Are there examples of people using honeypots?
The book The Cuckoo’s Egg by Clifford Stoll is an engaging story about a researcher who bumbles his way into tracking down a hacker who was abusing the university’s computer systems. The researcher basically left the system open and vulnerable for about a year in order to track the hacker’s activities. The San Diego Supercomputer Center has left machines up that can be hacked. http://security.sdsc.edu/incidents/worm.2000.01.18.