A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false statement, to see whether sensitive information gets out to other people as well. Special attention is paid to the quality of the prose of the unique language, in the hopes that the suspect will repeat it verbatim in the leak, thereby identifying the version of the document.
The term was coined by
Tom Clancy
Thomas Leo Clancy Jr. (April 12, 1947 – October 1, 2013) was an American novelist. He is best known for his technically detailed espionage and military science, military-science storylines set during and after the Cold War. Seventeen of ...
in his novel ''
Patriot Games
''Patriot Games'' is a thriller novel, written by Tom Clancy and published in July 1987. '' Without Remorse'', released six years later, is an indirect prequel, and it is chronologically the first book featuring Jack Ryan, the main character ...
'', although Clancy did not invent the technique. The actual method (usually referred to as a barium meal test in espionage circles) has been used by intelligence agencies for many years. The fictional character
Jack Ryan describes the technique he devised for identifying the sources of leaked classified documents:
Each summary paragraph has six different versions, and the mixture of those paragraphs is unique to each numbered copy of the paper. There are over a thousand possible permutations, but only ninety-six numbered copies of the actual document. The reason the summary paragraphs are so lurid is to entice a reporter to quote them verbatim in the public media. If he quotes something from two or three of those paragraphs, we know which copy he saw and, therefore, who leaked it.
A refinement of this technique uses a thesaurus program to shuffle through synonyms, thus making every copy of the document unique.
Barium meal test
According to the book ''
Spycatcher
''Spycatcher: The Candid Autobiography of a Senior Intelligence Officer'' (1987) is a memoir written by Peter Wright, former MI5 officer and assistant director, and co-author Paul Greengrass. Wright drew on his experiences and research into ...
'' by
Peter Wright (published in 1987), the technique is standard practice that has been used by
MI5
MI5 ( Military Intelligence, Section 5), officially the Security Service, is the United Kingdom's domestic counter-intelligence and security agency and is part of its intelligence machinery alongside the Secret Intelligence Service (MI6), Gov ...
(and other intelligence agencies) for many years, under the name "barium meal test", named for the
medical procedure
A medical procedure is a course of action intended to achieve a result in the delivery of healthcare.
A medical procedure with the intention of determining, measuring, or diagnosis, diagnosing a patient condition or parameter is also called a medi ...
. A barium meal test is more sophisticated than a canary trap because it is flexible and may take many different forms. However, the basic premise is to reveal a supposed secret to a suspected enemy (but nobody else) then monitor whether there is evidence of the fake information being utilized by the other side. For example, a suspected double agent could be offered some tempting "bait": e.g., be told that important information was stored at a
dead drop
A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) via a secret location. By avoiding direct meetings, individuals can ...
site. The fake dead drop site could then be periodically checked for signs of disturbance. If the site showed signs of being disturbed (for instance, in order to copy microfilm stored there), then this would confirm that the suspected enemy really was an enemy, i.e., a double agent.
Embedding information
The technique of embedding significant information in a hidden form in a medium has been used in many ways, which are usually classified according to intent:
*
Watermark
A watermark is an identifying image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness or density variations i ...
s are used to show that items are authentic and not forged.
*
Steganography
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
is used to hide a secret message in an apparently innocuous message, in order to escape detection.
* A canary trap hides information in a document that uniquely identifies it, so that copies of it can be traced.
*
Screener versions of DVDs are often marked in some way so as to allow the tracking of unauthorised releases to their source.
* As with the ''Star Trek'' incident, major films or television productions frequently give out scripts to the cast and crew in which one or two lines are different in each individual version. Thus if the entire script is copied and leaked to the public, the producers can track down the specific person who leaked the script. In practice this does not prevent generalized information about the script from being leaked, but it does discourage leaking verbatim copies of the script itself.
*
Trap street
In cartography, a trap street is a fictitious entry in the form of a misrepresented street on a map, often outside the area the map nominally covers, for the purpose of "trapping" potential plagiarists of the map who, if caught, would be unable ...
s on maps, or intentionally fictitious streets, are sometimes included to track copyright violations by those who might republish copyrighted maps illegally.
*
Spurious words are sometimes included in dictionaries so as to detect other publishers copying from them. The ''
Oxford English Dictionary
The ''Oxford English Dictionary'' (''OED'') is the principal historical dictionary of the English language, published by Oxford University Press (OUP), a University of Oxford publishing house. The dictionary, which published its first editio ...
