kestrell: (Default)
[personal profile] kestrell
Kes: Apologies for these notes being kind of a formatting mess--I'll be neatening them up and adding to them soon, but wanted to post them before the panel.

"I'm In": Infiltration Techniques for Writers
Panel description: How can characters get into spaces they aren't supposed to be, whether physical or virtual? What makes these scenes feel plausible? Panelists will analyze the literary possibilities in various infiltration techniques--including those that rely on technical skills (such as lockpicking or hacking) and those that rely on social engineering--and suggest useful reference works and successful fictional depictions.

After spending the past two months reading books and watching movies about hackers, thieves, con artists, etc., I've come to the conclusion that there are very few books or movies which will provide any useful information regarding how to pick a lock, hack a computer system, or pull off the perfect con. The reason for this is that, like any art, you are required to put in hours and hours of research and repetitive practice, which is mind-numbingly boring to anyone viewing it from the outside, and when you actually do something really impressive, it is usually indetectable to anyone other than another expert. In addition, most people find the highly technical details of hacking, lockpicking, and the logistics of planning a heist become boring after the first five minutes, even after you have translated the specialized language, be it slang, cant, or technical jargon, into plain language.

If you want to test this statement, go and try reading Neal Stephenson's novel
_Cryptonomicon_, in which the author includes a lot of information and history about cryptography. I can't tell you much about it myself because the novel is over eleven hundred pages long, and I kept falling asleep, so I can't speak as to whether the novel works on a narrative level, though many of my programmer friends have praised it highly for its technical content.

However, there are many hackers, thieves, social engineers, and former covert ops people who offer advice on how to commit crimes, or how to defend yourself against having these crimes committed against you, and many of these people have posted articles and videoes on the Internet. So after discussing my few fictional recommendations, this article will mostly be dedicated to discussing nonfictional resources for learning how to be good at, as Squirrel Girl would say, criming.

This is the part where I insert a statement declaring that I neither condone nor encourage the committing of any of the illegal acts described in this document, and that this article is provided strictly as an infomational resource for writers and for the purposes of entertainment.

If you're only going to watch one TV show, I recommend Leverage (2008-2012) and the sequel Leverage: Redemption (2021). It's witty, upbeat, and has strong female and black characters.

It's also reminiscent of the much earlier movie Sneakers (Dir. Phil Alden Robinson, 1992), which featured a similar team of hackers, criminals, and outcasts, and which was recently rereleased on Blue Ray with new commentary tracks https://www.youtube.com/watch?v=DXWdj5-CTjI , a personal favorite of mine because it includes a blind hacker character based on a real-life blind hacker named Whistler. Sneakers introduced the idea of the "red team," a group of hacers who are hired to penetrate a company or agency's security in order to expose vulnerabilities.

Leverage has a consistent format which typically begins with the team acquiring the "job" which will provide the mark that they are going to con, and then Hardison, the hacker, will next give the rest of the team a presentation on the results of his research. Nate Ford, the mastermind, comes up with the plan, and the rest of the team, which includes a grifter, a theief, and a former covert ops soldier, contribute their own skills.

Whether you want to hack a computer system, ppik a lock, plan a heist, pull a con, or commit a covert operation, it all begins with research and reconnaissance, and this could take anywhere from days to months, maybe even a year for a major job.
In _The Lies of Locke Lamora_ by Scott Lynch, Lock has this thought: LOCKE LAMORA’S RULE of thumb was this: a good confidence game took three months to plan, three weeks to rehearse, and three seconds to win or lose the victim’s trust forever.

There is a classic movie which does a great job of demonstrating this: The Sting, starring Paul Newman and Robert Redford. We spend most of the movie watching Paul Newman's character, a legendary con man, teach Robert Redford's character, the hot-headed youngster, how to set up a con (toxic trope alert: it's the murder of Redford's partner and best friend, a black man and an obvious good guy, which instigates the action in the film).
The Sting is worth watching for a number of reasons: it's a classic movie, the acting, especially Newman's con artist, is superb, and the story of a bunch of small-time con men trying to con a big-time crime boss has a certain timeless Robin Hood feel to it.

