Free Essay

Spying of the Nsa, Public Speaking Report

In:

Submitted By cpocorni
Words 1852
Pages 8
Spying of the NSA

The past year we all have heard of the NSA spying through social media, phones and all sorts of stuff, we heard of this because of Edward Snowden, an ex CIA- system analyst. He exposed their spying and this has resulted in to a global issue. Because the spying is wrong on so many levels we are here to convince you that what the NSA is doing is wrong.
*attention grabber*
So now that I have your attention I will continue.
Main Point 1: How is it possible that the NSA is spying on civilians?
Sub Point 1: What is the NSA;
I’m going to begin by telling you a little about what the NSA is. The NSA better known as the National Security Agency is the main producer and manager of the signals intelligence for the United States. The NSA is responsible for the protection of U.S. government. The NSA is tasked with monitoring on targeted individuals in the U.S. But the NSA doesn’t just spy on targeted individuals; they spy on every U.S. citizen, they even spy on world leaders. They can spy on anyone around the world, and they can do this through social media, the internet and phones. I will explain this in more detail later.
Ok so now that I’ve talked about what the NSA is, I will tell you guys how it is possible that the NSA is spying on us. Well to begin, the NSA spying program started back when George Bush was the president of the United States, the spying started right after nine eleven, this was in 2001 and that is 13 years ago so consider how long they have been spying. And it only got worse because technology developed, social media got bigger and smartphones were introduced. They wanted to keep the spying private but look how that turned out. The NSA monitored people whom the government thought were related to the Al Qaeda. Soon this led to spying on innocent and harmless civilians of the U.S. and all over the world.

Sub Point 2: The Internet and Social Websites
Now I’m going to talk about the spying through the internet and social sites like Facebook and Google. First of all, you always need to watch out with what you post online.The NSA has direct access to the systems of Google and Facebook, so everything you post or message to someone else is seen by the NSA, these people can just read all your private stuff. Invasion of privacy is wrong and should be stopped. It doesn't matter if what the government's calls surveillance is legal (It’s actually just spying on people but ok), what matters is that the spying is despicable and should be sabotaged and stopped by anybody, it is wrong to invade people their privacy without their knowing of, even if they knew about it you still can’t spy on someone just because.It should be illegal because it's unacceptable. The NSA can surveillance anything we do through all these social sites and most of us have Facebook and a Google account (gmail) so think about it, everything you send or receive has been read by someone at the NSA, this is not right, it shouldn’t even happen. If other people are being punished for spying and invading people their privacy, why is it ok if the NSA is doing it? Not because they are a higher power means it is ok to spy, what the NSA is doing is wrong and they should be stopped.

Sub Point 3: Spying via Smartphones
Now that I’ve rounded up the spying via the internet and social websites I will continue to the spying via smartphones. As I’ve mentioned before the NSA can spy on us through almost anything that’s what makes it so wrong. But since smartphones like iPhones and Androids came out it became even easier for the NSA to invade our privacy. The NSA can even spy on us through our games. Angry birds for example, if spying via our social media isn’t wrong enough they spy on us through our games too! They can almost find out anything through the games, things like age, personal information and gender. Yes the NSA spying is legal, but slavery was legal too, but that doesn’t mean that it is right. Besides the spying through angry birds and other games the NSA can also spy through an app that was created for smartphones to download Jay-Z’s album for free. So The NSA now has all the information of all the people who downloaded this app. What kind of good does this do? It doesn’t help the NSA with anything; these people who downloaded the app are just teenagers that probably don’t have anything to hide from the NSA or things that can hurt The USA. The NSA claims they’re doing it to look for terrorists but the spying has not helped with anything. Besides the NSA’s spying via games and apps on your phone, they can also listen to the phone calls of everyone with Verizon as their provider. How far will the NSA go till they realize that they’re doing something completely wrong and despicable? Reading people their mails and messages is wrong but listening to phone calls of innocent people is just beyond crazy. That the spying is still legal is just unacceptable, as I said before invading people their personal stuff is not right. There are many reasons why the NSA spying is wrong but the main reason is that they’re lying to the world about the whole situation, the government is sugarcoating this situation. And even though the government is trying to make the spying look ok, it’s not ok. And we all should know that what they’re doing is not right. The spying should be stopped as soon as possible!

