Canary trap
   HOME

TheInfoList



OR:

A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false statement, to see whether sensitive information gets out to other people as well. Special attention is paid to the quality of the prose of the unique language, in the hopes that the suspect will repeat it verbatim in the leak, thereby identifying the version of the document. The term was coined by
Tom Clancy Thomas Leo Clancy Jr. (April 12, 1947 â€“ October 1, 2013) was an American novelist. He is best known for his technically detailed espionage and military-science storylines set during and after the Cold War. Seventeen of his novels have b ...
in his novel ''
Patriot Games ''Patriot Games'' is a thriller novel, written by Tom Clancy and published in July 1987. '' Without Remorse'', released six years later, is an indirect prequel, and it is chronologically the first book featuring Jack Ryan, the main character i ...
'', although Clancy did not invent the technique. The actual method (usually referred to as a barium meal test in espionage circles) has been used by intelligence agencies for many years. The fictional character Jack Ryan describes the technique he devised for identifying the sources of leaked classified documents:
Each summary paragraph has six different versions, and the mixture of those paragraphs is unique to each numbered copy of the paper. There are over a thousand possible permutations, but only ninety-six numbered copies of the actual document. The reason the summary paragraphs are so lurid is to entice a reporter to quote them verbatim in the public media. If he quotes something from two or three of those paragraphs, we know which copy he saw and, therefore, who leaked it.
A refinement of this technique uses a thesaurus program to shuffle through synonyms, thus making every copy of the document unique.


Known canary trap cases

Following the troubled production of '' Star Trek: The Motion Picture'' in the late 1970s,
Paramount Pictures Paramount Pictures Corporation is an American film and television production company, production and Distribution (marketing), distribution company and the main namesake division of Paramount Global (formerly ViacomCBS). It is the fifth-oldes ...
effectively replaced
Gene Roddenberry Eugene Wesley Roddenberry Sr. (August 19, 1921 – October 24, 1991) was an American television screenwriter, producer, and creator of '' Star Trek: The Original Series'', its sequel spin-off series '' Star Trek: The Animated Series,'' and '' ...
as producer of further movies in the franchise with
Harve Bennett Harve Bennett (born Harve Bennett Fischman; August 17, 1930 – February 25, 2015) was an American television and film producer and screenwriter. Early years Bennett was born to a Jewish family in Chicago, Illinois in 1930, the son of Kathryn (n ...
. Roddenberry was retained as an "executive consultant", due to the high regard the series' fans held him in; while he had little real authority he was still kept involved in the creative process. The fans often complained about particular plot developments proposed for the films, such as the death of
Spock Spock is a fictional character in the ''Star Trek'' media franchise. He first appeared in the original ''Star Trek'' series serving aboard the starship USS ''Enterprise'' as science officer and first officer (and Kirk's Second-in-command) and ...
in '' Star Trek II'', that Roddenberry had opposed. So, before any drafts of the screenplay for '' Star Trek III: The Search for Spock'' were circulated, Bennett arranged for each individual copy to have subtle clues distinguishing it from the others. Shortly after Roddenberry opposed the destruction of the ''
Enterprise Enterprise (or the archaic spelling Enterprize) may refer to: Business and economics Brands and enterprises * Enterprise GP Holdings, an energy holding company * Enterprise plc, a UK civil engineering and maintenance company * Enterprise ...
'' at the climax of that film, fans began to complain to Paramount and Bennett. He found that a leaked copy of the script was the one given to Roddenberry, but was unable to do anything about it. After a series of leaks at Tesla Motors in 2008, CEO
Elon Musk Elon Reeve Musk ( ; born June 28, 1971) is a business magnate and investor. He is the founder, CEO and chief engineer of SpaceX; angel investor, CEO and product architect of Tesla, Inc.; owner and CEO of Twitter, Inc.; founder of The B ...
reportedly sent slightly different versions of an e-mail to each employee in an attempt to reveal potential leakers. The e-mail was disguised as a request to employees to sign a new
non-disclosure agreement A non-disclosure agreement (NDA) is a legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wis ...
. The plan was undermined when the company's general counsel forwarded his own unique version of the e-mail with the attached agreement. As a result, Musk's scheme was realized by employees who now had a safe copy to leak. In October 2019, British celebrity
Coleen Rooney Coleen Mary Rooney ( McLoughlin; born 3 April 1986) is the wife of former English footballer Wayne Rooney. She is also a former television personality. Early life and family Coleen Mary McLoughlin was born in Liverpool, Merseyside, to Tony an ...
used the technique to identify who was leaking information from her private
Instagram Instagram is a photo and video sharing social networking service owned by American company Meta Platforms. The app allows users to upload media that can be edited with filters and organized by hashtags and geographical tagging. Posts can ...
stories to tabloid newspaper '' The Sun'' by posting fake stories which were blocked to all but one account. When these details appeared in the press, she publicly identified the leaks as coming from the account of Rebekah Vardy, wife of footballer
Jamie Vardy Jamie Richard Vardy ('' né'' Gill; born 11 January 1987) is an English professional footballer who plays as a striker for club Leicester City. Regarded as one of the best strikers in the world, Vardy is known for his prolific goalscoring aide ...
. The subsequent libel trial became known as the
Wagatha Christie ''Rebekah Vardy v Coleen Rooney'', which is popularly known as the Wagatha Christie trial, was a libel case between Rebekah Vardy and Coleen Rooney, two British wives of footballers (WAGs). The dispute began in 2019, when Rooney accused Vardy ...
case. In December 2020,
Andrew Lewer Andrew Iain Lewer (born 18 July 1971 in Burnley, Lancashire) is a British Conservative Party politician. Elected as the Member of Parliament for Northampton South in the 2017 general election, he previously served as Member of the European Pa ...
, a Member of Parliament and
Parliamentary Private Secretary A Parliamentary Private Secretary (PPS) is a Member of Parliament (MP) in the United Kingdom who acts as an unpaid assistant to a minister or shadow minister. They are selected from backbench MPs as the 'eyes and ears' of the minister in the ...
in the UK government, was fired after a canary trap in the form of a letter reminding staff not to leak was published on the website ''
Guido Fawkes Guido Fawkes is a right-wing political website published by British-Irish political blogger Paul Staines. History In September 2004, Staines began writing an anonymous blog about British politics under the name of Guido Fawkes, an alternative ...
''.


