gulf War. The Overlook, New York
Lawson S, McMillan R (2008) FBI worried as DoD sold counterfeit Cisco gear. InfoWorld, May 12
Pennebaker J, Francis M, Booth R (2001) Linguistic inquiry and word count (LIWC). Lawrence Erlbaum, New York
Stolfo S (2012) Software decoys for insider threat. Proceedings of the 7th ACM symposium on information, computer, and communications security, Seoul, Korea, May 2012
Voris J, Boggs N, Stolfo S J (2012) Lost in translation: Improving decoy documents via automated translation. Proceedings of the workshop on research for insider threats, May
Voris J, Jermyn J, Keromytis A D, Stolfo S J (2013) Bait and snitch: defending computer systems with decoys. Proceedings of the cyber infrastructure protection conference, Strategic Studies Institute, September
Whitham B (2013) Canary files: Generating fake files to detect critical data loss from complex computer networks. Proceedings of the 2nd international conference on cyber security, cyber peacefare, and digital forensics, Malaysia, 2013
Yang Y, Mannino M (2012) An experimental comparison of a document deception detection policy using real and artificial deception. ACM Journal of Data and Information Quality 3 (3): 6:1–6:25s
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Fakes. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)