Camouflage, used by the U.S. military since 1898 is one example of concealment. Today, enterprises use concealment in the form of “air gaps”, separating (disconnecting) and hiding computers with sensitive data from the Internet, according to Todd Inskeep, Advisory Board Member, RSA Conference. In another example of concealment, says Inskeep, the enterprise could use a network telescope or darknet on an internal network to route stray traffic, network address probes, and other traffic that has an unknown destination address. “At some financial institutions this is called the Black Hole - any traffic directed to an unknown IP address is routed here, so they can log and capture the traffic. For an attacker, they see traffic go in, but not come out, so they don’t know what was happening. In this way, attackers don't get a null return – they get no return, and thus learn nothing from the probe,” says Inskeep.