Social engineering : : how crowdmasters, phreaks, hackers, and trolls created a new form of manipulative communication / / Robert W. Gehl and Sean T. Lawson.

"From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception to gain access to sensitive information"--

Saved in:
Bibliographic Details
Superior document:The MIT Press
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Cambridge : : The MIT Press,, [2022]
Year of Publication:2022
Edition:1st ed.
Language:English
Series:The MIT Press Series
Physical Description:1 online resource (xi, 328 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Introduction: The Emergence of Masspersonal Social Engineering
  • Why "Social Engineering" Is a Good Label
  • On Social Engineering
  • On Masspersonal Communication
  • Masspersonal Social Engineering
  • Plan of the Book
  • I Engineering the Social
  • 1 Crowdmasters: The Rise and Fall of Mass Social Engineering, 1920-1976
  • Engineering Society
  • Social Reformers
  • Managerialist Social Engineers
  • Public Relations and the Mass Social Engineers
  • "Social Engineering" Becomes a Pejorative
  • Conclusion
  • 2 Phreaks and Hackers: The Rise of Interpersonal Social Engineering, 1976-Present
  • Intellectual Roots of Hacker Social Engineering
  • The Phone Phreaks
  • Phreaking and Hacking via Social Engineering
  • Hacker Social Engineering as Interpersonal Communication
  • Relating Mass and Interpersonal Social Engineering
  • Conclusion
  • II The Social Engineering Process
  • 3 Trashing: From Dumpster Diving to Data Dumps
  • What Makes Social Engineering Trashing Possible?
  • Making a Trash Society: Sanitary Engineering and Mass Social Engineering
  • A Philosophy of Garbage
  • In the Dumpster
  • The Digital Dumpster
  • Trashing in the Digital Dumpster
  • Conclusion: Surveys, Dumpster Diving, and OSINT
  • 4 Pretexting: Recognizing the Mitnick Mythology
  • Hacker Pretexting
  • Mass Social Engineering Pretexts
  • The "World's Most Famous Hacker"
  • Theories of Identity Play
  • Recognizing Mitnick's Pretexting Successes: Structural Factors
  • Social Engineering and Stereotyping
  • Conclusion
  • 5 Bullshitting: Deception, Friendliness, and Accuracy
  • On Bullshit with the Phone Phreaks
  • Bullshitting the Operator: Best Practices
  • Bullshitting in Hacker Social Engineering
  • Bullshit among the Mass Social Engineers
  • Conclusion
  • 6 Penetrating: The Desire to Control Media and Minds.
  • Interpersonal Penetration Metaphor: Sexual Conquest
  • Professional Penetration
  • Mass Social Engineering Metaphors: Bullets
  • Media Penetration by the Numbers
  • Penetrating Us for Our Own Good?
  • Conclusion
  • III Masspersonal Social Engineering
  • 7 Contemporary Masspersonal Social Engineering
  • The Social Engineering Process
  • Masspersonal Social Engineering Cases: Russia and Cambridge Analytica
  • Masspersonal Social Engineering since 2016
  • Conclusion
  • 8 Conclusion: Ameliorating Masspersonal Social Engineering
  • Is Masspersonal Social Engineering Effective?
  • Can Masspersonal Social Engineering Be Ethical?
  • What to Do about Masspersonal Social Engineering?