This report documents our accomplishments during Phase II of the Intelligent Software Decoys Project, including the development of a theory of cyber deception, tools for conduction cyber-based deception, and issues pertaining to the acceptable use of cyber deception within the context of homeland security and homeland defense.Approved for public release; distribution is unlimited