Description
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs.
The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.
Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.
- Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians
- Explores cognitive vulnerabilities that cyber attackers use to exploit human targets
- Dissects the underpinnings and elements of deception narratives
- Examines group dynamics and deception factors in cyber attacker underground markets
- Provides deep
Chapter
Introduction: Cyberanthropology of Deception
The Digital Evolution: Cyberanthropology of Deception
1 - The Psychology of Deception
Misdirection and the Psychological Principles Behind Effective Magic
Active and Passive Misdirection: Factors Toward Influence by Suggestion
General, Particular, and Post Misdirection
Misdirection Through Disguise and Attention Control
Physical and Psychological Misdirection
Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection
Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal
Misdirection Through Distraction, Diversion, or Relaxation
Magician’s Weapons of Deception
Magic, Illusion, and the Prevalence of Deception
Neuropsychology of Magic and Deception
Early Attempts at Explaining Digital Deception
Traditional Deception Research via Verbal and Nonverbal Cues
Deception Detection Through the Analysis of Words and Images
Deception Through the Practice of Social Engineering
The Psychology of Deception
2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings
Elements of Urban Legends
Traditional Chain Letters
Weaponizing Online Urban Legends, Hoaxes, and Chain Communications
Defending Against Online Urban Legends, Chains, and Hoax Communications
Open Source Intelligence Analysis
3 - Viral Influence: Deceptive Computing Attacks Through Persuasion
Psychological Principles of Influence
Factors, Sequence, and Timing of Persuasive Communications
The Yale Information Processing Model
The Objectives of Persuasive Communications
Social Influence and Persuasion in Computer-Mediated Communications
Social Influence Over Computer-Mediated Communications and Digital Platforms
Adapting Traditional Social Cues Communicator Salience
Deceptive Computing Attacks Through Persuasion
Hoax Virus Communications
Principles of Persuasion in Hoax Virus Narratives
Principles of Persuasion in Scareware Attack “Storyboards”
Principles of Persuasion in Tech Support Scam “Storyboards”
Principles of Persuasion in Ransomware Attacks
The Future of Viral Influence
4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures
Social Dynamics in Computer-Mediated Communications
The Process of Buying and Selling
Trust Inducing Mechanisms
Subcultural Norms and the Role of Trust
No Honor Among Cyber Thieves: Deception Within Underground Markets
Attacking Trust Within Underground Markets
5 - Phishing, Watering Holes, and Scareware
Watering Hole Attacks (Strategic Web Compromises)
The Watering Hole Attack Deception Chain
6 - Seeing is Not Believing: Deceptive Internet Video Communications
One of Photography’s Early Deceptions
Deciphering Fantasy From Reality
Alternative Perspectives and Augmented Reality
Going on the Offensive: Deceiving Video
7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative
Al Qaeda: Reinvigorating Cyber Jihad
ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State
ISIS and the Evolution of Sophisticated Online Propaganda
Cyber Jihad and Digital Deception
8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks
The Role of Nation State Versus Non-nation State Attacks
China: Enter the Digital Dragon
From Cyber Nationalism to Cyber Espionage
Virtual “No-Flag” Operations: Non-nation State Cover and Concealment
Cyberwar and the Nation State
Future of Nation State Cyber Conflict
9 - Sweet Deception: Honeypots
10 - Looking Forward: Deception in the Future
Nanotechnology and Quantum Stealth
Neurohacking/Neuromarketing and Texting by Thinking
The Man in the Middle Conundrum
The Impact on Humans and Psychology