CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◉ Threat Intelligence

Using deception to extract cyber threat intelligence

Intel 471 Archived Mar 17, 2026 ✓ Full text saved

Tim Pappa is a former FBI supervisory special agent who specializes in deception techniques. In this Studio 471, he discusses what threat intelligence can be gained using deception and how organizations can structure scalable programs.

Full text archived locally
✦ AI Summary · Claude Sonnet


    Using deception to extract cyber threat intelligence Cyber deception involves various techniques to manipulate adversaries, whether it’s baiting them with fake resources or trapping them in frustrating loops. Tim Pappa is a former FBI supervisory special agent who specializes in deception techniques. In this Studio 471, Tim discusses what kinds of threat intelligence can be gained from deception techniques, its limitations, the Bell-Whaley framework and how organizations can start their own scalable deception programs. Participants: Tim Pappa, Incident Response Engineer - Cyber Deception Strategy, Content Development and Marketing, Wal-Mart Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471
    💬 Team Notes
    Article Info
    Source
    Intel 471
    Category
    ◉ Threat Intelligence
    Published
    Archived
    Mar 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