Barium meal test

According to the book ''
Spycatcher ''Spycatcher: The Candid Autobiography of a Senior Intelligence Officer'' (1987) is a memoir written by Peter Wright, former MI5 officer and Assistant Director, and co-author Paul Greengrass. He drew on his own experiences and research in ...
'' by Peter Wright (published in 1987), the technique is standard practice that has been used by
MI5 The Security Service, also known as MI5 ( Military Intelligence, Section 5), is the United Kingdom's domestic counter-intelligence and security agency and is part of its intelligence machinery alongside the Secret Intelligence Service (MI6), G ...
(and other intelligence agencies) for many years, under the name "
barium meal An upper gastrointestinal series, also called a barium swallow, barium study, or barium meal, is a series of radiographs used to examine the gastrointestinal tract for abnormalities. A contrast medium, usually a radiocontrast agent such as ba ...
test". A barium meal test is more sophisticated than a canary trap because it is flexible and may take many different forms. However, the basic premise is to reveal a supposed secret to a suspected enemy (but nobody else) then monitor whether there is evidence of the fake information being utilised by the other side. For example, a suspected double agent could be offered some tempting "bait": e.g., be told that important information was stored at a
dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals c ...
site. The fake dead drop site could then be periodically checked for signs of disturbance. If the site showed signs of being disturbed (for instance, in order to copy microfilm stored there), then this would confirm that the suspected enemy really was an enemy, i.e., a double agent.


