The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick; William L. Simon; Steve Wozniak
Author:Kevin D. Mitnick; William L. Simon; Steve Wozniak
Language: eng
Format: mobi
Tags: Reference:Computers
ISBN: 076454280X
Publisher: Wiley
Published: 2002-01-02T00:00:00+00:00
chapter 11
Combining Technology and Social Engineering
A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also requires a large measure of knowledge and skill with computer systems and telephone systems.
Here’s a sampling of typical social engineering scams where technology played an important role.
HACKING BEHIND BARS
What are some of the most secure installations you can think of, protected against break-in, whether physical, telecommunications, or electronic in nature? Fort Knox? Sure. The White House? Absolutely. NORAD, the North American Air Defense installation buried deep under a mountain? Most definitely.
How about federal prisons and detention centers? They must be about as secure as any place in the country, right? People rarely escape, and when they do, they are normally caught in short order. You would think that a federal facility would be invulnerable to social engineering attacks. But you would be wrong—there is no such thing as foolproof security, anywhere.
A few years ago, a pair of grifters (professional swindlers) ran into a problem. It turned out they had lifted a large bundle of cash from a local judge. The pair had been in trouble with the law on and off through the years, but this time the federal authorities took an interest. They nabbed one of the grifters, Charles Gondorff, and tossed him into a correctional center near San Diego. The federal magistrate ordered him detained as a flight risk and a danger to the community.
His pal Johnny Hooker knew that Charlie was going to need a good defense attorney. But where was the money going to come from? Like most grifters, their money had always gone for good clothes, fancy cars, and the ladies as fast as it came in. Johnny barely had enough to live on.
The money for a good lawyer would have to come from running another scam. Johnny wasn’t up to doing this on this own. Charlie Gondorff had always been the brains behind their cons. But Johnny did-n’ t dare visit the detention center to ask Charlie what to do, not when the Feds knew there had been two men involved in the scam and were so eager to lay their hands on the other one. Especially since only family can visit, which meant he’d have to show fake identification and claim to be a family member. Trying to use fake ID in a federal prison didn’t sound like a smart idea.
No, he’d have to get in touch with Gondorff some other way.
It wouldn’t be easy. No inmate in any federal, state, or local facility is allowed to receive phone calls. A sign posted by every inmate telephone in a federal detention center says something like, “This notice is to advise the user that all conversations from this telephone are subject to monitoring, and the use of the telephone constitutes consent to the monitoring.” Having government officials listen in on your phone calls while committing a crime has a way of extending your federally funded vacation plans.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7582)
Grails in Action by Glen Smith Peter Ledbrook(7485)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6202)
Kotlin in Action by Dmitry Jemerov(4843)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3151)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2959)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2836)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2662)
The Art Of Deception by Kevin Mitnick(2428)
Drugs Unlimited by Mike Power(2285)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2177)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2136)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2085)
JavaScript by Example by S Dani Akash(2017)
Wireless Hacking 101 by Karina Astudillo(1949)
DarkMarket by Misha Glenny(1947)
Full-Stack React Projects by Shama Hoque(1856)
Social Selling Mastery by Jamie Shanks(1827)
Hack and HHVM by Owen Yamauchi(1755)