![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Kes: Apologies for these notes being kind of a formatting mess--I'll be neatening them up and adding to them soon, but wanted to post them before the panel.
"I'm In": Infiltration Techniques for Writers
Panel description: How can characters get into spaces they aren't supposed to be, whether physical or virtual? What makes these scenes feel plausible? Panelists will analyze the literary possibilities in various infiltration techniques--including those that rely on technical skills (such as lockpicking or hacking) and those that rely on social engineering--and suggest useful reference works and successful fictional depictions.
After spending the past two months reading books and watching movies about hackers, thieves, con artists, etc., I've come to the conclusion that there are very few books or movies which will provide any useful information regarding how to pick a lock, hack a computer system, or pull off the perfect con. The reason for this is that, like any art, you are required to put in hours and hours of research and repetitive practice, which is mind-numbingly boring to anyone viewing it from the outside, and when you actually do something really impressive, it is usually indetectable to anyone other than another expert. In addition, most people find the highly technical details of hacking, lockpicking, and the logistics of planning a heist become boring after the first five minutes, even after you have translated the specialized language, be it slang, cant, or technical jargon, into plain language.
If you want to test this statement, go and try reading Neal Stephenson's novel
_Cryptonomicon_, in which the author includes a lot of information and history about cryptography. I can't tell you much about it myself because the novel is over eleven hundred pages long, and I kept falling asleep, so I can't speak as to whether the novel works on a narrative level, though many of my programmer friends have praised it highly for its technical content.
However, there are many hackers, thieves, social engineers, and former covert ops people who offer advice on how to commit crimes, or how to defend yourself against having these crimes committed against you, and many of these people have posted articles and videoes on the Internet. So after discussing my few fictional recommendations, this article will mostly be dedicated to discussing nonfictional resources for learning how to be good at, as Squirrel Girl would say, criming.
This is the part where I insert a statement declaring that I neither condone nor encourage the committing of any of the illegal acts described in this document, and that this article is provided strictly as an infomational resource for writers and for the purposes of entertainment.
If you're only going to watch one TV show, I recommend Leverage (2008-2012) and the sequel Leverage: Redemption (2021). It's witty, upbeat, and has strong female and black characters.
It's also reminiscent of the much earlier movie Sneakers (Dir. Phil Alden Robinson, 1992), which featured a similar team of hackers, criminals, and outcasts, and which was recently rereleased on Blue Ray with new commentary tracks https://www.youtube.com/watch?v=DXWdj5-CTjI , a personal favorite of mine because it includes a blind hacker character based on a real-life blind hacker named Whistler. Sneakers introduced the idea of the "red team," a group of hacers who are hired to penetrate a company or agency's security in order to expose vulnerabilities.
Leverage has a consistent format which typically begins with the team acquiring the "job" which will provide the mark that they are going to con, and then Hardison, the hacker, will next give the rest of the team a presentation on the results of his research. Nate Ford, the mastermind, comes up with the plan, and the rest of the team, which includes a grifter, a theief, and a former covert ops soldier, contribute their own skills.
Whether you want to hack a computer system, ppik a lock, plan a heist, pull a con, or commit a covert operation, it all begins with research and reconnaissance, and this could take anywhere from days to months, maybe even a year for a major job.
In _The Lies of Locke Lamora_ by Scott Lynch, Lock has this thought: LOCKE LAMORA’S RULE of thumb was this: a good confidence game took three months to plan, three weeks to rehearse, and three seconds to win or lose the victim’s trust forever.
There is a classic movie which does a great job of demonstrating this: The Sting, starring Paul Newman and Robert Redford. We spend most of the movie watching Paul Newman's character, a legendary con man, teach Robert Redford's character, the hot-headed youngster, how to set up a con (toxic trope alert: it's the murder of Redford's partner and best friend, a black man and an obvious good guy, which instigates the action in the film).
The Sting is worth watching for a number of reasons: it's a classic movie, the acting, especially Newman's con artist, is superb, and the story of a bunch of small-time con men trying to con a big-time crime boss has a certain timeless Robin Hood feel to it.
Another reason to watch The Sting is that it demonstrates something at the heart of a con: a con is a story the con artist tells the mark and, like the best stories, it has to persuade the audience that it's real. The movie, "The Brothers Bloom," starring Mark Ruffalo and Adrian Brody," is all about this idea of the con as a narrative, or the story as con, and the playwright David Mamet is practically obsessed by this idea, and writes about it often
But The Sting is, when it comes right down to it, a dramatization of a classic text--the classic text--about American con men, _The Big Con: The Story of the Confidence Man_ by David Maurer (originally published in 1940 and reissued by Anchor Books in 1999) .
This is the classic text on cons, in large part because it was written by a linguist, and he captured the language of the con artists themselves, and that language is still a kind of poetry which fascinates writers and directors themselves.
The 9 Stages of the Big Con
summarized from David Maurer's classic book
http://www.amyreading.com/the-9-stages-of-the-big-con.html
These can be reduced to picking the mark, roping the mark, telling the tale, giving the convincer, putting him on the send, taking off the touch, and the blowoff.
If you don't have the time to read The Big Con, or if you want to find an online list of cons along with suggestions for various books, comics, movies, and TV shows in which they appear, refer to the vastly indexed
The Con on TV Tropes
https://tvtropes.org/pmwiki/pmwiki.php/Main/TheCon
Note that Leverage will name check many of these classic cons, either in the episode titles or in the characters's spoken dialogue.
The Leverage Wiki also provides a breakdown of the stages and the players in a typical long, i.e., planned, con, such as the complicated ones planned and pulled off by the Leverage team
https://leverage.fandom.com/wiki/The_Long_Con
Leverage is great at demonstrating at how the oldest cons can always be updated, and fans continue to reference Leverage not just in fan fiction but in more surprising media such as
the graphic novel, Real Science Adventures - The Nicodemus Job set in Constantinople 1095 c. (2018) by Brian Leverage
and a current Kickstarter for a collaborative game, Stealing Stories from the Devil
https://www.kickstarter.com/projects/montecookgames/the-devil-made-us-do-it?ref=3zzfvy
Two more resources, the first on the psychology of both the con artist and the mark, and the second on cons during the Elizabethan period:
The Confidence Game: Why We Fall for It... Every Time by Maria Konnikova (2016) [Available through NLS]
Robert Greene, a contemporary of Shakespeare, wrote an exposé of Elizabethan con artists in his 1591 pamphlet "A Notable Discoverie of Cozenage." "Cozenage" means "trickery," and the scams were known as "Cony-catching."
https://www.exclassics.com/cony/conyintro.htm
Social engineering explained: How criminals exploit human behavior
Josh Fruhlinger
https://www.csoonline.com/article/2124681/what-is-social-engineering.html
In _The Art of Deception_ by Kevin Mitnick, he claims that there are only five basic social engineering scripts: "Can I help you?" and "Can you help me?" being the two most used.
Social Engineering at TV Tropes
https://tvtropes.org/pmwiki/pmwiki.php/Main/SocialEngineering
Note: Social engineering is not the same thing as
NLP (neuro linguistic programming
https://en.wikipedia.org/wiki/Neuro-linguistic_programming
Hacker Lexicon
https://www.wired.com/tag/hacker-lexicon/
Debunking the Hacker Stereotype
https://blog.malwarebytes.com/101/2016/10/debunking-hacker-stereotypes-who-are-the-real-monsters/
Hollywood Hacking
https://tvtropes.org/pmwiki/pmwiki.php/Main/HollywoodHacking
includes the infamous
"It's a UNIX system. I know this."
https://www.reddit.com/r/itsaunixsystem/
Misleading Cybersecurity Lessons from Pop Culture
https://blog.malwarebytes.com/awareness/2020/02/misleading-cybersecurity-lessons-from-pop-culture-how-hollywood-teaches-to-hack/
How to Hack (Wiki)
https://www.wikihow.com/Hack
How to Find Out a Password
https://www.wikihow.com/Find-Out-a-Password
How to Hack a Website
https://www.wikihow.com/Hack-a-Website
How to Hack a Computer
https://www.wikihow.com/Hack-a-Computer
The ultimate resources to find out what hackers do are the two annual conferences, Black Hat, the professional "grownup" conference, and its counterpart, the less well-behaved and somewhat infamous Defcon. Both of these conventions archives talks, slides, and other materials from their events, and the Defcon website in particular is a rich source for finding out about what hackers actually get up to, both the good and the bad.
