skipkent tips a story at Wired's Danger Room, according to which "Pentagon-funded researchers have come up with a new plan for busting leakers: Spot them by how they search, and then entice the secret-spillers with decoy documents that will give them away. Computer scientists call it it 'Fog Computing' — a play on today's cloud computing craze. And in a recent paper for Darpa, the Pentagon's premiere research arm, researchers say they've built 'a prototype for automatically generating and distributing believable misinformation and then tracking access and attempted misuse of it. We call this "disinformation technology."'"
Attend or create a Slashdot 20th anniversary party! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×