Deception in the Digital Age Exploiting and Defending Human Targets Through Computer-Mediated Communications

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-dep...

Full description

Saved in:
Bibliographic Details
Main Authors Malin JD, Cissp, Gudaitis, Terry, Holt, Thomas, Kilger, Max
Format eBook
LanguageEnglish
Published Chantilly Elsevier Science & Technology 2017
Academic Press
Edition1
Subjects
Online AccessGet full text
ISBN9780124116306
0124116302

Cover

Table of Contents:
  • Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools
  • Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis
  • Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Y -- Back Cover