When in doubt create another layer.
Phi Beta Iota: First off, keystroke monitoring and download monitoring are already fully developed (as well as remote virtual screen replication). If Army really thinks they are investing in something new, this is a terrible indicator of how little Army knows. The idea that some contractor out there can be paid to feed “fake data” to a real-time possible suspect, is a foundation for expensive fraud. Army continues to do the wrong thing righter, while completely avoiding the right thing: human education and system design from the bottom up.