HOME





Psychological Subversion
Psychological subversion (PsychSub) is the name given by Susan Headley to a method of verbally manipulating people for information. It is similar in practice to so-called social engineering and pretexting, but has a more military focus to it. It was developed by Headley as an extension of knowledge she gained during hacking sessions with notorious early computer network hackers like Kevin Mitnick and Lewis de Payne. Usage example Headley often gave the following example of the use of psychological subversion: Suppose the hacker needed access to a certain classified military computer called, say, IBAS. He would obtain the name of the base commander or other high-ranking official, gain access to the DNS network, (which is the separate military telephone network) and dial up the computer center he needed to reach, which was often in a secured facility. The person who answered the phone would usually be a low-ranking enlisted person, and the hacker would say something ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Susan Headley
Susan Headley (born 1959, also known as Susy Thunder or Susan Thunder) is an American former phreaker and early computer hacker during the late 1970s and early 1980s. A member of the so-called Cyberpunks, Headley specialized in social engineering, a type of hacking which uses pretexting and misrepresentation of oneself in contact with targeted organizations in order to elicit information vital to hacking those organizations. Biography Born in Altona, Illinois, in 1959, Headley claims to have dropped out of school in the eighth grade after a difficult childhood. She later moved to Los Angeles, California, where she worked as a teenage prostitute and was a rock 'n' roll groupie, claiming all four former members of the Beatles among her conquests. She met computer hacker Kevin Mitnick (also known as Condor) in 1980, and together with another hacker, Lewis de Payne (also known as Roscoe), formed a gang of phone phreaks. In '' The Hacker's Handbook'', Headley is referred to as "one o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

DNS (military)
The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various information with ''domain names'' (identification strings) assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System has been an essential component of the functionality of the Internet since 1985. The Domain Name System delegates the responsibility of assigning domain names and mapping those names to Internet resources by designating authoritative name servers for each domain. Network administrators may delegate authority over subdomains of their allocated name space to other name servers. This mechanism provides distributed and fault-tolerant s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Deception
Deception is the act of convincing of one or many recipients of untrue information. The person creating the deception knows it to be false while the receiver of the information does not. It is often done for personal gain or advantage. Tort of deceit, Deceit and dishonesty can also form grounds for civil litigation in tort, or contract law (where it is known as misrepresentation or fraudulent misrepresentation if deliberate), or give rise to criminal prosecution for fraud. Types Communication The Interpersonal deception theory, Interpersonal Deception Theory explores the interrelation between communicative context and sender and receiver cognitions and behaviors in deceptive exchanges. Some forms of deception include: * Lies: making up information or giving information that is the opposite or very different from the truth. * Equivocations: making an indirect, ambiguous, or contradictory statement. * Lying by omission, Concealments: omitting information that is important o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Surveillance Expo
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. Increasingly, governments may also obtain consumer data through the purchase of online information, effectively expanding surveillance capabilities through commercially available digital records. It can also include simple technical methods, such as human intelligence gathering and postal interception. Surveillance is used by citizens, for instance for protecting their neighborhoods. It is widely used by governments for intelligence gathering, including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and co ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Psychology
Psychology is the scientific study of mind and behavior. Its subject matter includes the behavior of humans and nonhumans, both consciousness, conscious and Unconscious mind, unconscious phenomena, and mental processes such as thoughts, feelings, and motivation, motives. Psychology is an academic discipline of immense scope, crossing the boundaries between the Natural science, natural and social sciences. Biological psychologists seek an understanding of the Emergence, emergent properties of brains, linking the discipline to neuroscience. As social scientists, psychologists aim to understand the behavior of individuals and groups.Hockenbury & Hockenbury. Psychology. Worth Publishers, 2010. A professional practitioner or researcher involved in the discipline is called a psychologist. Some psychologists can also be classified as Behavioural sciences, behavioral or Cognitive science, cognitive scientists. Some psychologists attempt to understand the role of mental functions in i ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Neurolinguistic Programming
Neuro-linguistic programming (NLP) is a pseudoscientific approach to communication, personal development, and psychotherapy that first appeared in Richard Bandler and John Grinder's book '' The Structure of Magic I'' (1975). NLP asserts a connection between neurological processes, language, and acquired behavioral patterns, and that these can be changed to achieve specific goals in life. According to Bandler and Grinder, NLP can treat problems such as phobias, depression, tic disorders, psychosomatic illnesses, near-sightedness, allergy, the common cold, and learning disorders, often in a single session. They also say that NLP can model the skills of exceptional people, allowing anyone to acquire them. NLP has been adopted by some hypnotherapists as well as by companies that run seminars marketed as leadership training to businesses and government agencies. No scientific evidence supports the claims made by NLP advocates, and it has been called a pseudoscience. Scientific ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


General
A general officer is an Officer (armed forces), officer of high rank in the army, armies, and in some nations' air force, air and space forces, marines or naval infantry. In some usages, the term "general officer" refers to a rank above colonel."general, adj. and n.". OED Online. March 2021. Oxford University Press. https://www.oed.com/view/Entry/77489?rskey=dCKrg4&result=1 (accessed May 11, 2021) The adjective ''general'' had been affixed to officer designations since the late medieval period to indicate relative superiority or an extended jurisdiction. French Revolutionary system Arab system Other variations Other nomenclatures for general officers include the titles and ranks: * Adjutant general * Commandant-General, Commandant-general * Inspector general * General-in-chief * General of the Air Force (USAF only) * General of the Armies, General of the Armies of the United States (of America), a title created for General John J. Pershing, and subsequently grante ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Lieutenant
A lieutenant ( , ; abbreviated Lt., Lt, LT, Lieut and similar) is a Junior officer, junior commissioned officer rank in the armed forces of many nations, as well as fire services, emergency medical services, Security agency, security services and police forces. The rank in armies and air forces is often subdivided into subcategories of seniority. In Comparative navy officer ranks of Anglophone countries, English-speaking navies, lieutenants are often equivalent to the army rank of Captain (armed forces), captain; in other navies, the lieutenants are usually equal to their army counterparts. ''Lieutenant'' may also appear as part of a title used in various other organisations with a codified command structure. It often designates someone who is "second-in-command", and as such, may precede the name of the rank directly above it. For example, a "lieutenant master" is likely to be second-in-command to the "master" in an organisation using both ranks. Political uses include lieu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Classified Information
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or regulation to particular groups of individuals with the necessary security clearance with a need to know. A formal security clearance is required to view or handle classified material. The clearance process requires a satisfactory background investigation. Documents and other information must be properly marked "by the author" with one of several (hierarchical) levels of sensitivity—e.g. Confidential (C), Secret (S), and Top Secret (S). All classified documents require designation markings on the technical file which is usually located either on the cover sheet, header and footer of page. The choice of level is based on an impact assessment; governments have their own criteria, including how to determine the classification of an inf ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Psychological Manipulation
In psychology, manipulation is defined as an action designed to influence or control another person, usually in an underhanded or subtle manner which facilitates one's personal aims. Methods someone may use to manipulate another person may include seduction, suggestion, coercion, and blackmail. Manipulation is generally considered a dishonest form of social influence as it is used at the expense of others. Humans are inherently capable of manipulative and deceptive behavior, with the main differences being that of specific personality characteristics or disorders. Etymology By 1730, the word ''manipulation'' was used to refer to a method of digging ore. The term derives from the French manipulation, which in turn comes from manipule, meaning "handful", a unit of measure used by pharmacists, later having a sense by 1828 of handling or managing people for one's own purposes. The word ''manipulate'' originated in 1827 as a back-formation from manipulation, initially meaning "to handl ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, sabotage, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. Longstanding controversy surrounds the meaning of the term "hacker". In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks, and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". The subculture that has evolved around hackers is often referred to as the "co ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]