Social Engineering
Social Engineering
Social Engineering
Engineering.
Understanding it and using it in your investigations.
www.johnpizzuro.com
Social engineering is the art of manipulating people so
they give up confidential information.
Spear phishing
Spear phishing is a more targeted form of phishing. Usually sent to thousands, spear
phishing emails are much more tailored to a specific person or business.
Baiting
Baiting differs from phishing by trying to entice the target with an offer or exploit
their curiosity. A common form of baiting is to offer free music downloads (or other
forms of media). The aim is to get the target to click on the link and enter their login
details.
Vishing
Social engineering doesn't have to happen on the internet. Vishing is a form of
social engineering carried out over the phone.
Tailgating
Tailgating is another form of offline social engineering. Simply this type of
attack is a person without authorization following an employee into a restricted
area.
Pretexting
Pretexting relies on forming a false sense of trust with the victim. The attacker
creates a believable pretext or scenario in which to trick the target into giving
them information or even direct access to their systems.
Why does education, awareness and proactive campaigns to
explain Social Engineering fail?
• DOPAMINE - is a neurotransmitter that helps control the brain's reward and pleasure
centers
• Therefore high amounts of dopamine can cause euphoria, aggression and intense
sexual feelings.
SEX RELEASES DOPAMINE. EVEN
THINKING ABOUT SEX DOES. IT IS THE
ANTICIPATION.
IN OTHER WORDS ONCE REWARD IS
LEARNED IT BECOMES LESS ABOUT THE
REWARDS AND MORE ABOUT
THE ANTICIPATION.
PREDATORS????
SEROTONIN
Serotonin helps regulate your mood naturally. When your serotonin levels are normal,
you feel:
• Happier
• Calmer
• More focused
• Less anxious
• More emotionally stable
A 2007 study found that people with depression often have low levels of serotonin.
Serotonin deficiency has also been linked to anxiety and insomnia.
American neuroeconomist Paul J Zak studies the neuroscience of
trust. His early experiments revealed people who felt connected
and trusted each other experienced what he called “virtuous
cycles” of higher oxytocin levels.
App makers push notifications to get users to engage. That’s why, for instance,
Instagram tells you when someone you follow has posted for the first time in a
while, luring you to open the app and take a look.
Simply put, the filter bubble is a phenomenon that occurs with users online. Of
course, this dynamic exists offline, too -- we make friends who have similar interests
and ideologies, for example. This might limit our thinking, but can it influence our
behavior?
5.)It collects information about you that can be used to influence you later.
Related to the filter bubble concept, all web and social platform users are familiar with
how targeted advertising works. You Google something, look for a product on Amazon,
put an item in your virtual shopping cart, browse flight booking options -- then, maybe
hours or even weeks later, you see an ad for whatever you were eyeing earlier.
6. It keeps serving up the next thing.
Social media feeds allow users to scroll endlessly, but that’s only one
example of the never-ending waterfall of information that users encounter
online. After watching a video on Netflix, Facebook or another site that hosts
video content, you’ll often see a countdown with a preview of another video
that will autoplay after a few seconds.
"Ten years ago, before the iPad and iPhone were mainstream, the average
person had an attention span of about 12 seconds," Research suggests that
there's been a drop from 12 to eight seconds ... shorter than the attention of the
average goldfish, which is nine seconds.”
8.) It can trick you into thinking it's something more
Humans have the potential to form relationships with artificially intelligent personas.
.
9.) It turns everyday actions into games.
This is why Social Engineering is successful today. You can use it to elicit
information and behavior during proactive investigations.
Teen sociality is particularly about affect and responsiveness to
emotional signaling.
The study showed the exact same photo with a lot of likes to half of the
teens and to the other half with just a few likes.
When they saw a photo with more likes, they were significantly more
likely to like it themselves.
You are the Expert (or believed to be) if people perceive you as a competent, authority and
trustworthy person, they will do what you ask them to do.
Likability- People inherently want to be liked and charismatic people will have a pull.
Fear - Fear is a very persuasive tool (Just look at Covid-19, 911 & Superstorm Sandy.) Many
politicians use fear to influence people. Manipulation is more likely to happen when the
public doesn’t fully understand the issue or can’t overcome the fear instilled by the politician.
Inoculation is a technique used to make people
immune to persuasion attempts by first exposing
them to small arguments.
Racketeering
Fraud
Bribery
Homicide
Child Exploitation
Money Laundering
Tax Evasion
Narcotics
• You get less than 90 seconds to achieve rapport during a phone call. Therefore, the way
you answer, including the tone of your voice and the choice of words, is crucial.
• Match the energy and type of response you receive from the other person.
• Sound relaxed and willing to offer assistance. Sounding stressed or upset will put your
reputation and competence at risk. People may misconstrue the meaning of your state
and attribute it to the wrong cause.
• Give the person your complete attention. Sit straight or stand up for important calls;
you can even walk around – this improves your voice quality.
Match:
• Voice speed
• Volume
• Breathing
• Content – how friendly and approachable or how business-like and credible
should you be?
You can still tell whether or not rapport has been reached. The signals to listen for are:
Be a good listener
Theory of Mind
Don’t act like a Cop!
Whether it was Homicide, Organized Crime, Drug Cartels, Terrorism, Fraud, Cyber,
Online Child Exploitation or Trafficking, doing things differently have always worked
for me.
It starts with understanding your adversary and your own capabilities and the
capabilities of others that you can leverage.
WWW.JOHNPIZZURO.COM
WWW.IWELLNESSFOUNDATION.ORG
WWW.LINKEDIN.COM/IN/JOHNPIZZURO/