Now that I’ve told you guys about how they spy and why it’s so wrong Jair is going to continue.

Is the NSA’s “surveillance” really helping?
Benefits don’t seem to outweigh the harms
The NSA’s surveillance was implemented to prevent terrorist attacks. However, the NSA’s spying does not seem to be all that beneficial. There have not been many instances in which the NSA’s surveillance has helped. It has been officially stated that the surveillance only has prevented 1 or 2 terrorist attacks, it was also unable to prevent the Boston bombing which occurred last year. What the NSA’s surveillance has so far really succeeded in doing is eliminating global privacy. It’s a huge invasion of people’s privacy. Not only is this invasion of privacy a problem because it can collect data on what a person is doing at the time, but also because it can create a profile of a person, which could discourage people from speaking freely or associating with others if that information were to be released. What if the people you talk to everyday were to discover something embarrassing or disturbing about you, because it was “leaked”, they probably wouldn’t look at you the same way that they used and might even start avoiding you. The Spying has also damaged the relations between the U.S. and its allies. Trust is a hard thing to come by and once it’s broken it’s hard to rebuild. It could cause problems later when the U.S. tries to deal with other countries. America isn’t the most loved country in the world and something like this just further damages their image. This could cause discrimination against Americans in other countries, something that’s very bad and unwelcome. There is also evidence that there have been instances in which employees of the NSA abused this so-called surveillance. It wasn’t used to spy on potential terrorists, but to spy on their significant other. Checking their emails and phone records of their boyfriends, girlfriends, husbands or wives. The NSA’s spying could also cause people to abandon their phone company or internet providers, because they fear getting spied on which cause the company to go under and you’d have tons more jobless people. Politicians in Europe are especially outraged. Citizens are angry with the United States and are losing faith in American brand names. This is a very bad for American companies and even worse its employees, who could lose their job if the company goes under. Due to yielding to the NSA’s demands some of these companies likely broke laws elsewhere. They could face serious penalties for this later.

Invasion of Privacy
Privacy is our right, everyone has the right to a private life, people may think that that is selfish, but privacy is our right and in a society where personal business can now be exposed on mass Medias, privacy is very important to us. It’s very disrespectful to everyone being spied on. As I mentioned earlier, this “surveillance” hardly seems worth the sacrifice of one’s privacy as it has yet to deliver real results since its implementation. Other intelligence agencies have been successful in preventing attacks in other ways than spying on its own civilians. Furthermore the NSA’s spying is in violation of America’s 4th amendment which states that “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall not be violated”. So people do have the right to be upset that their privacy is being invaded in almost every way possible. It’s like the American government saying that they don’t trust anyone living in the country. The NSA’s surveillance is a very big threat on your privacy. There should be a limit as to how far the NSA and the government can go.

The NSA funding could be money better spent elsewhere
The government of the U.S. has invested millions of dollars into the surveillance program that is supposed to defend the U.S. from terrorist attacks. The money that has been invested into the NSA for their spying program could be money better spent on something that could be more beneficial for the American population. As I stated before that even though the surveillance program was implemented to prevent terrorist attacks, it has yet to deliver a lot of positive results. While safety is a very important thing, I think it’s a waste to invest that kind of money in something that has yet to deliver a lot of positive results. The money could be spent to protect Americans in other ways that does not involve invading everyone’s privacy. It could even be invested in companies to create more jobs for people.

Conclusion
We would like to say to you that you should all watch out with what you post online. Now that you know that the NSA can spy on you through all kinds devices and the internet we hope that you’ll be more careful with what you do and post on the internet. Especially since the NSA can easily obtain your personal information. We’ve hoped that we’ve persuaded you that the NSA is wrong for spying and invading people’s privacy.

