{"id":32436,"date":"2019-12-21T06:48:46","date_gmt":"2019-12-21T06:48:46","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30784\/FBI-Program-Offers-Companies-Data-Protection-Via-Deception.html"},"modified":"2019-12-21T06:48:46","modified_gmt":"2019-12-21T06:48:46","slug":"fbi-program-offers-companies-data-protection-via-deception","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/","title":{"rendered":"FBI Program Offers Companies Data Protection Via Deception"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/12\/GettyImages-1187380978-800x534.jpg\" alt=\"The FBI's IDLE program uses &quot;obfuscated&quot; data to hide real data from hackers and insider threats, making data theft harder and giving security teams a tool to spot illicit access.\"><\/p>\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/12\/GettyImages-1187380978.jpg\" class=\"enlarge-link\" data-height=\"683\" data-width=\"1024\">Enlarge<\/a> <span class=\"sep\">\/<\/span> The FBI&#8217;s IDLE program uses &#8220;obfuscated&#8221; data to hide real data from hackers and insider threats, making data theft harder and giving security teams a tool to spot illicit access.<\/div>\n<div class=\"caption-credit\">Getty Images<\/div>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\">\n<h4 class=\"comment-count-before\"><a title=\"24 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/12\/not-so-idle-hands-fbi-program-offers-companies-data-protection-via-deception\/?comments=1\">reader comments<\/a><\/h4>\n<p><a title=\"24 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/12\/not-so-idle-hands-fbi-program-offers-companies-data-protection-via-deception\/?comments=1\"><span class=\"comment-count-number\">30<\/span> <span class=\"visually-hidden\">with 24 posters participating<\/span><\/a><\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/div>\n<\/aside>\n<p>The Federal Bureau of Investigations is in many ways on the front lines of the fight against both cybercrime and cyber-espionage in the US. These days, the organization responds to everything from ransomware attacks to data thefts by foreign government-sponsored hackers. But the FBI has begun to play a role in the defense of networks <em>before<\/em> attacks have been carried out as well, forming partnerships with some companies to help prevent the loss of critical data.<\/p>\n<p>Sometimes, that involves field agents proactively contacting companies when they have information of a threat\u2014as two FBI agents did when they caught wind of <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/03\/50-shades-of-greyhat-a-study-in-how-not-to-handle-security-disclosures\/\">researchers trying to alert casinos of vulnerabilities they said they had found in casino kiosk systems<\/a>. &#8220;We have agents in every field office spending a large amount of time going out to companies in their area of responsibility establishing relationships,&#8221; Long T. Chu, acting assistant section chief for the FBI&#8217;s Cyber Engagement and Intelligence Section, told Ars. &#8220;And this is really key right now\u2014before there&#8217;s a problem, providing information to help these companies prepare their defenses. And we try to provide as specific information as we can.&#8221;<\/p>\n<p>But the FBI is not stopping its consultative role at simply alerting companies to threats. An FBI flyer shown to Ars by a source broadly outlined a new program aimed at helping companies fight data theft &#8220;caused by an insider with illicit access (or systems administrator), or by a remote cyber actor.&#8221; The program, called IDLE (Illicit Data Loss Exploitation), does this by creating &#8220;decoy data that is used to confuse illicit\u2026 collection and end use of stolen data.&#8221; It&#8217;s a form of defensive deception\u2014or as officials would prefer to refer to it, obfuscation\u2014that the FBI hopes will derail all types of attackers, particularly advanced threats from outside and inside the network.<\/p>\n<h2>Going proactive<\/h2>\n<p><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/12\/fbi_pin.jpg\" class=\"enlarge\" data-height=\"604\" data-width=\"813\" alt=\"A recent FBI Private Industry Notification (PIN) warned of social engineering attacks targeting two-factor authentication.\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/12\/fbi_pin-640x475.jpg\" width=\"640\" height=\"475\" srcset=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/12\/fbi_pin.jpg 2x\" alt=\"A recent FBI Private Industry Notification (PIN) warned of social engineering attacks targeting two-factor authentication.\"><\/a><\/p>\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/12\/fbi_pin.jpg\" class=\"enlarge-link\" data-height=\"604\" data-width=\"813\">Enlarge<\/a> <span class=\"sep\">\/<\/span> A recent FBI Private Industry Notification (PIN) warned of social engineering attacks targeting two-factor authentication.<\/div>\n<p>In a discussion about the FBI&#8217;s overall philosophy on fighting cybercrime, Chu told Ars that the FBI is &#8220;taking more of a holistic approach&#8221; these days. Instead of reacting to specific events or criminal actors, he said, &#8220;we&#8217;re looking at cyber crime from a key services aspect&#8221;\u2014aka, what are the things that cybercriminals target?\u2014&#8221;and how that affects the entire cyber criminal ecosystem. What are the centers of gravity, what are the key services that play into that?&#8221;<\/p>\n<p>In the past, the FBI got involved only when a crime was reported. But today, the new approach means playing more of a consultative role to prevent cybercrime through partnerships with both other government agencies and the private sector. &#8220;If you ever have the opportunity to go to the courtyard at FBI Headquarters, there&#8217;s a quote there. &#8216;The most effective weapon against crime is cooperation, the efforts of all law enforcement and the support and understanding of the American people.&#8217; That can not be more true today, but it expands from beyond just law enforcement to the private sector,&#8221; Chu said. &#8220;That&#8217;s because we&#8217;re facing one of the greatest threats that our nation has ever faced, arguably, and that&#8217;s the cyber threat.