SlideShare uma empresa Scribd logo
1 de 23
Social Engineering:
Frames, Framing, and Frame Control
Mike Murr
mike@socialexploits.com
http://www.socialexploits.com
http://www.twitter.com/SocialExploits
What This Talk is About
• Framing
– Constructs used to give meaning to information
– Defining the current situation (“here and now”)
– Cognitive context
• Fundamental to social engineering
– Control the frame, control the meaning of an
interaction
– Messages are dependent on meaning
• And consequently emotions
• A hacker stole your PII, We lost your PII, Your PII was
lost
Social Engineering: Framing and Frame Control – © Social Exploits 2010
2
Social Engineering
• Social engineering is persuasion
– Goal is to affect behavior
– Increase likelihood of compliance
– More than pretending to be help desk
– Not reconnaissance
• This is not mind control
– Nothing is 100% effective, always have free will
– People can accept or reject frames
– Still highly effective though
• Ethics (is a relative term)
– These are tools
– How you use the tools is your decision
– Reflection of character
– Personal responsibility
Social Engineering: Framing and Frame Control – © Social Exploits 2010
3
Frames
• Frames are constructs used to give meaning
– Personal interpretation
– Highlight certain aspects, ignore others
– Each person has their own
• Frame constructs (not exhaustive)
– Beliefs
• “Design” of the frame
• Cultural, Biological, Life Experience
– Mental models of reality
• Help organize thoughts, set expectations
• Defines boundaries (what is emphasized and ignored)
• Form the “shape” of the frame
• A representation / implementation of beliefs
Social Engineering: Framing and Frame Control – © Social Exploits 2010
4
Framing
• Framing (to frame, set a frame, etc.)
– Asserting a frame
– Persuade others to accept our frame over theirs
• Metaframe
– Focused more on underlying aspects of situation (or
beliefs)
– Also known as master frames
• Reframe
– Assert a new frame over an existing frame
• People often play frame games
– Get others to accept / understand a frame
– Can relate to power or influence (controlling meaning)
– Natural part of interpersonal communication
Social Engineering: Framing and Frame Control – © Social Exploits 2010
5
Communicating a Frame
• 3 major components
– Linguistic, paralinguistic, nonverbals
• Nonverbals (and paralinguistic) are key
– Play a majority role of a message’s influence
• Often trusted more than verbal
• More difficult to fake
– Various tactics to hold attention
• What we focus on sets the frame
• Strong facial expressions
• Varied tone / tempo
• Hand gestures / movement (esp. large ones)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
6
Sources for Frames
• Useful for identifying elements of influential frames
• Cultural
– Collectivist vs. individualist
– Familiar ideas and concepts
• Biological
– Primal and evolutionary motivations
– Strong emphasis around survival and replication
• Mental models
– Pay attention to what people say (and how they say it)
– Note attributes / properties / characteristics
Social Engineering: Framing and Frame Control – © Social Exploits 2010
7
Linguistic Tools (1)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
8
Relating Frames
Metaphors
• Frames resemble each
other (not literally)
• A firewall is a security
guard at the front door
Analogies
• Useful for emphasizing
similarities
• Frames elements are
similar
• Can be used to suggest
agreements in areas not
explicitly stated
• An IDS is like a “computer
burglar alarm”
Contrast
• Useful for emphasizing
differences
• Frames do not agree
• Can be used as motivation
/ rationale for new
behavior
• Unlike an IDS which can
only detect, an IPS can
block traffic
Linguistic Tools (2)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
9
Framing Content
Feeling
• Describes frames in
terms of emotions
• I hate a poorly
tuned IDS
Stories
• Uses a narrative to
set the frame
• Often has a theme
or metaphor basis
• Tell a story about
how an IDS prevent
an incident and
saved $$$
Spin
• Describes a frame
in terms of positive
or negative
• Similar to
emotional valence
• An IPS is a great
way to detect and
respond to
incidents
Jargon
• Describes a frame
using familiar
terminology
• Using terms such
as Asset Value,
ALE, SLE, ROI, etc.
Linguistic Tools (3)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
10
Framing Structure
Argument
• Frame in terms of
rationale
• Supported by
evidence
• Our anti-virus costs
the least, offers the
most features
Categorizing
• Describe frame in
terms of included
or excluded
categories
• This isn’t your
parent’s anti-virus,
it’s enterprise
grade
Repetition
• Emphasize aspects
of frame by
repeating specific
elements
• Protect, Protect,
Protect, that’s
what our anti-virus
does for your data
Lists
• Organize content
into easy to
remember chunks
• Often three
elements
• We can sum up our
anti-virus in three
words: Safe, Fast,
Reliable
Useful Frames: Interpersonal
Social Engineering: Framing and Frame Control – © Social Exploits 2010
11
Being helpful
• You are
helping them
• Offer help
• They are
helpful people
• Ask them to
help you out
Avoiding blame
• Provides
emotional
justification
for behavior
• Can make
accepting
related frames
easier
Team members
• Working
towards a
common goal
• Can solidify
using “us vs.
them”
Useful Frames: “Cialdini 6”
Social Engineering: Framing and Frame Control – © Social Exploits 2010
12
•Tend to be influenced by authority positions
•Vendor XYZ is the international leader in host-based IDS
Authority
•We tend to be influenced by those we like
•Sales person identifies similar hobbies / interests
Liking
•Looking to others to determine correct behavior
•Government agencies worldwide use our software
Social Proof
•Value is tied to (lack of) availability
•Only available to select enterprise customers
Scarcity
•Obligation to return what others provide (favors)
•Vendor buys lunch
Reciprocity
•Pressure to remain consistent with prior commitments
•You’ve already stated information protection is a top concern
Commitment and
Consistency
Useful Frames: General
Social Engineering: Framing and Frame Control – © Social Exploits 2010
13
Simplifying
• Reduce
complexity
• Easier to
understand
Loss Aversion
• Loss is a stronger
motivator than
potential to gain
• Depends on
relative value
Credibility
• Increases
believability
• Emphasis on
truth and what
is real
Certainty
• People crave
certainty
• Provides
stability, clarity
• Increases trust
• Facilitates
rapport
• Reduces
unknown
Frame Warfare (1)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
14
• Understand a person’s interpretation
• Doesn’t guarantee acceptance of a frame
Acknowledging a frame
• Hold an interpretation as true
• Leads to persuasion
• Implies understanding a frame
Accepting a frame
• Refuse to accept an interpretation as true
• May or may not understand a frame
Rejecting (denying) a frame
Frame Warfare (2)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
15
• Merge interpretations together
• Accepting one can lead to accepting the other
• This is an art
Combining frames
• Link interpretations together
• Frames agree and are related
• Traditionally associated w/politics
• Useful for transitioning frames
• Useful for behavior motivation
Aligning frames
Frame Alignment Patterns
Social Engineering: Framing and Frame Control – © Social Exploits 2010
16
Bridging
•Frames are similar in basis, different in
specifics
•Data theft is on the rise, maintain personal
freedom, buy our id. product
Amplification
•Increase focus or emphasis on what is
important
•Simultaneously decreases emphasis on
other points
•Provide a safe learning environment for your
family, buy our firewall
Extension
•Increase the “boundaries” of the frame
•This anti-virus can help protect your id. by
stopping malware
Transformation
•Use existing elements with a new frame
•Change frame by replacing meaning of
elements
•This “little malware incident” demonstrates
people are the cause of problems
•They can’t be trusted
•Our IPS fixes human problems
Reframing Patterns (1)
Change intent behind behavior
• Remove a firewall rule to facilitate a business process
Redefine by using similar words
• Different meaning / implication
• Data theft vs. data loss
Change specificity (chunk size)
• Increase
• Our detection mechanisms alerted us in real time
• Decrease
• On the whole, this is part of the cost of running a business
Social Engineering: Framing and Frame Control – © Social Exploits 2010
17
Reframing Patterns (2)
Change context
• Changing scope / size
• Only lost information on 1% of our customers
• Changing environment
• Data was copied from one machine to another
• Change role / perspective
• We are helping protect our customers by working with law
enforcement to help locate, arrest, and convict the suspect
Alternating Frames
• Switch between frames
• Meet unrelated / opposite goals
• Blame someone else, and accept responsibility
Social Engineering: Framing and Frame Control – © Social Exploits 2010
18
Building Your Framing Skills
Understanding
•Reading
•Thinking
•General learning
Observation
•Observe and
analyze your
and others’
frames
Priming
• Mental
preparation
• Conscious
thought
influences
unconscious
response
Infield
Work
• Assert
frames
• Assess
reactions
and changes
Reflection
• Keep a
journal
• Look for
patterns
Social Engineering: Framing and Frame Control – © Social Exploits 2010
19
Parting Thoughts
• Useful beyond just social engineering
– Interpersonal communication
– Vital component of leadership
• “Through framing, we create the realities
to which we must then respond”
– Fairhurst 2010
Social Engineering: Framing and Frame Control – © Social Exploits 2010
20
Books (1)
• The Power of Framing (Fairhurst)
• Introducing NLP (O’Connor)
• Sleight of Mouth (Dilts)
• Mind-Lines (Hall)
• Influence: Science and Practice (Cialdini)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
21
Books (2)
Social Engineering: Framing and Frame Control – © Social Exploits 2010
22
Questions?
• Feel free to email me at
mike@socialexploits.com
• Blog: www.socialexploits.com
• Twitter: twitter.com/SocialExploits
• Upcoming conferences
– Next conference: SANS London 2010
Social Engineering: Framing and Frame Control – © Social Exploits 2010
23