Similar Documents

Premium Essay

George Orwell 1984 Vs Today

...The witness who watches a crime and does not report it, is just as guilty as the criminal. The citizens of the United States are both victims and witnesses. Today's Americans, are victims of the unacceptable actions of the American government, but they are also witnesses who refuse to do anything about the injustice. George Orwell’s 1984, portrays life under an oppressive government that constantly spys on citizens, presents misleading media, and is constantly fighting a foreign enemy. Today in 2016, the United States government spies on citizens through technology, allows a media oligarchy, and is constantly in the midst of a never ending war. The unacceptable actions of the government in Orwell’s 1984 and today are eerily similar, and the...

Words: 1015 - Pages: 5

Free Essay

Whistleblowing

...bring it to the attention of others.”(Ghillyer, 2014) Whistleblowers can be viewed as providing a praiseworthy act or be severely labeled as informers who have breached the loyalty of their co-workers and company. Whistleblowing can be a service to the community and public. Whistleblowing can be ethical or unethical, and the whistleblower discovering corporate misconduct has the options to be an internal or an external whistleblower. Whistleblowing can save people’s lives. Dr. Jeffrey Wigand made the decision to go public with information that his employer Brown & Williamson (B&W) was manipulating the nicotine content, suppressed efforts to develop safer cigarettes, and lied about the addictive properties of nicotine. According to Sissela Bok, in the book Taking Sides: Clashing views in Business Ethics and Society, “not only is loyalty violated in whistleblowing, hierarchy as well is often opposed, since the whistleblower is not only a colleague but a subordinate. Though aware of the risks inherent in such disobedience, he often hopes to keep his job.” (Newton, Englehardt, & Pritchard, 2012). Whistleblowing is ethical when the company through a product or decision will cause serious harm to the public. Whistleblowing is unethical when there is evidence that the employee is motivated by financial gain, media attention, or has a grudge against the company. An example of when it is ethical to be a...

Words: 3746 - Pages: 15

Premium Essay

Contemplating Realities and Paradoxes in the Global War on Terror

...Contemplating Realities and Paradoxes in the Global War on Terror John B. Alexander, Ph.D. Introduction The approach of this monograph is to examine paradoxes encountered in the Global War on Terror (GWOT). The intent is to spark debate on disputatious issues. Clearly, many of the existing situations appear intractable given the emotional investment that has been made by the public, and exacerbated by political manipulation of elected officials. Also unavoidable are the fiscal constraints that are becoming increasingly binding. Examined in Section One are problematic premises related to the four fundamental approaches to countering terrorism; increased security, eliminating the terrorists, attacking the support infrastructure, and altering conditions that breed discontent. Despite trite, albeit politically popular, commentary proposing those methods, execution of those concepts is extremely difficult, often controversial, and sometimes counterproductive. Section Two of this monograph addresses several other policy decisions that generate problems that are difficult to resolve, but directly impact the forces involved. Among those topics are; roles of contractors, individual loyalties versus national interests, alliances of convenience, foreign response to our policy on preemption of weapons of mass destruction (WMDs), the consequences of our stated objective of spreading democracy, the impact of U.S. presence in the Gulf region, and quandary associated with defining...

Words: 28095 - Pages: 113

Premium Essay

Obama

...       Barack Obama Barack Obama Biography U.S. Representative, U.S. President, Lawyer (1961–) Early Life Barack Hussein Obama was born on August 4, 1961, in Honolulu, Hawaii. His mother, Ann Dunham, grew up in Wichita, Kansas, where her father worked on oil rigs during the Great Depression. After the Japanese attack on Pearl Harbor, Dunham's father, Stanley, enlisted in the service and marched across Europe in Patton's army. Dunham's mother, Madelyn, went to work on a bomber assembly line. After the war, the couple studied on the G.I. Bill, bought a house through the Federal Housing Program and, after several moves, landed in Hawaii. Barack Obama's father, Barack Obama Sr., was born of Luo ethnicity in Nyanza Province, Kenya. Obama Sr. grew up herding goats in Africa, eventually earning a scholarship that allowed him to leave Kenya and pursue his dreams of college in Hawaii. While studying at the University of Hawaii in Manoa, Obama Sr. met fellow student Ann Dunham, and they married on February 2, 1961. Barack was born six months later. Obama did not have a relationship with his father as a child. When his son was still an infant, Obama Sr. relocated to Massachusetts to attend Harvard University, pursuing a Ph.D. Barack's parents officially separated several months later and ultimately divorced in March 1964, when their son was 2. In 1965, Obama Sr. returned to Kenya...