'' contains an appendix of such words with which edition of which dictionary first used them and which first duplicated them.
*
Zero-width spaces are Unicode characters that are not visually rendered. An arbitrary number of these characters can be inserted between the letters of a word. Though they are not visible, they will typically persist even as that word is copied and pasted and transmitted multiple times. This can be used to create persistent, invisible fingerprints in digital text.
*
Mailing lists for purchase are typically seeded with a small number of postal or email addresses that route back to the seller of the list. This is used to detect reuse of the list (typically sold on a per-mailing basis) or resale of the list (usually prohibited).
*
Email aliases can be used when creating accounts to provide an email address specific to that entity so that if the address starts getting spam or is found in a
data breach
A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information".
Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There ...
, it can be traced back to the source. Like with the Star Trek incident, there isn't much that can be done about it post-hoc other than to know the source of the leak, the address is already being spammed, but in some cases, it might be important to know the source in case of a lawsuit for selling data or to fix the security weaknesses that led to a hack.
*
Karaoke
is a type of interactive entertainment system usually offered in nightclubs and bars, where people sing along to pre-recorded accompaniment using a microphone.
Its musical content is an instrumental rendition of a well-known popular song. I ...
tracks sometimes include altered lyrics to demonstrate plagiarism between karaoke track making companies.
Known canary trap cases
Following the troubled production of ''
Star Trek: The Motion Picture'' in the late 1970s,
Paramount Pictures
Paramount Pictures Corporation, commonly known as Paramount Pictures or simply Paramount, is an American film production company, production and Distribution (marketing), distribution company and the flagship namesake subsidiary of Paramount ...
effectively replaced
Gene Roddenberry
Eugene Wesley Roddenberry Sr. (August 19, 1921 – October 24, 1991) was an American television screenwriter and producer who created the science fiction series and fictional universe ''Star Trek.'' Born in El Paso, Texas, Roddenberry grew up ...
as producer of
further movies in the
franchise with
Harve Bennett
Harve Bennett (born Harvard Bennett Fischman; August 17, 1930 – February 25, 2015) was an American television and film producer and screenwriter.
Early years
Bennett was born to a Jewish family in Chicago, Illinois, in 1930, the son of Kathry ...
. Roddenberry was retained as an "executive consultant", due to the high regard the series' fans held him in; while he had little real authority he was still kept involved in the creative process. The fans often complained about particular plot developments proposed for the films, such as the death of
Spock
Spock is a fictional Character (arts), character in the ''Star Trek'' media franchise. He first appeared in the Star Trek: The Original Series, original ''Star Trek'' series serving aboard the starship USS Enterprise (NCC-1701), USS ''Enterpri ...
in ''
Star Trek II'', that Roddenberry had opposed. So, before any drafts of the screenplay for ''
Star Trek III: The Search for Spock'' were circulated, Bennett arranged for each individual copy to have subtle clues distinguishing it from the others. Shortly after Roddenberry opposed the destruction of the ''
Enterprise
Enterprise (or the archaic spelling Enterprize) may refer to:
Business and economics
Brands and enterprises
* Enterprise GP Holdings, an energy holding company
* Enterprise plc, a UK civil engineering and maintenance company
* Enterpris ...
'' at the climax of that film, fans began to complain to Paramount and Bennett. He found that a leaked copy of the script was the one given to Roddenberry, but was unable to do anything about it.
After a series of leaks at
Tesla Motors
Tesla, Inc. ( or ) is an American multinational automotive and clean energy company. Headquartered in Austin, Texas, it designs, manufactures and sells battery electric vehicles (BEVs), stationary battery energy storage devices from hom ...
in 2008, CEO
Elon Musk
Elon Reeve Musk ( ; born June 28, 1971) is a businessman. He is known for his leadership of Tesla, SpaceX, X (formerly Twitter), and the Department of Government Efficiency (DOGE). Musk has been considered the wealthiest person in th ...
reportedly sent slightly different versions of an e-mail to each employee in an attempt to reveal potential leakers. The e-mail was disguised as a request to employees to sign a new
non-disclosure agreement
A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), confidential disclosure agreement (CDA), proprietary information agreement (PIA), or secrecy agreement (SA), is a legal contract or part of a contract between at le ...