Another reason to watch The Sting is that it demonstrates something at the heart of a con: a con is a story the con artist tells the mark and, like the best stories, it has to persuade the audience that it's real. The movie, "The Brothers Bloom," starring Mark Ruffalo and Adrian Brody," is all about this idea of the con as a narrative, or the story as con, and the playwright David Mamet is practically obsessed by this idea, and writes about it often

But The Sting is, when it comes right down to it, a dramatization of a classic text--the classic text--about American con men, _The Big Con: The Story of the Confidence Man_ by David Maurer (originally published in 1940 and reissued by Anchor Books in 1999) .

This is the classic text on cons, in large part because it was written by a linguist, and he captured the language of the con artists themselves, and that language is still a kind of poetry which fascinates writers and directors themselves.

The 9 Stages of the Big Con
summarized from David Maurer's classic book
http://www.amyreading.com/the-9-stages-of-the-big-con.html

These can be reduced to picking the mark, roping the mark, telling the tale, giving the convincer, putting him on the send, taking off the touch, and the blowoff.

If you don't have the time to read The Big Con, or if you want to find an online list of cons along with suggestions for various books, comics, movies, and TV shows in which they appear, refer to the vastly indexed
The Con on TV Tropes
https://tvtropes.org/pmwiki/pmwiki.php/Main/TheCon

Note that Leverage will name check many of these classic cons, either in the episode titles or in the characters's spoken dialogue.
The Leverage Wiki also provides a breakdown of the stages and the players in a typical long, i.e., planned, con, such as the complicated ones planned and pulled off by the Leverage team
https://leverage.fandom.com/wiki/The_Long_Con
Leverage is great at demonstrating at how the oldest cons can always be updated, and fans continue to reference Leverage not just in fan fiction but in more surprising media such as
the graphic novel, Real Science Adventures - The Nicodemus Job set in Constantinople 1095 c. (2018) by Brian Leverage
and a current Kickstarter for a collaborative game, Stealing Stories from the Devil
https://www.kickstarter.com/projects/montecookgames/the-devil-made-us-do-it?ref=3zzfvy

Two more resources, the first on the psychology of both the con artist and the mark, and the second on cons during the Elizabethan period:
The Confidence Game: Why We Fall for It... Every Time by Maria Konnikova (2016) [Available through NLS]
Robert Greene, a contemporary of Shakespeare, wrote an exposé of Elizabethan con artists in his 1591 pamphlet "A Notable Discoverie of Cozenage." "Cozenage" means "trickery," and the scams were known as "Cony-catching."
https://www.exclassics.com/cony/conyintro.htm

Social engineering explained: How criminals exploit human behavior
Josh Fruhlinger
https://www.csoonline.com/article/2124681/what-is-social-engineering.html

In _The Art of Deception_ by Kevin Mitnick, he claims that there are only five basic social engineering scripts: "Can I help you?" and "Can you help me?" being the two most used.
Social Engineering at TV Tropes
https://tvtropes.org/pmwiki/pmwiki.php/Main/SocialEngineering

Note: Social engineering is not the same thing as
NLP (neuro linguistic programming
https://en.wikipedia.org/wiki/Neuro-linguistic_programming

Hacker Lexicon
https://www.wired.com/tag/hacker-lexicon/

Debunking the Hacker Stereotype
https://blog.malwarebytes.com/101/2016/10/debunking-hacker-stereotypes-who-are-the-real-monsters/

Hollywood Hacking
https://tvtropes.org/pmwiki/pmwiki.php/Main/HollywoodHacking
includes the infamous
"It's a UNIX system. I know this."
https://www.reddit.com/r/itsaunixsystem/