Words: 5520 - Pages: 23

Free Essay

Is Aanteken

...International Security Lecture 1 March 30th, 2015 The politics of security knowledge What is international security? We could start thinking about the security council of the UN But also about the invasion of Afghanistan (chapter 7 UN in order to secure the international security) We can also think about security in terms of the invasion of Iraq in 2003. This was a unilateral act of war, but sure it can also mean other things We can think of the national security agency, the agency in charge of spying all the signals and communications to a certain extent. What’s interesting about the NSA, it is seen as a threat to the security of the privacy. Lately, with the reports of the UN development programme, we start talking about HUMAN security (not military security, but rather the security of individuals, having a livelihood that’s acceptable). Whether security is international or not, it can be a rather confusing word The protection of values we hold dear. We search for it, we pursue it, we achieve it, we deny it to others. * what is to be secured? Is it the security of states? Or individuals? * What is the actual threat that we’re facing? Primarily to be dealing with military threats, or are there other types of threats we are facing. Essentially contested concept A concept that ‘inevitably’ involves endless disputes about their proper uses on the part of their users – Walter Gallie There can be ambiguity (one persons freedom-fighter is the other’s...

Words: 16869 - Pages: 68

Free Essay

01. Raymond Benson as David Michaels - Splinter Cell (2004)

...Table of Contents Title Page Copyright Page Acknowledgements Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Chapter 28 Chapter 29 Chapter 30 Chapter 31 Chapter 32 Chapter 33 Chapter 34 Chapter 35 Chapter 36 Chapter 37 Chapter 38 Chapter 39 Chapter 40 THE BESTSELLING NOVELS OF TOM CLANCY THE TEETH OF THE TIGER A new generation--Jack Ryan, Jr.--takes over in Tom Clancy's extraordinary, and extraordinarily prescient, novel. "INCREDIBLY ADDICTIVE." --Daily Mail (London) RED RABBIT Tom Clancy returns to Jack Ryan's early days-- in an engrossing novel of global political drama . . . "A WILD, SATISFYING RIDE." --New York Daily News THE BEAR AND THE DRAGON A clash of world powers. President Jack Ryan's trial by fire. "HEART-STOPPING ACTION . . . CLANCY STILL REIGNS." --The Washington Post RAINBOW SIX John Clark is used to doing the CIA's dirty work. Now he's taking on the world . . . "ACTION-PACKED." --The New York Times Book Review EXECUTIVE ORDERS A devastating terrorist act leaves Jack Ryan as President of the United States . . . "UNDOUBTEDLY CLANCY'S BEST YET." --The Atlanta Journal-Constitution DEBT OF HONOR It begins with the murder of an American woman in the back streets of Tokyo. It ends in war . . . "A SHOCKER." --Entertainment...

Words: 98950 - Pages: 396

Free Essay

Bahrain

...This is a good article. Click here for more information. Page protected with pending changes level 1 Bahrain From Wikipedia, the free encyclopedia Changes must be reviewed before being displayed on this page. Jump to: navigation, search For other uses, see Bahrain (disambiguation). Kingdom of Bahrain مملكة البحرين Mamlakat al-Baḥrayn Flag Coat of arms Anthem: نشيد البحرين الوطني Bahrainona Our Bahrain Sorry, your browser either has JavaScript disabled or does not have any supported player. You can download the clip or download a player to play the clip in your browser. Location of Bahrain (circled in red)in the Arabian Peninsula (light yellow) Location of Bahrain (circled in red) in the Arabian Peninsula (light yellow) Capital and largest city Manama 26°13′N 50°35′E Official languages Arabic Ethnic groups (2010[1]) 46% Bahraini 45.5% Asian 4.7% other Arabs 1.6% African 1% European 1.2% Other Religion Islam Demonym Bahraini Government Unitary parliamentary constitutional monarchy - King Hamad bin Isa Al Khalifa - Crown Prince Salman bin Hamad bin Isa Al Khalifa - Prime Minister Khalifa bin Salman Al Khalifa Legislature National Assembly - Upper house Consultative Council - Lower house Council of Representatives Independence - Declared Independence [2] 14 August 1971 - from UK [3] 15 August 1971 Area - Total...

