Article 4WVAM Not so IDLE hands: FBI program offers companies data protection via deception

Not so IDLE hands: FBI program offers companies data protection via deception

by
Sean Gallagher
from Ars Technica - All content on (#4WVAM)
GettyImages-1187380978-800x534.jpg

Enlarge / The FBI's IDLE program uses "obfuscated" data to hide real data from hackers and insider threats, making data theft harder and giving security teams a tool to spot illicit access. (credit: Getty Images)

The Federal Bureau of Investigations is in many ways on the front lines of the fight against both cybercrime and cyber-espionage in the US. These days, the organization responds to everything from ransomware attacks to data thefts by foreign government-sponsored hackers. But the FBI has begun to play a role in the defense of networks before attacks have been carried out as well, forming partnerships with some companies to help prevent the loss of critical data.

Sometimes, that involves field agents proactively contacting companies when they have information of a threat-as two FBI agents did when they caught wind of researchers trying to alert casinos of vulnerabilities they said they had found in casino kiosk systems. "We have agents in every field office spending a large amount of time going out to companies in their area of responsibility establishing relationships," Long T. Chu, acting assistant section chief for the FBI's Cyber Engagement and Intelligence Section, told Ars. "And this is really key right now-before there's a problem, providing information to help these companies prepare their defenses. And we try to provide as specific information as we can."

But the FBI is not stopping its consultative role at simply alerting companies to threats. An FBI flyer shown to Ars by a source broadly outlined a new program aimed at helping companies fight data theft "caused by an insider with illicit access (or systems administrator), or by a remote cyber actor." The program, called IDLE (Illicit Data Loss Exploitation), does this by creating "decoy data that is used to confuse illicit" collection and end use of stolen data." It's a form of defensive deception-or as officials would prefer to refer to it, obfuscation-that the FBI hopes will derail all types of attackers, particularly advanced threats from outside and inside the network.

Read 22 remaining paragraphs | Comments

index?i=96OnNBs6PUk:9hchy0GaSJI:V_sGLiPB index?i=96OnNBs6PUk:9hchy0GaSJI:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments