You are on page 1of 10

theme development

verb tense
voice
wedging the alibi approach
words
interview versus interrogation
intimidation
IP addresses, servers, hosting
K
Kaspersky Labs, social networks
key phrases, matching
kindness, rapport building and
kinesthetic thinker
sub-modalities
touching objects
Kmart’s planogram
knowledge
assumed
rapport and
Kurgan, Murgis
L
labeling
Lakoff, George
Langer, Ellen
mindlessness
laugh tracks, social proof and
law of expectations
lawyers
leaders, social authority and
leading questions
leads, warm leads
legal authority
legal issues, pretexting
Li, Wen
liking
first impressions
influence and
marketing and
physical attractiveness and
steps to get people to
Tupperware parties
LinkedIn
lips. See also mouth/lips
listening
distractions
feedback
versus hearing
interrupting
paying attention
proof
rapport building and
responses
reflective responding
lock picks
bump keys
Bump Proof BiLock
electronic locks
kits
magnetic locks
padlock shims
picking locks
practice
raking
shove knives
locks
Loftus, Elizabeth
logical approach to interrogation
Long, Johnny, Google Hacking for Penetration Testers
Los Alamos scientist in China
loss of privilege
Lustig, Victor
M
Machlin, Evangeline, Dialects for the Stage
macroexpressions
magnetic locks
malicious hackers
Maltego
manipulation
anxiety
color associations
black
blue
brown
gold
green
orange
purple
red
white
yellow
conditioning
control over environment
cults
definitions
diversion
doubt
emotional responses
goals
guilt
humiliation
incentives
financial
ideological
social
intimidation
loss of privilege
Motrin recall
planogram
positive
powerlessness
product placement
shoppers
music loops
social anxiety disorder campaign
suggestibility and
increasing
pen clicks
undermining beliefs
uses
marketing
beauty and
conditioning
consistency
ideological incentives
liking and
social anxiety disorder campaign
Matherly, John
Mehrabian, Albert
Michon, Richard
micro-movements
microexpressions
deception detection
Ekman, Paul
emotions
training
emotions
anger
contempt
disgust
fear
happiness
limitations
mirroring
neurolinguistic hacking
sadness
social engineers and
stoic eyes
surprise
training to see
micromomentary expressions
microsoft.com PDF files
Milan, Cesar
mindlessness, Ellen Langer
mirroring gestures
mirroring microexpressions
Mischke, Tom
mistakes, purposeful
mitigation
audits and
auditor selection
goal setting
included items
personal security awareness culture
scripts
software update maintenance
steps
Mitnick, Kevin
The Art of Deception
DMV hack
Social Security Administration hack
Mizrahi, Avi
modes of thinking
auditory thinkers
dominant sense, discernment
FBI memo
importance of
interrogation and
kinesthetic thinkers
sub-modalities
listening for
observation
pen exercise
senses
sub-modalities
visual thinkers
sub-modalities
“Modification of Audible and Visual Speech”
Morgan, Scott
Morgan Stanley employee theft
Moriarty, Thomas, radio stealing at beach
Motrin recall
Moulton, Scott, port scans
mouth/lips, interrogation and
movies, preloading and
Mularski, J. Keith, DarkMarket
music loops for shopper manipulation
N
natural-born leaders
needs, psychological
negation, embedded commands and
negotiation, concessions
neurolinguistic hacking
Nickerson, Chris
pretexting
Nigerian Scam
NLP (neurolinguistic programming)
Bandler, Richard
Bateson, Gregory
Brandler, Richard
breathing rate
codes
Condon, William
conscious/unconscious relationships
definition
DeLozier, Judith
Grinder, John
history
influence and
key phrases
meta-model
new code
perceptual filters
Planet NLP
scripts
sentence structure
social engineers’ uses
speech pattern matching
states
Ultimate Voice
vocal tone matching
voice
NMAP, port scans
nonverbal communication
NSA (National Security Agency), elicitation
O
objections
obligation
observation
office sounds
online tools
Maltego
SET (Social Engineer Toolkit)
open-ended questions
open palm
opening lines
opening up
orange color association
orbicularis oculi muscle in smiling
organizational authority
O’Sullivan, Maureen
Ekman, Paul
Wizards Project
Overconfident CEO hack
P
padlock shims
pain tolerance, social modeling and
Paller, Ken A.
password profilers
CeWl
CUPP (Common User Password Profiler)
WYD (Who’s Your Daddy)
passwords
attack list
BitDefender study
commonly used themes
past tense for negatives
Pavlov, Ivan
paying attention
pen click manipulation
penetration testers
program crashes
perception
communication and
framing and
person in distress
personal attachments of target
personal information, websites offering
personal interests, pretexting and
personal realities and communication
personal security awareness culture
personal websites
persuasion. See also influence
conditioning, marketing
consensus
emotions and
flexibility and
goals
liking and
first impressions
physical attractiveness
manipulation
color
conditioning
control over environment
definitions
diversion
doubt
emotional responses

You might also like