Words: 17955 - Pages: 72

Premium Essay

Netwrk Security

...Fundamentals of Network Security John E. Canavan Artech House Boston • London http://www.artechhouse.com Library of Congress Cataloging-in-Publication Data Canavan, John E. Fundamentals of network security / John E. Canavan. p. cm.—(Artech House telecommunications library) Includes bibliographical references and index. ISBN 1-58053-176-8 (alk. paper) 1. Computer security. 2. Computer networks—Security measures. I. Title. II. Series. QA76.9.A25 C364 2000 005.8—dc21 00-050810 CIP British Library Cataloguing in Publication Data Canavan, John E. Fundamentals of network security.—(Artech House telecommunications library) 1. Computer networks—Security measures I. Title 005.8 1-58053-176-8 Cover design by Yekaterina Ratner Microsoft ® screen shots reprinted by permission from Microsoft Corporation. Netscape Communicator browser window © 1999 Netscape Communications Corporation. Used with permission. Netscape Communications has not authorized, sponsored, endorsed, or approved this publication and is not responsible for its content. Permission to reproduce screen shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission. Copyright © 2001 ARTECH HOUSE, INC. 685 Canton Street...

Words: 95027 - Pages: 381

Free Essay

Code

...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...

Words: 190498 - Pages: 762

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Free Essay

Cis 534 - Lab Manual

...CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet...

Words: 48147 - Pages: 193

Free Essay

2009-Report to Congress of the Us-China E and S Review Commission

...2009 REPORT TO CONGRESS of the U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION NOVEMBER 2009 Printed for the use of the U.S.-China Economic and Security Review Commission Available via the World Wide Web: http://www.uscc.gov dkrause on GSDDPC29 with K1 VerDate Nov 24 2008 08:23 Nov 10, 2009 Jkt 052771 PO 00000 Frm 00003 Fmt 6012 Sfmt 6602 M:\USCC\2009\52771.XXX APPS06 PsN: 52771 M:\USCC\USChina.eps Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE 01 NOV 2009 4. TITLE AND SUBTITLE 00-00-2009 to 00-00-2009 ...

Words: 185166 - Pages: 741

Free Essay

Bloodlines of the Illuminati

...the world are an audience to which the Illuminati entertain with propaganda. Just one of the thousands of recent examples of this type of acting done for the public was President Bill Clinton’s 1995 State of the Union address. The speech was designed to push all of the warm fuzzy buttons of his listening audience that he could. All the green lights for acceptance were systematically pushed by the President’s speech with the help of a controlled congressional audience. The truth on the other hand doesn’t always tickle the ear and warm the ego of its listeners. The light of truth in this book will be too bright for some people who will want to return to the safe comfort of their darkness. I am not a conspiracy theorist. I deal with real facts, not theory. Some of the people I write about, I have met. Some of the people I expose are alive and very dangerous. The darkness has never liked the light. Yet, many of the secrets of the Illuminati are locked up tightly simply because secrecy is a way of life. It is such a way of life, that they resent the Carroll Quigleys and the James H. Billingtons who want to tell real historical facts rather than doctored up stories and myths. I have been an intense student of history since I could read, and I am deeply committed to the facts of history rather than the cover stories the public is fed to manipulate them. I do not fear the Illuminati...

Words: 206477 - Pages: 826

Premium Essay

Art of Deception

...THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak Scanned by kineticstomp, revised and enlarged by swift For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources...

Words: 125733 - Pages: 503