AN EFFICIENT STRATEGY FOR DEPLOYING DECEPTION TECHNOLOGY