Check Point Certified Security Principles Associate (CCSPA) (#9)

How is bogus information disseminated?

Adversaries sort through trash to find information.
Adversaries use anomalous traffic patterns as indicators of unusual activity. They will employ other methods, such as social engineering, to discover the cause of the noise.
Adversaries use movement patterns as indicators of activity.
Adversaries take advantage of a person's trust and goodwill.
Seemingly, unimportant pieces of data may yield enough information to an adversary, for him to disseminate incorrect information and sound authoritative.