. The plan was undermined when the company's general counsel forwarded his own unique version of the e-mail with the attached agreement. As a result, Musk's scheme was realized by employees who now had a safe copy to leak.
In October 2019, British celebrity
Coleen Rooney
Coleen Mary Rooney ( McLoughlin; born 3 April 1986) is an English media personality. She is married to English football manager and former player Wayne Rooney.
Early life and education
Coleen Mary McLoughlin was born in Liverpool to Tony and ...
used a barium meal test to identify who was leaking information from her private
Instagram
Instagram is an American photo sharing, photo and Short-form content, short-form video sharing social networking service owned by Meta Platforms. It allows users to upload media that can be edited with Social media camera filter, filters, be ...
stories to tabloid newspaper ''
The Sun
The Sun is the star at the centre of the Solar System. It is a massive, nearly perfect sphere of hot Plasma (physics), plasma, heated to incandescence by nuclear fusion reactions in its core, radiating the energy from its surface mainly as ...
'' by posting fake stories which were blocked to all but one account. When these details appeared in the press, she publicly identified the leaks as coming from the account of
Rebekah Vardy, wife of soccer player
Jamie Vardy
Jamie Richard Vardy ( Gill; born 11 January 1987) is an English professional footballer who plays as a striker for and captains club Leicester City. He will become a free agent on 1 July 2025.
After being released by Sheffield Wednesday at ...
. The subsequent libel trial became known as the
Wagatha Christie
Wagatha Christie is a popular name given to a dispute between the British media personalities Rebekah Vardy and Coleen Rooney, which culminated in a 2022 libel case in the English High Court, ''Vardy v Rooney''.
In 2019, Rooney announced on Twi ...
case.
In December 2020,
Andrew Lewer
Andrew Iain Lewer (born 18 July 1971 in Burnley, Lancashire) is a British Conservative Party (UK), Conservative Party politician who served as the Member of Parliament (United Kingdom), Member of Parliament for Northampton South from 2017 Unite ...
, a Member of Parliament and
parliamentary private secretary in the UK government, was fired from his latter post after a canary trap in the form of a letter reminding staff not to leak was published on the website ''
Guido Fawkes''.
In popular culture
* The canary trap was used in several of Tom Clancy's novels. Chronologically it first appears in ''
Without Remorse'', when a CIA official alters a report given to a senator, revealing an internal leak who was giving information to the
KGB
The Committee for State Security (, ), abbreviated as KGB (, ; ) was the main security agency of the Soviet Union from 1954 to 1991. It was the direct successor of preceding Soviet secret police agencies including the Cheka, Joint State Polit ...
. Different versions of the report were given to other suspected leakers.
* Barium meals are also administered in Robert Littel's book ''
The Company'', and later in the TV miniseries with same name.
* The technique (not named) was used in the 1970s BBC television serial ''
1990
Important events of 1990 include the Reunification of Germany and the unification of Yemen, the formal beginning of the Human Genome Project (finished in 2003), the launch of the Hubble Space Telescope, the separation of Namibia from South ...
''. The same unnamed technique also appeared in
Irving Wallace
Irving Wallace (March 19, 1916 – June 29, 1990) was an American best-selling author and screenwriter. He was known for his heavily researched novels, many with a sexual theme.
Early life
Wallace was born in Chicago, Illinois, to Bessie Liss a ...
's book ''
The Word'' (1972), and in the 1985
spy novel
Spy fiction is a genre of literature involving espionage as an important context or plot device. It emerged in the early twentieth century, inspired by rivalries and intrigues between the major powers, and the establishment of modern intellig ...
''
London Match'' by
Len Deighton
Leonard Cyril Deighton ( ; born 18 February 1929) is a British author. His publications have included cookery books and works on history, but he is best known for his spy novels.
After completing his national service in the Royal Air Force, D ...
.
* A variation of the canary trap was used in the film ''
Miami Vice
''Miami Vice'' is an American crime drama television series created by Anthony Yerkovich and produced by Michael Mann for NBC. The series stars Don Johnson as James "Sonny" Crockett and Philip Michael Thomas as Ricardo Tubbs, Ricardo "Rico" Tub ...
'', with various rendezvous dates leaked to different groups.
