Preview

Summary Of The Art Of Deception By Kevin D. Mitnick

Better Essays
Open Document
Open Document
1284 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary Of The Art Of Deception By Kevin D. Mitnick
In the book The Art of Deception by Kevin D. Mitnick I chose chapter 9 to summarize and relate it a current news article. Chapter 9 is about the reverse sting and how it is used by con artists to pull of major scams. Mitnick also tells us solutions on how to prevent such scams and how to be wary of the social engineer.
The sting or “running the wire” is a great tool on the grifter’s belt because it allows them to pull of major scams with ease. Sometimes though the sting is ran opposite of the traditional patterns, when this happens the reverse sting is created. Now most of us when we hear the term computer hacker imagine a picture of an anti-social, introverted nerd who is obsessed with computers. Mitnick tells us in this book that images is actually false and the actual
…show more content…
What is a Social Engineer? Well social engineering as defined by TechTarget.com is “is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.” So basically a social engineer is someone who uses his or her conversation and manipulation skills to get what they want. The reverse sting as defined by Mitnick is “A con in which the person being attacked asks the attacker for help”. So you can see why the stereotype couldn’t pull off such a crime.
Through two different stories Mitnick tells us about how the reverse sting is done. We will analyze the first story. The first story is a tale about P.I Vince Caparelli and how he conned four bank employees into giving him financial information about his target. Essentially he called four different employees of the bank in succession each time asking for a different piece of bank security information that would be used to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Assuming Names: A Con Artist's Masquerade by Tanya Thompson, is a non-fiction, autobiography. The story is about a 15 years old girl named Tanya. In the first part of the book she run away from home in Tennessee to, seek out the high class life she believe exist only in populated city, Dallas. While pretending to be a 23 years old high class countess, that travel with her “master”, she gained country wide attention. From FBI, to immigration and naturalization office. Tanya was known as “Counterfeit Countess” deceived every one of them. Tanya present a true natural of lying, and acting on impulse. But also, in the face of danger; she will fight back, and get her revenge.…

    • 416 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On November 19th I attended an opera by the Auburn University’s Department of Music Opera Workshop. The opera was titled “The Art of Deception” and consisted of 6 marvelous pieces, numerous with sub-pieces that summed it up as a whole. The opera’s intent was to deceive you as well as create wondering in your imagination, with numerous illusions and mysteries portrayed in the performance itself.…

    • 585 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the video, The Deadly Deception, is an all around made story on savage conduct in government kept up obvious examination. The piece records the forty year examination of untreated syphilis in around 400 African-American men from Macon County, Alabama which started in 1932. The use of parties with two survivors of the examination, Herman Shaw and Charles Pollard, and directors in the fields of examination, system, and social adaptabilities, close awesome film taken amidst the trial, results in a bona fide and startling outline of the abuse of human subjects in investigative examination.…

    • 653 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Furthermore she implies that omission involves telling most of the truth minus one or two…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Antar, S. (2011). The Crazy Eddie fraud confessions of a white-collar criminal. White Collar Fraud. Retrieved from http://business.pages.tcnj.edu/files/2013/02/2011-09-07-The-Crazy-Eddie-Fraud-by-Sam-E.-Antar.pdf…

    • 1405 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Arthur Miller makes the claim “Lies and deceit can cause the worst trouble in a community”. This can be seen when Sarah Good, an old lady who is believed to be a witch, is asked to recite the 10 commandments to prove she isn't a witch. In the play titled The Crucible ,by Arthur Miller, Mary Warren, a young housemaid, is talking to Proctor and Elizabeth, a christian couple, and she states that, “Aye, but then Judge Hathorne say, ‘Recite for us your commandments!’ - leaning avidly toward them - and of all the ten she could not say a single one. She never knew no commandments, and they had her in a flat lie!” This means that Judge Hawthorne only judges by the peoples ability of reciting the 10 commandments, and if they fail, they are assumed…

    • 230 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Bendelladj Research Paper

    • 614 Words
    • 3 Pages

    Latterly, while scrolling through my Facebook newsfeed, I stumbled across a very interesting photo – shared by one of my friends. It claimed that Hamza Bendelladj, a 27-year-old, Algerian hacker had been sentenced to death by a US judge after allegedly co-creating a banking Trojan horse known as “SpyEye”. The Trojan has reportedly infected more than 1.4 million computers across the globe. It was used to steal millions of dollars from more than 200 American banks and financial institutions after obtaining sensitive information from computer systems, which the hacker had then apparently, donated to several Palestinian charities.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Also a key part of this project is having the facts that will back up opinions and past happenings. I will gain information via books, internet sites, interviews, and magazine articles. The more information brought to our attention will benefit us a great deal as we will know why and how this type of white collar crime can take place and should provide us with ways to avoid these predicaments.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Theme of Deception

    • 619 Words
    • 3 Pages

    Deception is a concept that has a very obvious form, but also a very in depth form. In the play A Streetcar Named Desire the theme of deception weaves its way into the main story line in two major ways; The obvious one being Stanley Kowalski’s lying and the underlying deception that goes on inside of Blanche DuBois’s mind.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Kevin Mitnick

    • 1277 Words
    • 6 Pages

    The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Jackson, D. (1993, March 16). What is a ponzi scheme? Los Angeles Times (Pre-1997 Fulltext), pp. 8-8. Retrieved from http://ezproxylocal.library.nova.edu/login?url=http://search.proquest.com/docview/281999655?accountid=6579…

    • 9503 Words
    • 39 Pages
    Powerful Essays
  • Good Essays

    In 2013, the founder of Peregrine Financial Group Inc. sentenced 50 years jail for stealing $250 million from investors and hiding his theft around 20 years. The U.S. Attorney Sean R. Berry of the Northern District of Iowa states that, for years seemed Russell Wasendorf, Sr. was a successful CEO of his own brokerage and respected member of his company, supporting local charity, and creating jobs. But in reality, “he was a con man who built a building on smoke and mirrors”. Russell Wasendorf, Sr. sentenced on variety of factors, such as financial loss, sophistically executed the fraud, and stole money of large number of victims and so on.…

    • 997 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Deception Theory

    • 1268 Words
    • 6 Pages

    Communication involves people and interactions, and is a process that happens from the beginning of a conversation to the end. Communication can be represented through symbols and cues, both verbal and nonverbal. In addition, meaning is what people extract from a message, and there can be multiple layers of meaning associated with communication.…

    • 1268 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays