BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//scheduler.hope.net//JRCSZU
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:STANDARD
DTSTART:20001029T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T060000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T020000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T020000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T070000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T020000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hope2020-JRCSZU@scheduler.hope.net
DTSTART;TZID=US/Eastern:20200727T210000
DTEND;TZID=US/Eastern:20200727T220000
DESCRIPTION:"Social engineering" is quite familiar to hackers. Instead of b
reaking through encryption or utilizing a zero-day exploit\, it's often ea
sier to get a password or network access by simply asking for it. It can b
e done over the phone\, via email\, or even in an in-person visit. The app
roach is often highly targeted\, designed for a specific individual. This
form of social engineering began among the phone phreaks in the 1970s\, an
d by the 2000s\, it has become a professionalized practice\, complete with
a systematized process of gathering OSINT\, developing pretexts\, engagin
g\, and writing up reports.
This presentation explores two less-fam
iliar areas of social engineering. First\, there will be a look back to a
time before the phone phreaks and hackers to another group of people who c
alled themselves social engineers: late 19th and early 20th century social
reformers and public relations professionals\, specifically Edward Bernay
s and Doris Fleischman\, who developed the "engineering of consent" progra
m of using mass media to persuade people to adopt ways of thinking. This e
arlier form is referred to as mass social engineering\, in contrast with t
he phone phreak and hacker version of interpersonal social engineering. Ro
bert and Sean will look forward beyond the hacker form of interpersonal so
cial engineering to consider a contemporary\, emerging mixture of these tw
o forms that are called masspersonal social engineering.
While the
phreaks and hackers often targeted individuals\, and the consent engineers
targeted masses\, masspersonal social engineering is a new form that leve
rages social media to target individuals on a mass scale. It relies on int
erpersonal\, hacker social engineering techniques\, but it has societal-sh
aping ambitions. A key example of this new form is the Russian election in
terference campaign of 2016.
Overall\, this presentation places hac
ker social engineering into a larger historical context and shows how soci
al engineering is a serious matter\, not only for organizational security
but also for geopolitics.
DTSTAMP:20200907T012706Z
LOCATION:Public Talk Stream
SUMMARY:A History of Social Engineering: From Mass to Interpersonal to Mass
personal - Robert W. Gehl\, Sean Lawson
URL:http://scheduler.hope.net/hope2020/talk/JRCSZU/
END:VEVENT
END:VCALENDAR