Embedding information

The technique of embedding significant information in a hidden form in a medium has been used in many ways, which are usually classified according to intent: *
Watermark A watermark is an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations ...
s are used to show that items are authentic and not forged. *
Steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
is used to hide a secret message in an apparently innocuous message, in order to escape detection. * A canary trap hides information in a document that uniquely identifies it, so that copies of it can be traced. * Screener versions of DVDs are often marked in some way so as to allow the tracking of unauthorised releases to their source. * As with the ''Star Trek'' incident, major films or television productions frequently give out scripts to the cast and crew in which one or two lines are different in each individual version. Thus if the entire script is copied and leaked to the public, the producers can track down the specific person who leaked the script. In practice this does not prevent generalized information about the script from being leaked, but it does discourage leaking verbatim copies of the script itself. * Trap streets on maps, or intentionally fictitious streets, are sometimes included to track copyright violations by those who might republish copyrighted maps illegally. * Spurious words are sometimes included in dictionaries so as to detect other publishers copying from them. The ''
Oxford English Dictionary The ''Oxford English Dictionary'' (''OED'') is the first and foundational historical dictionary of the English language, published by Oxford University Press (OUP). It traces the historical development of the English language, providing a c ...
'' contains an appendix of such words with which edition of which dictionary first used them and which first duplicated them. * Zero-width spaces are Unicode characters that are not visually rendered. An arbitrary number of these characters can be inserted between the letters of a word. Though they are not visible, they will typically persist even as that word is copied and pasted and transmitted multiple times. This can be used to create persistent, invisible fingerprints in digital text. *
Mailing lists A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The term is often extended to include the people subscribed to such a list, so the group of subscribers is re ...
for purchase are typically seeded with a small number of postal or e-mail addresses that route back to the seller of the list. This is used to detect re-use of the list (typically sold on a per-mailing basis) or resale of the list (usually prohibited).


