Skip to main content

Fakes

  • Chapter
  • First Online:
Introduction to Cyberdeception
  • 1452 Accesses

Abstract

Text and images are classic ways to do deception because they seem more permanent and believable than direct human interaction. We will call deception in constructed text and media “fakes”. Fake documents and images have played important roles in history. “Operation Mincemeat” of World War II planted fake documents, including things like letters from home and theater tickets as well as some official letters, all suggesting that the British were planning to invade southern Europe rather than Normandy, and the deceptions were effective (Latimer 2003). Fake documents are also important for counterintelligence; if one makes the false information distinctive, it is easy to tell if an adversary has used it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Afroz S, Brennan M, Greenstadt R (2012) Detecting hoaxes, frauds, and deception in online writing style. In: Proceedings of IEEE symposium on security and privacy, Oakland, CA, pp 461–475

    Google Scholar 

  • Altheide C, Carvey H (2011) Digital forensics with open source tools. Syngress, Waltham MA, US

    Book  Google Scholar 

  • Amore A (2015) The art of the con: the most notorious fakes, frauds, and forgeries in the art world. St. Martin’s, New York

    Google Scholar 

  • Bowen B, Hershkop S, Keromytis A, Stolfo SJ (2009) Baiting inside attackers using decoy documents. Proceedings of the ICST conference on security and privacy in communication networks Athens, Greece, September, paper 19

    Google Scholar 

  • Dang B, Gazet A, Bachaalany E, Josse S (2014) Practical reverse engineering: x86, x64, ARM, Windows kernel, reversing tools, and obfuscation. Wiley, New York

    Google Scholar 

  • Heiderich M, Nava E, Heyes G, Lindsay D (2010) Web application obfuscation: ‘-/WAFs…Evasion.Filters//alert/Obfuscation/-‘. Syngress, Rockland, MA

    Google Scholar 

  • Jakobsson M, Myers S (eds) (2006) Phishing and countermeasures: understanding the increasing problem of electronic identity theft. Wiley-Interscience, New York

    Google Scholar 

  • Kaner C (2003) Liability for defective documentation. In: Proceedings of SIGDOC 2003 conference, San Francisco, CA, US, 12–15 October 2003, pp. 192–197.

    Google Scholar 

  • Kaza S, Murthy S, Hu G (2003) Identification of deliberately doctored text documents using frequent keyword chain (FKC) model. In: Proceedings of the IEEE international conference on information reuse and integration, Las Vegas, NV. pp 398–405

    Google Scholar 

  • Kushner D (2003) Digital decoys. IEEE Spectrum 40(5):27

    Article  Google Scholar 

  • Latimer J (2003) Deception in war; the art of the bluff, the value of deceit, and the most thrilling episodes of cunning in military history, from the Trojan Horse to the Gulf War. The Overlook, New York

    Google Scholar 

  • Lawson S, McMillan R (2008) FBI worried as DoD sold counterfeit Cisco gear. InfoWorld, May 12

    Google Scholar 

  • Pennebaker J, Francis M, Booth R (2001) Linguistic inquiry and word count (LIWC). Lawrence Erlbaum, New York

    Google Scholar 

  • Stolfo S (2012) Software decoys for insider threat. Proceedings of the 7th ACM symposium on information, computer, and communications security, Seoul, Korea, May 2012

    Google Scholar 

  • Voris J, Boggs N, Stolfo S J (2012) Lost in translation: Improving decoy documents via automated translation. Proceedings of the workshop on research for insider threats, May

    Google Scholar 

  • Voris J, Jermyn J, Keromytis A D, Stolfo S J (2013) Bait and snitch: defending computer systems with decoys. Proceedings of the cyber infrastructure protection conference, Strategic Studies Institute, September

    Google Scholar 

  • Whitham B (2013) Canary files: Generating fake files to detect critical data loss from complex computer networks. Proceedings of the 2nd international conference on cyber security, cyber peacefare, and digital forensics, Malaysia, 2013

    Google Scholar 

  • Yang Y, Mannino M (2012) An experimental comparison of a document deception detection policy using real and artificial deception. ACM Journal of Data and Information Quality 3 (3): 6:1–6:25s

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). Fakes. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics