HOME
*





Psychological Subversion
Psychological subversion (PsychSub) is the name given by Susan Headley to a method of verbally manipulating people for information. It is similar in practice to so-called social engineering and pretexting, but has a more military focus to it. It was developed by Headley as an extension of knowledge she gained during hacking sessions with notorious early computer network hackers like Kevin Mitnick and Lewis de Payne. Usage example Headley often gave the following example of the use of psychological subversion: Suppose the hacker needed access to a certain classified military computer called, say, IBAS. He would obtain the name of the base commander or other high-ranking official, gain access to the DNS network, (which is the separate military telephone network) and dial up the computer center he needed to reach, which was often in a secured facility. The person who answered the phone would usually be a low-ranking enlisted person, and the hacker would say something l ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Susan Headley
Susan Headley (born 1959, also known as Susy Thunder or Susan Thunder) was a phreaker and early computer hacker during the late 1970s and early 1980s. A member of the so-called Cyberpunks, Headley specialized in social engineering, a type of hacking which uses pretexting and misrepresentation of oneself in contact with targeted organizations in order to elicit information vital to hacking those organizations. Biography Born in Altona, Illinois in 1959, Headley claims to have dropped out of school in the eighth grade after a difficult childhood. She later moved to Los Angeles, California where she worked as a teenage prostitute and was a rock 'n' roll groupie, claiming all four former members of the Beatles among her conquests. She met computer hacker Kevin Mitnick (also known as Condor) in 1980, and together with another hacker, Lewis de Payne (also known as Roscoe), formed a gang of phone phreaks. In ''The Hacker's Handbook'', Headley is referred to as "one of the earliest of the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

DNS (military)
The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System has been an essential component of the functionality of the Internet since 1985. The Domain Name System delegates the responsibility of assigning domain names and mapping those names to Internet resources by designating authoritative name servers for each domain. Network administrators may delegate authority over sub-domains of their allocated name space to other name servers. This mechanism provides distributed and fault-tolerant service and was designed to avoid a single large central da ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Deception
Deception or falsehood is an act or statement that misleads, hides the truth, or promotes a belief, concept, or idea that is not true. It is often done for personal gain or advantage. Deception can involve dissimulation, propaganda and sleight of hand as well as distraction, camouflage or concealment. There is also self-deception, as in bad faith. It can also be called, with varying subjective implications, beguilement, deceit, bluff, mystification, ruse, or subterfuge. Deception is a major relational transgression that often leads to feelings of betrayal and distrust between relational partners. Deception violates relational rules and is considered to be a negative violation of expectations. Most people expect friends, relational partners, and even strangers to be truthful most of the time. If people expected most conversations to be untruthful, talking and communicating with others would require distraction and misdirection to acquire reliable information. A significant amount ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Surveillance Expo
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception. Surveillance is used by citizens for protecting their neighborhoods. And by governments for intelligence gathering - including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance. Auditors car ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Psychology
Psychology is the scientific study of mind and behavior. Psychology includes the study of conscious and unconscious phenomena, including feelings and thoughts. It is an academic discipline of immense scope, crossing the boundaries between the natural and social sciences. Psychologists seek an understanding of the emergent properties of brains, linking the discipline to neuroscience. As social scientists, psychologists aim to understand the behavior of individuals and groups.Fernald LD (2008)''Psychology: Six perspectives'' (pp.12–15). Thousand Oaks, CA: Sage Publications.Hockenbury & Hockenbury. Psychology. Worth Publishers, 2010. Ψ (''psi''), the first letter of the Greek word ''psyche'' from which the term psychology is derived (see below), is commonly associated with the science. A professional practitioner or researcher involved in the discipline is called a psychologist. Some psychologists can also be classified as behavioral or cognitive scientists. Some psyc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Neurolinguistic Programming
Neuro-linguistic programming (NLP) is a pseudoscientific approach to communication, personal development and psychotherapy, that first appeared in Richard Bandler and John Grinder's 1975 book ''The Structure of Magic I''. NLP claims that there is a connection between neurological processes (''neuro-''), language (''linguistic'') and acquired behavioral patterns (''programming''), and that these can be changed to achieve specific goals in life. According to Bandler and Grinder, NLP can treat problems such as phobias, depression, tic disorders, psychosomatic illnesses, near-sightedness, allergy, the common cold, and learning disorders,Archived aGhostarchiveand thWayback Machine often in a single session. They also claim that NLP can "model" the skills of exceptional people, allowing anyone to acquire them. NLP has been adopted by some hypnotherapists, as well as by companies that run seminars marketed as "leadership training" to businesses and government agencies. There is no ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


General
A general officer is an Officer (armed forces), officer of highest military ranks, high rank in the army, armies, and in some nations' air forces, space forces, and marines or naval infantry. In some usages the term "general officer" refers to a rank above colonel."general, adj. and n.". OED Online. March 2021. Oxford University Press. https://www.oed.com/view/Entry/77489?rskey=dCKrg4&result=1 (accessed May 11, 2021) The term ''general'' is used in two ways: as the generic title for all grades of general officer and as a specific rank. It originates in the Tudor period, 16th century, as a shortening of ''captain general'', which rank was taken from Middle French ''capitaine général''. The adjective ''general'' had been affixed to officer designations since the late Middle Ages, late medieval period to indicate relative superiority or an extended jurisdiction. Today, the title of ''general'' is known in some countries as a four-star rank. However, different countries use di ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Lieutenant
A lieutenant ( , ; abbreviated Lt., Lt, LT, Lieut and similar) is a commissioned officer rank in the armed forces of many nations. The meaning of lieutenant differs in different militaries (see comparative military ranks), but it is often subdivided into senior (first lieutenant) and junior (second lieutenant and even third lieutenant) ranks. In navies, it is often equivalent to the army rank of captain; it may also indicate a particular post rather than a rank. The rank is also used in fire services, emergency medical services, security services and police forces. Lieutenant may also appear as part of a title used in various other organisations with a codified command structure. It often designates someone who is " second-in-command", and as such, may precede the name of the rank directly above it. For example, a "lieutenant master" is likely to be second-in-command to the "master" in an organisation using both ranks. Political uses include lieutenant governor in various g ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Classified Information
Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know, and mishandling of the material can incur criminal penalties. A formal security clearance is required to view or handle classified material. The clearance process requires a satisfactory background investigation. Documents and other information must be properly marked "by the author" with one of several (hierarchical) levels of sensitivity—e.g. restricted, confidential, secret, and top secret. The choice of level is based on an impact assessment; governments have their own criteria, including how to determine the classification of an information asset and rules on how to protect information classified at each level. This process often includes security clearances for personnel handling the information. Some corporations and non-governm ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Psychological Manipulation
Manipulation in psychology is a behavior designed to exploit, control, or otherwise influence others to one’s advantage. Definitions for the term vary in which behavior is specifically included, influenced by both culture and whether referring to the general population or used in clinical contexts. Manipulation is generally considered a dishonest form of social influence as it is used at the expense of others. Manipulative tendencies may derive from personality disorders such as borderline personality disorder, narcissistic personality disorder, or antisocial personality disorder. Manipulation is also correlated with higher levels of emotional intelligence, and is a chief component of the personality construct dubbed Machiavellianism. Manipulation differs from general influence and persuasion. Influence is generally perceived to be harmless and it is not seen as unduly coercive to the individual's right of acceptance or rejection of influence. Persuasion is the ability to move o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subcult ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]