Black Hat YouTube channel,
https://www.youtube.com/user/BlackHatOfficialYT
DefCon website
https://defcon.org
Defcon Youtube page
https://www.youtube.com/user/DEFCONConference
Hacking for Beginners: The Ultimate Guide To Becoming A Hacker by Bob Bittex (2017)
How to Be an Ethical Hacker
Hacking for Kids (Fall, 2021)
Top Ten Best Hacking Documentaries of All Time
https://portswigger.net/daily-swig/the-top-10-best-hacking-documentaries-of-all-time
Intelligence by Physical Reconnaissance Lock Bypass Village talk
How does a hacker get floor plans? How does a thief know where the ventilation shafts will be?
https://www.youtube.com/watch?v=ACsPMFISCdw
DIY Bypass Tools
https://www.youtube.com/watch?v=_5h-IF-Mqxo
Apollo Robbin's performances utilize pick-pocketing and sleight-of-hand to demonstrate proximity manipulation, diversion techniques, and attention control.
The Art of Misdirection Ted Talk
https://www.ted.com/talks/apollo_robbins_the_art_of_misdirection/transcript
A Pickpocket’s Tale: The spectacular thefts of Apollo Robbins. By Adam Green The New Yorker December 30, 2012
https://www.newyorker.com/magazine/2013/01/07/a-pickpockets-tale
“Whiz Mob: A Correlation of the Technical Argot of Pickpockets with Their Behavior Patterns,” (1964) by David W. Maurer
How to Pickpocket
https://www.survivalfitnessplan.com/how-to-pickpocket/#content
The Picked Lock - Break Into Your Own Home So They Can't
An introduction to lockpicking which then applies concepts to improving your own home security
https://www.consumersadvocate.org/home-security/the-picked-lock-break-into-your-own-home-so-they-cant
Inside the hidden world of competitive lockpicking by Steph Panecasio July 30, 2020
https://www.cnet.com/news/inside-the-hidden-world-of-competitive-lockpicking/
Kes: This next resouce is where I purchased my lockpick set from
TOOOL, The Open Organization Of Lockpickers and Lockpicking (U.S.)
https://toool.us/
Copying keys from photos, molds, and more by Deviant Ollam
https://www.youtube.com/watch?v=AayXf5aRFTI
Deviant Ollam – Eyes of a Thief – Job Stories from a Professional Covert Entry Artist — Secure360
https://secure360.org/session/deviant-ollam-eyes-of-a-thief-job-stories-from-a-professional-covert-entry-artist/?conference=11809&date=20200505#genesis-content
Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking teachers.
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking.
Red Team Tools
https://redteamtools.com/
You're probably not red teaming...and usually I'm not, either
https://www.youtube.com/watch?v=mj2iSdBw4-0
Lockwiki.com
Lockwiki is the home of all things related to the security and compromise of locks, safes, and keys.
http://www.lockwiki.com/index.php/Main_Page
Barton Whaley was a consultant for the military, a
member of the Magic Castle,
https://geniimagazine.com/wiki/index.php?title=Bart_Whaley
and the founder of "deception studies," who produced a number of textbooks on the subject of the use of magic in military deception throughout history
https://www.lybrary.com/barton-whaley-m-191.html
In their Las Vegas act, Penn narrates each step while Teller demonstrates how something as banal as
lighting a cigarette
https://www.youtube.com/watch?v=2azeC57Fn4c
can turn out to be an illusion. What appears to be a cigarette is actually a pencil stub. What the audience thinks is a lighter is really a tiny flashlight. The trick illustrates the
seven basic principles of magic: palm, ditch, steal, simulation, load, misdirection, and switch.
Magic Vs. Lying | Penn & Teller Teach the Art of Magic | MasterClass
https://www.masterclass.com/classes/penn-and-teller-teach-the-art-of-magic/chapters/magic-vs-lying#
What is a French Drop?
https://www.masterclass.com/articles/magic-101-what-is-a-french-drop-learn-magic-coin-tricks-to-try-at-home#:~:text=What%20Real%20Action%20Does%20a%20French%20Drop%20Mimic%3F,inward%20slightly%2C%20relaxes%2C%20and%20drops%20at%20the%20wrist.