In popular culture

* The canary trap was used in several of Tom Clancy's novels. Chronologically it first appears in '' Without Remorse'', when a CIA official alters a report given to a senator, revealing an internal leak who was giving information to the KGB. Different versions of the report were given to other suspected leakers. * Barium meals are also administered in Robert Littel's book ''
The Company ''The'' () is a grammatical article in English, denoting persons or things already mentioned, under discussion, implied or otherwise presumed familiar to listeners, readers, or speakers. It is the definite article in English. ''The'' is the m ...
'', and later in the TV miniseries with same name. * The technique (not named) was used in the 1970s BBC television serial ''
1990 File:1990 Events Collage.png, From left, clockwise: The 1990 FIFA World Cup is played in Italy; The Human Genome Project is launched; Voyager I takes the famous Pale Blue Dot image- speaking on the fragility of humanity on Earth, astrophysicis ...
''. The same unnamed technique also appeared in Irving Wallace's book '' The Word'' (1972), and in the 1985
spy novel Spy fiction is a genre of literature involving espionage as an important context or plot device. It emerged in the early twentieth century, inspired by rivalries and intrigues between the major powers, and the establishment of modern intelligen ...
'' London Match'' by
Len Deighton Leonard Cyril Deighton (; born 18 February 1929) is a British author. His publications have included cookery books, history and military history, but he is best known for his spy novels. After completing his national service in the Royal Air ...
. * A variation of the canary trap was used in the film ''
Miami Vice ''Miami Vice'' is an American crime drama television series created by Anthony Yerkovich and produced by Michael Mann (director), Michael Mann for NBC. The series stars Don Johnson as James "Sonny" Crockett and Philip Michael Thomas as Ricardo ...
'', with various rendezvous dates leaked to different groups. * In the third-season finale of ''
The Mentalist ''The Mentalist'' is an American drama television series that ran from September 23, 2008, until February 18, 2015, broadcasting 151 episodes over seven seasons, on CBS. Created by Bruno Heller, who was also its executive producer, the show f ...
'', the characters use a canary trap (giving different hotel room numbers to different suspects) to uncover a mole within their agency. A similar ruse is used in the TV series '' Ashes to Ashes''. * In ''
A Clash of Kings ''A Clash of Kings'' is the second of seven planned novels in ''A Song of Ice and Fire'', an epic fantasy series by American author George R. R. Martin. It was first published on November 16, 1998 in the United Kingdom; the first United States ...
'', the second book in the ''
A Song of Ice and Fire ''A Song of Ice and Fire'' is a series of epic fantasy novels by the American novelist and screenwriter George R. R. Martin. He began the first volume of the series, '' A Game of Thrones'', in 1991, and it was published in 1996. Martin, who i ...
'' series,
Tyrion Lannister Lord Tyrion Lannister, also known by the nicknames the Halfman or the Imp and the alias Hugor Hill, is a fictional character in the ''A Song of Ice and Fire'' series of epic fantasy novels by American author George R. R. Martin, and its televis ...
uses the trap to find out which member of the King's small council is reporting to his sister, the Queen Regent
Cersei Lannister Cersei Lannister is a fictional character in the ''A Song of Ice and Fire'' series of epic fantasy novels by American author George R. R. Martin, and its television adaptation '' Game of Thrones'', where she is portrayed by Bermudan-English act ...
. To the Grand Maester Pycelle, he tells of a plot to marry his niece, Princess Myrcella, to Prince Trystane of the powerful House Martell, from
Dorne The fictional world in which the ''A Song of Ice and Fire'' novels by George R. R. Martin take place is divided into several continents, known collectively as The Known World. Most of the story takes place on the continent of Westeros and in a ...
. To
Littlefinger Petyr Baelish, nicknamed Littlefinger, is a fictional character in the ''A Song of Ice and Fire'' series of fantasy novels by American author George R. R. Martin, and its television adaptation ''Game of Thrones''. Introduced in 1996's ''A Game ...
, he claims he will instead send Myrcella to be raised by
Lysa Arryn George R. R. Martin's '' A Song of Ice and Fire'' saga features a large cast of characters. The series follows three interwoven plotlines: a dynastic war for control of Westeros by several families; the rising threat of the superhuman Others b ...
and married to her son Robert. To Varys, he says his plan is to send his nephew Tommen to the Martells. When Cersei confronts him, and knows only of the plan to send Myrcella to Dorne, Tyrion knows Pycelle to be the leak. ** This plotline is also depicted in "
What Is Dead May Never Die "What Is Dead May Never Die" is the third episode of the second season of HBO's medieval fantasy television series '' Game of Thrones'', first airing on April 15, 2012. The episode is written by Bryan Cogman and directed by Alik Sakharov, who work ...
", during the second season of ''
Game of Thrones ''Game of Thrones'' is an American fantasy drama television series created by David Benioff and D. B. Weiss for HBO. It is an adaptation of '' A Song of Ice and Fire'', a series of fantasy novels by George R. R. Martin, the fir ...
'', the television adaptation of the books. * When distributing the film '' Broken'' to friends,
Trent Reznor Michael Trent Reznor (born May 17, 1965) is an American musician, singer, songwriter, record producer, and composer. He serves as the lead vocalist, multi-instrumentalist, and principal songwriter of the industrial rock band Nine Inch Nails, wh ...
claims that he watermarked the tapes with dropouts at certain points so that he could identify if a leak would surface. * In the film '' The Heat'' starring Melissa McCarthy and Sandra Bullock, a canary trap is employed by a drug ring to decide the loyalty of a returning member who is detective Mullins' brother. * In ''Han Solo at Stars' End'', the first book in ''
The Han Solo Adventures ''The Han Solo Adventures'' is a trilogy of novels set in the '' Star Wars'' fictional universe by American science-fiction novelist Brian Daley. It follows the smuggling days of Han Solo and Chewbacca two years before the events of the origin ...
'', the title character uses a canary trap to find a traitor and murderer among his passengers. He tells each that their target is a different planet, all false, knowing that the traitor would have learned the real destination when they killed the group's leader.


See also

* * * * * * * *


References


External links


Fingerprinting
gives a good overview of different kinds of canary trap techniques.
EFF.org DocuColor Tracking Dot Decoding Guide
How to read the date, time, and printer serial number from forensic tracking codes in a Xerox DocuColor color laser printout. {{Espionage Espionage techniques Steganography Data protection Watermarking