* In the
third-season finale of ''
The Mentalist
''The Mentalist'' is an American procedural drama television series that ran from September 23, 2008, until February 18, 2015, broadcasting 151 episodes over seven seasons, on CBS. Created by Bruno Heller, who was also its executive producer, t ...
'', the characters use a canary trap (giving different hotel room numbers to different suspects) to uncover a
mole
Mole (or Molé) may refer to:
Animals
* Mole (animal) or "true mole"
* Golden mole, southern African mammals
* Marsupial mole
Marsupial moles, the Notoryctidae family, are two species of highly specialized marsupial mammals that are found i ...
within their agency. A similar ruse is used in the TV series ''
Ashes to Ashes''.
* In ''
A Clash of Kings'', the second book in the ''
A Song of Ice and Fire
''A Song of Ice and Fire'' is a series of high fantasy novels by the American author George R. R. Martin. Martin began writing the first volume, ''A Game of Thrones'', in 1991, and published it in 1996. Martin, who originally envisioned the ser ...
'' series,
Tyrion Lannister
Tyrion Lannister is a fictional character in the ''A Song of Ice and Fire'' series of epic fantasy novels by American author George R. R. Martin, and its television adaptation ''Game of Thrones'', where he is portrayed by American actor Peter Di ...
uses the trap to find out which member of the King's
small council is reporting to his sister, the Queen Regent
Cersei Lannister. To the Grand Maester Pycelle, he tells of a plot to marry his niece,
Princess Myrcella, to Prince
Trystane of the powerful
House Martell, from
Dorne. To
Littlefinger, he claims he will instead send Myrcella to be raised by
Lysa Arryn and married to her son Robert. To
Varys
Lord Varys is a fictional character in the ''A Song of Ice and Fire'' series of fantasy novels by American author George R. R. Martin, and its television adaptation ''Game of Thrones''.
Introduced in 1996's ''A Game of Thrones'', Varys is a form ...
, he says his plan is to send his nephew
Tommen to the Martells. When Cersei confronts him, and knows only of the plan to send Myrcella to Dorne, Tyrion knows Pycelle to be the leak.
** This plotline is also depicted in "
What Is Dead May Never Die", during
the second season of ''
Game of Thrones
''Game of Thrones'' is an American Fantasy television, fantasy Drama (film and television), drama television series created by David Benioff and for HBO. It is an adaptation of ''A Song of Ice and Fire'', a series of high fantasy novels by ...
'', the television adaptation of the books.
* When distributing the film ''
Broken'' to friends,
Trent Reznor
Michael Trent Reznor (born May 17, 1965) is an American singer, songwriter, musician, and composer. He came to prominence as the founder, lead singer, multi-instrumentalist, and primary songwriter of the industrial rock band Nine Inch Nails. T ...
of
Nine Inch Nails
Nine Inch Nails, commonly abbreviated as NIN (stylized as NIИ), is an American industrial rock band formed in Cleveland, Ohio in 1988. Its members are the singer-songwriter, multi-instrumentalist and producer Trent Reznor and his frequent col ...
claims that he watermarked the tapes with dropouts at certain points so that he could identify if a leak would surface.
* In the film ''
The Heat'' starring Melissa McCarthy and Sandra Bullock, a canary trap is employed by a drug ring to determine the loyalty of a returning member who is Detective Mullins' brother.
* In ''Han Solo at Stars' End'', the first book in ''
The Han Solo Adventures
''The Han Solo Adventures'' is a trilogy of novels set in the ''Star Wars'' fictional universe by American science-fiction novelist Brian Daley. It follows the smuggling days of Han Solo and Chewbacca two years before the events of the origina ...
'', the title character uses a canary trap to find a traitor and murderer among his passengers. He tells each that their target is a different planet, all false, knowing that the traitor would have learned the real destination when they killed the group's leader.
* Episode 25 of ''
Kamen Rider Build'' has the main characters trying to determine the identity of the Namba Children agent through Barium meal test. While the identity of the leaker was revealed, several episodes later established that a bug was implanted into one of the protagonists' devices by another member of the Namba Children.
See also
*
*
*
*
*
*
*
*
References
External links
Fingerprinting gives a good overview of different kinds of canary trap techniques.
EFF.org DocuColor Tracking Dot Decoding Guide How to read the date, time, and printer serial number from forensic tracking codes in a Xerox DocuColor color laser printout.
{{Espionage
Espionage techniques
Steganography
Data protection
Watermarking