Teller Reveals His Secrets
By Teller
SMITHSONIAN MAGAZINE
MARCH 2012
https://www.smithsonianmag.com/arts-culture/teller-reveals-his-secrets-100744801/#Primary-Navigation
Teller Talks: The Science Behind Magic Tricks : NPR
March 5, 2012
https://www.npr.org/2012/03/05/147980272/teller-talks-magicians-use-science-to-trick-you
What Do We Learn About Psychology From Penn & Teller?
https://www.online-psychology-degrees.org/study/psychology-from-penn-teller/
Misdirection in magic: Implications for the relationship between eye gaze and attention: Visual Cognition: Vol 16, No 2-3
https://www.tandfonline.com/doi/abs/10.1080/13506280701479750
Become a Better Liar and Live a Better Life
Verified by Psychology Today
Jack Schafer Ph.D.
Posted March 29, 2012
https://www.psychologytoday.com/us/blog/let-their-words-do-the-talking/201203/become-better-liar-and-live-better-life
How to Be a Better Liar
To get good at bending the truth, you have to first know why most people are terrible at it
Joline Buscemi
Feb 20, 2020
https://forge.medium.com/how-to-be-a-better-liar-b023e9b8da23
Former FBI agent and body language expert Joe Navarro answers the internet's burning questions about body language.
https://www.wired.com/video/watch/tech-support-former-fbi-agent-answers-body-language-questions-from-twitter
Eye Movements When Lying: Reality or Myth? - Learning Mind
https://www.learning-mind.com/eye-movements-when-lying/
"I'm In": Infiltration Techniques for Writers
Panel description: How can characters get into spaces they aren't supposed to be, whether physical or virtual? What makes these scenes feel plausible? Panelists will analyze the literary possibilities in various infiltration techniques--including those that rely on technical skills (such as lockpicking or hacking) and those that rely on social engineering--and suggest useful reference works and successful fictional depictions.
After spending the past two months reading books and watching movies about hackers, thieves, con artists, etc., I've come to the conclusion that there are very few books or movies which will provide any useful information regarding how to pick a lock, hack a computer system, or pull off the perfect con. The reason for this is that, like any art, you are required to put in hours and hours of research and repetitive practice, which is mind-numbingly boring to anyone viewing it from the outside, and when you actually do something really impressive, it is usually indetectable to anyone other than another expert. In addition, most people find the highly technical details of hacking, lockpicking, and the logistics of planning a heist become boring after the first five minutes, even after you have translated the specialized language, be it slang, cant, or technical jargon, into plain language.
If you want to test this statement, go and try reading Neal Stephenson's novel
_Cryptonomicon_, in which the author includes a lot of information and history about cryptography. I can't tell you much about it myself because the novel is over eleven hundred pages long, and I kept falling asleep, so I can't speak as to whether the novel works on a narrative level, though many of my programmer friends have praised it highly for its technical content.
However, there are many hackers, thieves, social engineers, and former covert ops people who offer advice on how to commit crimes, or how to defend yourself against having these crimes committed against you, and many of these people have posted articles and videoes on the Internet. So after discussing my few fictional recommendations, this article will mostly be dedicated to discussing nonfictional resources for learning how to be good at, as Squirrel Girl would say, criming.
This is the part where I insert a statement declaring that I neither condone nor encourage the committing of any of the illegal acts described in this document, and that this article is provided strictly as an infomational resource for writers and for the purposes of entertainment.
If you're only going to watch one TV show, I recommend Leverage (2008-2012) and the sequel Leverage: Redemption (2021). It's witty, upbeat, and has strong female and black characters.
It's also reminiscent of the much earlier movie Sneakers (Dir. Phil Alden Robinson, 1992), which featured a similar team of hackers, criminals, and outcasts, and which was recently rereleased on Blue Ray with new commentary tracks https://www.youtube.com/watch?v=DXWdj5-CTjI , a personal favorite of mine because it includes a blind hacker character based on a real-life blind hacker named Whistler. Sneakers introduced the idea of the "red team," a group of hacers who are hired to penetrate a company or agency's security in order to expose vulnerabilities.
Leverage has a consistent format which typically begins with the team acquiring the "job" which will provide the mark that they are going to con, and then Hardison, the hacker, will next give the rest of the team a presentation on the results of his research. Nate Ford, the mastermind, comes up with the plan, and the rest of the team, which includes a grifter, a theief, and a former covert ops soldier, contribute their own skills.