Misleading Cybersecurity Lessons from Pop Culture
https://blog.malwarebytes.com/awareness/2020/02/misleading-cybersecurity-lessons-from-pop-culture-how-hollywood-teaches-to-hack/
How to Hack (Wiki)
https://www.wikihow.com/Hack
How to Find Out a Password
https://www.wikihow.com/Find-Out-a-Password

How to Hack a Website
https://www.wikihow.com/Hack-a-Website
How to Hack a Computer
https://www.wikihow.com/Hack-a-Computer

The ultimate resources to find out what hackers do are the two annual conferences, Black Hat, the professional "grownup" conference, and its counterpart, the less well-behaved and somewhat infamous Defcon. Both of these conventions archives talks, slides, and other materials from their events, and the Defcon website in particular is a rich source for finding out about what hackers actually get up to, both the good and the bad.
Black Hat YouTube channel,
https://www.youtube.com/user/BlackHatOfficialYT

DefCon website
https://defcon.org

Defcon Youtube page
https://www.youtube.com/user/DEFCONConference

Hacking for Beginners: The Ultimate Guide To Becoming A Hacker by Bob Bittex (2017)
How to Be an Ethical Hacker
Hacking for Kids (Fall, 2021)
Top Ten Best Hacking Documentaries of All Time
https://portswigger.net/daily-swig/the-top-10-best-hacking-documentaries-of-all-time

Intelligence by Physical Reconnaissance Lock Bypass Village talk
How does a hacker get floor plans? How does a thief know where the ventilation shafts will be?
https://www.youtube.com/watch?v=ACsPMFISCdw
DIY Bypass Tools
https://www.youtube.com/watch?v=_5h-IF-Mqxo

Apollo Robbin's performances utilize pick-pocketing and sleight-of-hand to demonstrate proximity manipulation, diversion techniques, and attention control.
The Art of Misdirection Ted Talk
https://www.ted.com/talks/apollo_robbins_the_art_of_misdirection/transcript

A Pickpocket’s Tale: The spectacular thefts of Apollo Robbins. By Adam Green The New Yorker December 30, 2012
https://www.newyorker.com/magazine/2013/01/07/a-pickpockets-tale

“Whiz Mob: A Correlation of the Technical Argot of Pickpockets with Their Behavior Patterns,” (1964) by David W. Maurer

How to Pickpocket
https://www.survivalfitnessplan.com/how-to-pickpocket/#content

The Picked Lock - Break Into Your Own Home So They Can't
An introduction to lockpicking which then applies concepts to improving your own home security
https://www.consumersadvocate.org/home-security/the-picked-lock-break-into-your-own-home-so-they-cant

Inside the hidden world of competitive lockpicking by Steph Panecasio July 30, 2020
https://www.cnet.com/news/inside-the-hidden-world-of-competitive-lockpicking/

Kes: This next resouce is where I purchased my lockpick set from
TOOOL, The Open Organization Of Lockpickers and Lockpicking (U.S.)
https://toool.us/

Copying keys from photos, molds, and more by Deviant Ollam
https://www.youtube.com/watch?v=AayXf5aRFTI

Deviant Ollam – Eyes of a Thief – Job Stories from a Professional Covert Entry Artist — Secure360
https://secure360.org/session/deviant-ollam-eyes-of-a-thief-job-stories-from-a-professional-covert-entry-artist/?conference=11809&date=20200505#genesis-content

Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking teachers.
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking.