&#8221;<\/p>\n<p>An example of that sort of outreach was visible in a case Ars reported on in March\u2014that of <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/03\/50-shades-of-greyhat-a-study-in-how-not-to-handle-security-disclosures\/\">the casino kiosk vendor Atrient<\/a>. FBI Las Vegas field office and FBI Cyber Division agents picked up on Twitter posts about an alleged vulnerability in Atrient&#8217;s infrastructure, and the agents connected the company and an affected customer with the researchers to resolve the issue (which, in Atrient&#8217;s case at least, went somewhat awry). But in these situations, the FBI now also shares information it gathers from other sources, including data gathered from ongoing investigations.<\/p>\n<p>Sharing happens a lot faster, Chu said, when there&#8217;s a &#8220;preexisting relationship with our partners, so we know exactly who we need to call and vice versa.&#8221; And information flows faster when it goes both ways. &#8220;Just as we&#8217;re trying hard to get the private industry information as fast as possible, it&#8217;d be a lot more effective if we&#8217;re getting information from the private industry as well,&#8221; he said. Exchanging information about IP addresses, indicators of compromise, and other threat data allows the FBI to aggregate the data, &#8220;run that against our databases and all our resources, and come up with a much stronger case, so to speak, against our adversaries,&#8221; Chu noted, &#8220;along with trying to attribute or identify who did it will prevent further attacks from happening.&#8221;<\/p>\n<p>Some information sharing takes the form of collaboration with industry information sharing and analysis centers (ISACs) and &#8220;Flash&#8221; and &#8220;Private Industry Notice&#8221; (PIN) alerts on cybercrime issues. And to build more direct relationships with companies&#8217; security executives, the FBI also offers a &#8220;CISO Academy&#8221; for chief information security officers twice a year at the FBI Academy in Quantico, Virginia. Attendees are indoctrinated on the FBI&#8217;s investigation approaches, and they learn what kind of evidence needs to be preserved to help spur investigations forward.<\/p>\n<p>But for some sectors of particular interest, the FBI is now trying to get a deeper level of collaboration going\u2014especially with companies in the defense industry base (DIB) and other critical infrastructure industries. The FBI sees these areas as crucial industry-spanning networks, and it hopes to build a defense in-depth against cyber-espionage, intellectual property theft, and exposure of other data that could be used particularly by other nations in a way that could impact national security or the economy.<br \/>That&#8217;s precisely where IDLE comes in.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30784\/FBI-Program-Offers-Companies-Data-Protection-Via-Deception.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32437,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8355],"class_list":["post-32436","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusafraudfbi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FBI Program Offers Companies Data Protection Via Deception 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FBI Program Offers Companies Data Protection Via Deception 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-21T06:48:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/fbi-program-offers-companies-data-protection-via-deception.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"FBI Program Offers Companies Data Protection Via Deception\",\"datePublished\":\"2019-12-21T06:48:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/\"},\"wordCount\":983,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/fbi-program-offers-companies-data-protection-via-deception.jpg\",\"keywords\":[\"headline,government,usa,fraud,fbi\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/\",\"name\":\"FBI Program Offers Companies Data Protection Via Deception 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/fbi-program-offers-companies-data-protection-via-deception.jpg\",\"datePublished\":\"2019-12-21T06:48:46+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/fbi-program-offers-companies-data-protection-via-deception.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/fbi-program-offers-companies-data-protection-via-deception.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-program-offers-companies-data-protection-via-deception\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,fraud,fbi\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusafraudfbi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"FBI Program Offers Companies Data Protection Via Deception\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FBI Program Offers Companies Data Protection Via Deception 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/","og_locale":"en_US","og_type":"article","og_title":"FBI Program Offers Companies Data Protection Via Deception 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-21T06:48:46+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/fbi-program-offers-companies-data-protection-via-deception.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"FBI Program Offers Companies Data Protection Via Deception","datePublished":"2019-12-21T06:48:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/"},"wordCount":983,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/fbi-program-offers-companies-data-protection-via-deception.jpg","keywords":["headline,government,usa,fraud,fbi"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/","url":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/","name":"FBI Program Offers Companies Data Protection Via Deception 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/fbi-program-offers-companies-data-protection-via-deception.jpg","datePublished":"2019-12-21T06:48:46+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/fbi-program-offers-companies-data-protection-via-deception.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/fbi-program-offers-companies-data-protection-via-deception.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fbi-program-offers-companies-data-protection-via-deception\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,fraud,fbi","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusafraudfbi\/"},{"@type":"ListItem","position":3,"name":"FBI Program Offers Companies Data Protection Via Deception"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32436"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32436\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32437"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}