Whether you want to hack a computer system, ppik a lock, plan a heist, pull a con, or commit a covert operation, it all begins with research and reconnaissance, and this could take anywhere from days to months, maybe even a year for a major job.
In _The Lies of Locke Lamora_ by Scott Lynch, Lock has this thought: LOCKE LAMORA’S RULE of thumb was this: a good confidence game took three months to plan, three weeks to rehearse, and three seconds to win or lose the victim’s trust forever.
There is a classic movie which does a great job of demonstrating this: The Sting, starring Paul Newman and Robert Redford. We spend most of the movie watching Paul Newman's character, a legendary con man, teach Robert Redford's character, the hot-headed youngster, how to set up a con (toxic trope alert: it's the murder of Redford's partner and best friend, a black man and an obvious good guy, which instigates the action in the film).
The Sting is worth watching for a number of reasons: it's a classic movie, the acting, especially Newman's con artist, is superb, and the story of a bunch of small-time con men trying to con a big-time crime boss has a certain timeless Robin Hood feel to it.
Another reason to watch The Sting is that it demonstrates something at the heart of a con: a con is a story the con artist tells the mark and, like the best stories, it has to persuade the audience that it's real. The movie, "The Brothers Bloom," starring Mark Ruffalo and Adrian Brody," is all about this idea of the con as a narrative, or the story as con, and the playwright David Mamet is practically obsessed by this idea, and writes about it often
But The Sting is, when it comes right down to it, a dramatization of a classic text--the classic text--about American con men, _The Big Con: The Story of the Confidence Man_ by David Maurer (originally published in 1940 and reissued by Anchor Books in 1999) .
This is the classic text on cons, in large part because it was written by a linguist, and he captured the language of the con artists themselves, and that language is still a kind of poetry which fascinates writers and directors themselves.
The 9 Stages of the Big Con
summarized from David Maurer's classic book
http://www.amyreading.com/the-9-stages-of-the-big-con.html
These can be reduced to picking the mark, roping the mark, telling the tale, giving the convincer, putting him on the send, taking off the touch, and the blowoff.
If you don't have the time to read The Big Con, or if you want to find an online list of cons along with suggestions for various books, comics, movies, and TV shows in which they appear, refer to the vastly indexed
The Con on TV Tropes
https://tvtropes.org/pmwiki/pmwiki.php/Main/TheCon
Note that Leverage will name check many of these classic cons, either in the episode titles or in the characters's spoken dialogue.
The Leverage Wiki also provides a breakdown of the stages and the players in a typical long, i.e., planned, con, such as the complicated ones planned and pulled off by the Leverage team
https://leverage.fandom.com/wiki/The_Long_Con
Leverage is great at demonstrating at how the oldest cons can always be updated, and fans continue to reference Leverage not just in fan fiction but in more surprising media such as
the graphic novel, Real Science Adventures - The Nicodemus Job set in Constantinople 1095 c. (2018) by Brian Leverage
and a current Kickstarter for a collaborative game, Stealing Stories from the Devil
https://www.kickstarter.com/projects/montecookgames/the-devil-made-us-do-it?ref=3zzfvy
Two more resources, the first on the psychology of both the con artist and the mark, and the second on cons during the Elizabethan period:
The Confidence Game: Why We Fall for It... Every Time by Maria Konnikova (2016) [Available through NLS]
Robert Greene, a contemporary of Shakespeare, wrote an exposé of Elizabethan con artists in his 1591 pamphlet "A Notable Discoverie of Cozenage." "Cozenage" means "trickery," and the scams were known as "Cony-catching."
https://www.exclassics.com/cony/conyintro.htm
Social engineering explained: How criminals exploit human behavior
Josh Fruhlinger
https://www.csoonline.com/article/2124681/what-is-social-engineering.html
In _The Art of Deception_ by Kevin Mitnick, he claims that there are only five basic social engineering scripts: "Can I help you?" and "Can you help me?" being the two most used.
