Our departing top cyber official reflects on how the FBI has adapted to an evolving threat. Shawn Henry is executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch. He served as assistant director of the Cyber Division from September 2008 to January 2010, Note: Shawn Henry retired from the FBI on March 31, 2012.
This is an excellent interview with Shawn Henry describing todays cyber actors
Other applications of cloaking other than hiding information during transmission, is the hiding of communication source location(s); knowing where the communications are happening is a real threat for communicators. Spatial cloaking, ability to hide physical objects, in this instance loosely used, provides the ability to keep peer-to-peer (P2P) communication sources anonymous with regards to geographic constraints; however, temporal cloaking is also employed to hide a person's whereabouts during specified times.
Although quite dated, this reference provides the great disparity of what was thought to be cloaking in 2007 vs. in the present time. The article describes in some detail the need and proposed process for protecting WEP encryption for legacy devices in the protection of credit card users.
The process of temporal cloaking is better understood as written by this author. The invention of this technological advance dates back to 2012 by researches from Purdue University while Joseph Lukens, Daniel leaird and Andrew Weiner researched and achieved the capability using off-the-shelf technology commonly used commercial optical communications vs. complex, ultrafast-pulsing lasers. The researchers discovered that manipulating the timing of light pulse propagation causes a phase inversion of the light or zeroing (canceling the light intensity). The zero region is the hole where there is nothing; any data that is placed in the zero region would be cloaked.
The authors describe the most recent interactions with temporal cloaking and how it hides events in time altered spatial gaps that are not detected. The thought is that data can be hidden in the gaps, and thus providing a practical method for securing information during transmissions.
White paper describing impacts and benefits to new technologies and the requirments and pressures for organizations to implement them (Cyber nightmare?)