Red Team Tools
https://redteamtools.com/

You're probably not red teaming...and usually I'm not, either
https://www.youtube.com/watch?v=mj2iSdBw4-0

Lockwiki.com
Lockwiki is the home of all things related to the security and compromise of locks, safes, and keys.
http://www.lockwiki.com/index.php/Main_Page

Barton Whaley was a consultant for the military, a
member of the Magic Castle,
https://geniimagazine.com/wiki/index.php?title=Bart_Whaley
and the founder of "deception studies," who produced a number of textbooks on the subject of the use of magic in military deception throughout history
https://www.lybrary.com/barton-whaley-m-191.html

In their Las Vegas act, Penn narrates each step while Teller demonstrates how something as banal as
lighting a cigarette
https://www.youtube.com/watch?v=2azeC57Fn4c
can turn out to be an illusion. What appears to be a cigarette is actually a pencil stub. What the audience thinks is a lighter is really a tiny flashlight. The trick illustrates the
seven basic principles of magic: palm, ditch, steal, simulation, load, misdirection, and switch.


Magic Vs. Lying | Penn & Teller Teach the Art of Magic | MasterClass
https://www.masterclass.com/classes/penn-and-teller-teach-the-art-of-magic/chapters/magic-vs-lying#
What is a French Drop?
https://www.masterclass.com/articles/magic-101-what-is-a-french-drop-learn-magic-coin-tricks-to-try-at-home#:~:text=What%20Real%20Action%20Does%20a%20French%20Drop%20Mimic%3F,inward%20slightly%2C%20relaxes%2C%20and%20drops%20at%20the%20wrist.

Teller Reveals His Secrets
By Teller
SMITHSONIAN MAGAZINE
MARCH 2012
https://www.smithsonianmag.com/arts-culture/teller-reveals-his-secrets-100744801/#Primary-Navigation

Teller Talks: The Science Behind Magic Tricks : NPR
March 5, 2012
https://www.npr.org/2012/03/05/147980272/teller-talks-magicians-use-science-to-trick-you

What Do We Learn About Psychology From Penn & Teller?
https://www.online-psychology-degrees.org/study/psychology-from-penn-teller/

Misdirection in magic: Implications for the relationship between eye gaze and attention: Visual Cognition: Vol 16, No 2-3
https://www.tandfonline.com/doi/abs/10.1080/13506280701479750


Become a Better Liar and Live a Better Life
Verified by Psychology Today
Jack Schafer Ph.D.
Posted March 29, 2012
https://www.psychologytoday.com/us/blog/let-their-words-do-the-talking/201203/become-better-liar-and-live-better-life

How to Be a Better Liar
To get good at bending the truth, you have to first know why most people are terrible at it
Joline Buscemi
Feb 20, 2020
https://forge.medium.com/how-to-be-a-better-liar-b023e9b8da23

Former FBI agent and body language expert Joe Navarro answers the internet's burning questions about body language.
https://www.wired.com/video/watch/tech-support-former-fbi-agent-answers-body-language-questions-from-twitter

Eye Movements When Lying: Reality or Myth? - Learning Mind
https://www.learning-mind.com/eye-movements-when-lying/

Date: 2021-08-14 11:22 pm (UTC)
duskpeterson: The lowercased letters D and P, joined together (Default)
From: [personal profile] duskpeterson
This is terrific post, Kestrell! I'm glad I got to see this panel.

A problem I often have is how to take research like this back to earlier eras. I have a fantasy series based on Late Antiquity that includes a few spies. When I was writing a lockpicking scene, I happened to have on hand a children's history book, Robert Kraske's Silent Sentinels: The Story Of Locks, Vaults, And Burglar Alarms, which had some information on locks in ancient times. But I really should hunt down a range of historical resources on this topic.

Date: 2021-08-15 04:29 pm (UTC)
jesse_the_k: That text in red Futura Bold Condensed (be aware of invisibility)
From: [personal profile] jesse_the_k

Most excellent resource.

Date: 2021-08-15 11:21 pm (UTC)
bibliofile: Fan & papers in a stack (from my own photo) (Default)
From: [personal profile] bibliofile
Excellent post! I could lose days (or weeks) just following up on these. How'd the panel go?

February 2024

S M T W T F S
    123
456789 10
11121314151617
18192021222324
2526272829  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 7th, 2025 09:04 pm
Powered by Dreamwidth Studios