Social Engineering at TV Tropes
https://tvtropes.org/pmwiki/pmwiki.php/Main/SocialEngineering
Note: Social engineering is not the same thing as
NLP (neuro linguistic programming
https://en.wikipedia.org/wiki/Neuro-linguistic_programming
Hacker Lexicon
https://www.wired.com/tag/hacker-lexicon/
Debunking the Hacker Stereotype
https://blog.malwarebytes.com/101/2016/10/debunking-hacker-stereotypes-who-are-the-real-monsters/
Hollywood Hacking
https://tvtropes.org/pmwiki/pmwiki.php/Main/HollywoodHacking
includes the infamous
"It's a UNIX system. I know this."
https://www.reddit.com/r/itsaunixsystem/
Misleading Cybersecurity Lessons from Pop Culture
https://blog.malwarebytes.com/awareness/2020/02/misleading-cybersecurity-lessons-from-pop-culture-how-hollywood-teaches-to-hack/
How to Hack (Wiki)
https://www.wikihow.com/Hack
How to Find Out a Password
https://www.wikihow.com/Find-Out-a-Password
How to Hack a Website
https://www.wikihow.com/Hack-a-Website
How to Hack a Computer
https://www.wikihow.com/Hack-a-Computer
The ultimate resources to find out what hackers do are the two annual conferences, Black Hat, the professional "grownup" conference, and its counterpart, the less well-behaved and somewhat infamous Defcon. Both of these conventions archives talks, slides, and other materials from their events, and the Defcon website in particular is a rich source for finding out about what hackers actually get up to, both the good and the bad.
Black Hat YouTube channel,
https://www.youtube.com/user/BlackHatOfficialYT
DefCon website
https://defcon.org
Defcon Youtube page
https://www.youtube.com/user/DEFCONConference
Hacking for Beginners: The Ultimate Guide To Becoming A Hacker by Bob Bittex (2017)
How to Be an Ethical Hacker
Hacking for Kids (Fall, 2021)
Top Ten Best Hacking Documentaries of All Time
https://portswigger.net/daily-swig/the-top-10-best-hacking-documentaries-of-all-time
Intelligence by Physical Reconnaissance Lock Bypass Village talk
How does a hacker get floor plans? How does a thief know where the ventilation shafts will be?
https://www.youtube.com/watch?v=ACsPMFISCdw
DIY Bypass Tools
https://www.youtube.com/watch?v=_5h-IF-Mqxo
Apollo Robbin's performances utilize pick-pocketing and sleight-of-hand to demonstrate proximity manipulation, diversion techniques, and attention control.
The Art of Misdirection Ted Talk
https://www.ted.com/talks/apollo_robbins_the_art_of_misdirection/transcript
A Pickpocket’s Tale: The spectacular thefts of Apollo Robbins. By Adam Green The New Yorker December 30, 2012
https://www.newyorker.com/magazine/2013/01/07/a-pickpockets-tale
“Whiz Mob: A Correlation of the Technical Argot of Pickpockets with Their Behavior Patterns,” (1964) by David W. Maurer
How to Pickpocket
https://www.survivalfitnessplan.com/how-to-pickpocket/#content
The Picked Lock - Break Into Your Own Home So They Can't
An introduction to lockpicking which then applies concepts to improving your own home security
https://www.consumersadvocate.org/home-security/the-picked-lock-break-into-your-own-home-so-they-cant
Inside the hidden world of competitive lockpicking by Steph Panecasio July 30, 2020
https://www.cnet.com/news/inside-the-hidden-world-of-competitive-lockpicking/
Kes: This next resouce is where I purchased my lockpick set from
TOOOL, The Open Organization Of Lockpickers and Lockpicking (U.S.)
https://toool.us/
Copying keys from photos, molds, and more by Deviant Ollam
https://www.youtube.com/watch?v=AayXf5aRFTI
Deviant Ollam – Eyes of a Thief – Job Stories from a Professional Covert Entry Artist — Secure360
https://secure360.org/session/deviant-ollam-eyes-of-a-thief-job-stories-from-a-professional-covert-entry-artist/?conference=11809&date=20200505#genesis-content
Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking teachers.
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking.
