The Art of Deception by Kevin D. Mitnick
Author:Kevin D. Mitnick
Language: eng
Format: epub
Publisher: John Wiley & Sons
Published: 2011-07-28T04:00:00+00:00
Chapter 11
Combining Technology and Social Engineering
A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also requires a large measure of knowledge and skill with computer systems and telephone systems.
Here's a sampling of typical social engineering scams where technology played an important role.
HACKING BEHIND BARS
What are some of the most secure installations you can think of, protected against break-in, whether physical, telecommunications, or electronic in nature? Fort Knox? Sure. The White House? Absolutely. NORAD, the North American Air Defense installation buried deep under a mountain? Most definitely.
How about federal prisons and detention centers? They must be about as secure as any place in the country, right? People rarely escape, and when they do, they are normally caught in short order. You would think that a federal facility would be invulnerable to social engineering attacks. But you would be wrong—there is no such thing as foolproof security, anywhere.
A few years ago, a pair of grifters (professional swindlers) ran into a problem. It turned out they had lifted a large bundle of cash from a local judge. The pair had been in trouble with the law on and off through the years, but this time the federal authorities took an interest. They nabbed one of the grifters, Charles Gondorff, and tossed him into a correctional center near San Diego. The federal magistrate ordered him detained as a flight risk and a danger to the community.
His pal Johnny Hooker knew that Charlie was going to need a good defense attorney. But where was the money going to come from? Like most grifters, their money had always gone for good clothes, fancy cars, and the ladies as fast as it came in. Johnny barely had enough to live on.
The money for a good lawyer would have to come from running another scam. Johnny wasn't up to doing this on this own. Charlie Gondorff had always been the brains behind their cons. But Johnny didn't dare visit the detention center to ask Charlie what to do, not when the Feds knew there had been two men involved in the scam and were so eager to lay their hands on the other one. Especially since only family can visit, which meant he'd have to show fake identification and claim to be a family member. Trying to use fake ID in a federal prison didn't sound like a smart idea.
No, he'd have to get in touch with Gondorff some other way.
It wouldn't be easy. No inmate in any federal, state, or local facility is allowed to receive phone calls. A sign posted by every inmate telephone in a federal detention center says something like, “This notice is to advise the user that all conversations from this telephone are subject to monitoring, and the use of the telephone constitutes consent to the monitoring.” Having government officials listen in on your phone calls while committing a crime has a way of extending your federally funded vacation plans.
Johnny
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7797)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6714)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6713)
Running Windows Containers on AWS by Marcio Morales(6230)
Kotlin in Action by Dmitry Jemerov(5078)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4994)
Combating Crime on the Dark Web by Nearchos Nearchou(4582)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4490)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4429)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4252)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3822)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3519)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3491)
Learn Wireshark by Lisa Bock(3406)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Blockchain Basics by Daniel Drescher(3311)
