Social engineering : : how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication / / Robert W. Gehl and Sean T. Lawson.

"From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"--

Saved in:
Bibliographic Details
Superior document:The MIT Press
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Cambridge : : The MIT Press,, [2022]
Year of Publication:2022
Edition:1st ed.
Language:English
Series:The MIT Press Series
Physical Description:1 online resource (xi, 328 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 04864nam a2200601Ki 4500
001 993544410004498
005 20240313184117.0
006 m o d
007 cr#cnu||||||||
008 211130s2022 mau ob 001 0 eng d
020 |a 0-262-36892-7 
020 |a 0-262-36893-5 
035 |a (CKB)4900000001020026 
035 |a (MiAaPQ)EBC6888218 
035 |a (Au-PeEL)EBL6888218 
035 |a (OCoLC)1286684156 
035 |a (oapen)https://directory.doabooks.org/handle/20.500.12854/84609 
035 |a (MiAaPQ)EBC30536284 
035 |a (Au-PeEL)EBL30536284 
035 |a (OCoLC-P)1286684156 
035 |a (MaCbMITP)12984 
035 |a (EXLCZ)994900000001020026 
040 |a OCoLC-P  |b eng  |e rda  |e pn  |c OCoLC-P 
041 0 |a eng 
050 4 |a HM742  |b .G45 2022eb 
082 0 4 |a 364.16/3  |2 23 
100 1 |a Gehl, Robert W.,  |e author. 
245 1 0 |a Social engineering :  |b how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication /  |c Robert W. Gehl and Sean T. Lawson. 
246 3 0 |a How crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication 
250 |a 1st ed. 
264 1 |a Cambridge :  |b The MIT Press,  |c [2022] 
300 |a 1 online resource (xi, 328 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The MIT Press 
546 |a English 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction: The Emergence of Masspersonal Social Engineering -- Why "Social Engineering" Is a Good Label -- On Social Engineering -- On Masspersonal Communication -- Masspersonal Social Engineering -- Plan of the Book -- I Engineering the Social -- 1 Crowdmasters: The Rise and Fall of Mass Social Engineering, 1920-1976 -- Engineering Society -- Social Reformers -- Managerialist Social Engineers -- Public Relations and the Mass Social Engineers -- "Social Engineering" Becomes a Pejorative -- Conclusion -- 2 Phreaks and Hackers: The Rise of Interpersonal Social Engineering, 1976-Present -- Intellectual Roots of Hacker Social Engineering -- The Phone Phreaks -- Phreaking and Hacking via Social Engineering -- Hacker Social Engineering as Interpersonal Communication -- Relating Mass and Interpersonal Social Engineering -- Conclusion -- II The Social Engineering Process -- 3 Trashing: From Dumpster Diving to Data Dumps -- What Makes Social Engineering Trashing Possible? -- Making a Trash Society: Sanitary Engineering and Mass Social Engineering -- A Philosophy of Garbage -- In the Dumpster -- The Digital Dumpster -- Trashing in the Digital Dumpster -- Conclusion: Surveys, Dumpster Diving, and OSINT -- 4 Pretexting: Recognizing the Mitnick Mythology -- Hacker Pretexting -- Mass Social Engineering Pretexts -- The "World's Most Famous Hacker" -- Theories of Identity Play -- Recognizing Mitnick's Pretexting Successes: Structural Factors -- Social Engineering and Stereotyping -- Conclusion -- 5 Bullshitting: Deception, Friendliness, and Accuracy -- On Bullshit with the Phone Phreaks -- Bullshitting the Operator: Best Practices -- Bullshitting in Hacker Social Engineering -- Bullshit among the Mass Social Engineers -- Conclusion -- 6 Penetrating: The Desire to Control Media and Minds. 
505 8 |a Interpersonal Penetration Metaphor: Sexual Conquest -- Professional Penetration -- Mass Social Engineering Metaphors: Bullets -- Media Penetration by the Numbers -- Penetrating Us for Our Own Good? -- Conclusion -- III Masspersonal Social Engineering -- 7 Contemporary Masspersonal Social Engineering -- The Social Engineering Process -- Masspersonal Social Engineering Cases: Russia and Cambridge Analytica -- Masspersonal Social Engineering since 2016 -- Conclusion -- 8 Conclusion: Ameliorating Masspersonal Social Engineering -- Is Masspersonal Social Engineering Effective? -- Can Masspersonal Social Engineering Be Ethical? -- What to Do about Masspersonal Social Engineering? 
520 |a "From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"--  |c Provided by publisher. 
588 |a OCLC-licensed vendor bibliographic record and online resource. 
650 0 |a Social media  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Internet fraud. 
650 0 |a Social engineering. 
653 |a COMPUTERS / Security / General 
653 |a TECHNOLOGY & ENGINEERING / History 
653 |a SOCIAL SCIENCE / Criminology 
776 0 8 |z 0-262-54345-1 
776 0 8 |i Print version:  |a Gehl, Robert W.  |t Social engineering.  |d Cambridge : The MIT Press, 2022  |z 9780262543453  |w (DLC) 2021016750  |w (OCoLC)1250432879 
700 1 |a Lawson, Sean T.,  |d 1977-  |e author. 
830 4 |a The MIT Press Series 
906 |a BOOK 
ADM |b 2024-03-14 05:57:15 Europe/Vienna  |d 00  |f system  |c marc21  |a 2022-03-05 21:45:23 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337585510004498&Force_direct=true  |Z 5337585510004498  |b Available  |8 5337585510004498