Red Team Tools
https://redteamtools.com/
You're probably not red teaming...and usually I'm not, either
https://www.youtube.com/watch?v=mj2iSdBw4-0
Lockwiki.com
Lockwiki is the home of all things related to the security and compromise of locks, safes, and keys.
http://www.lockwiki.com/index.php/Main_Page
Barton Whaley was a consultant for the military, a
member of the Magic Castle,
https://geniimagazine.com/wiki/index.php?title=Bart_Whaley
and the founder of "deception studies," who produced a number of textbooks on the subject of the use of magic in military deception throughout history
https://www.lybrary.com/barton-whaley-m-191.html
In their Las Vegas act, Penn narrates each step while Teller demonstrates how something as banal as
lighting a cigarette
https://www.youtube.com/watch?v=2azeC57Fn4c
can turn out to be an illusion. What appears to be a cigarette is actually a pencil stub. What the audience thinks is a lighter is really a tiny flashlight. The trick illustrates the
seven basic principles of magic: palm, ditch, steal, simulation, load, misdirection, and switch.
Magic Vs. Lying | Penn & Teller Teach the Art of Magic | MasterClass
https://www.masterclass.com/classes/penn-and-teller-teach-the-art-of-magic/chapters/magic-vs-lying#
What is a French Drop?
https://www.masterclass.com/articles/magic-101-what-is-a-french-drop-learn-magic-coin-tricks-to-try-at-home#:~:text=What%20Real%20Action%20Does%20a%20French%20Drop%20Mimic%3F,inward%20slightly%2C%20relaxes%2C%20and%20drops%20at%20the%20wrist.
Teller Reveals His Secrets
By Teller
SMITHSONIAN MAGAZINE
MARCH 2012
https://www.smithsonianmag.com/arts-culture/teller-reveals-his-secrets-100744801/#Primary-Navigation
Teller Talks: The Science Behind Magic Tricks : NPR
March 5, 2012
https://www.npr.org/2012/03/05/147980272/teller-talks-magicians-use-science-to-trick-you
What Do We Learn About Psychology From Penn & Teller?
https://www.online-psychology-degrees.org/study/psychology-from-penn-teller/
Misdirection in magic: Implications for the relationship between eye gaze and attention: Visual Cognition: Vol 16, No 2-3
https://www.tandfonline.com/doi/abs/10.1080/13506280701479750
Become a Better Liar and Live a Better Life
Verified by Psychology Today
Jack Schafer Ph.D.
Posted March 29, 2012
https://www.psychologytoday.com/us/blog/let-their-words-do-the-talking/201203/become-better-liar-and-live-better-life
How to Be a Better Liar
To get good at bending the truth, you have to first know why most people are terrible at it
Joline Buscemi
Feb 20, 2020
https://forge.medium.com/how-to-be-a-better-liar-b023e9b8da23
Former FBI agent and body language expert Joe Navarro answers the internet's burning questions about body language.
https://www.wired.com/video/watch/tech-support-former-fbi-agent-answers-body-language-questions-from-twitter
Eye Movements When Lying: Reality or Myth? - Learning Mind
https://www.learning-mind.com/eye-movements-when-lying/
no subject
Date: 2021-08-14 11:22 pm (UTC)A problem I often have is how to take research like this back to earlier eras. I have a fantasy series based on Late Antiquity that includes a few spies. When I was writing a lockpicking scene, I happened to have on hand a children's history book, Robert Kraske's Silent Sentinels: The Story Of Locks, Vaults, And Burglar Alarms, which had some information on locks in ancient times. But I really should hunt down a range of historical resources on this topic.
no subject
Date: 2021-08-15 11:44 am (UTC)Apologizing for my inappropriate word choice
Date: 2021-08-15 05:39 pm (UTC)Quoting from National Association of the Deaf https://www.nad.org/resources/american-sign-language/community-and-culture-frequently-asked-questions/
Deaf-Mute – Another offensive term from the 18th-19th century, “mute” also means silent and without voice. This label is technically inaccurate, since deaf and hard of hearing people generally have functioning vocal chords. The challenge lies with the fact that to successfully modulate your voice, you generally need to be able to hear your own voice. Again, because deaf and hard of hearing people use various methods of communication other than or in addition to using their voices, they are not truly mute. True communication occurs when one’s message is understood by others, and they can respond in kind.
no subject
Date: 2021-08-15 04:29 pm (UTC)Most excellent resource.
no subject
Date: 2021-08-15 11:21 pm (UTC)no subject
Date: 2021-08-16 10:48 am (UTC)When I find the Youtube link I will post it.