Mais conteúdo relacionado

Destaque

Frame Your Campaign To Win
Frame Your Campaign To WinFrame Your Campaign To Win
Frame Your Campaign To WinResource Media
 
YSJ CPD Framework, UKPSF and Mahara ePortfolios
YSJ CPD Framework, UKPSF and Mahara ePortfoliosYSJ CPD Framework, UKPSF and Mahara ePortfolios
YSJ CPD Framework, UKPSF and Mahara ePortfoliosPhil Vincent
 
Layers and meaning: reflections on digitality
Layers and meaning: reflections on digitalityLayers and meaning: reflections on digitality
Layers and meaning: reflections on digitalityJenny Weight
 
Both necessity and arbitrariness of the sign: information
Both necessity and arbitrariness of the sign: informationBoth necessity and arbitrariness of the sign: information
Both necessity and arbitrariness of the sign: informationVasil Penchev
 
Ontological and historical responsibility. The condition of possibility
Ontological and historical responsibility. The condition of possibilityOntological and historical responsibility. The condition of possibility
Ontological and historical responsibility. The condition of possibilityVasil Penchev
 
Creativity reframed in a loaf of bread!!!
Creativity reframed in a loaf of bread!!!Creativity reframed in a loaf of bread!!!
Creativity reframed in a loaf of bread!!!Hema Singh
 
Phil Vincent TELIC Introduction
Phil Vincent TELIC IntroductionPhil Vincent TELIC Introduction
Phil Vincent TELIC IntroductionPhil Vincent
 
E opowerpointblackhatfinal
E opowerpointblackhatfinalE opowerpointblackhatfinal
E opowerpointblackhatfinalMatt Kendall
 
Legal Aspects of Social Media
Legal Aspects of Social MediaLegal Aspects of Social Media
Legal Aspects of Social MediaPhil Vincent
 
"Possible Worlds and Substances“ by Vladislav Terekhovich
"Possible Worlds and Substances“ by Vladislav Terekhovich"Possible Worlds and Substances“ by Vladislav Terekhovich
"Possible Worlds and Substances“ by Vladislav TerekhovichVasil Penchev
 
Four Frames of Leadership - Cohort 14
Four Frames of Leadership - Cohort 14Four Frames of Leadership - Cohort 14
Four Frames of Leadership - Cohort 14Nicole Williams
 
A Formal Model of Metaphor in Frame Semantics
A Formal Model of Metaphor in Frame SemanticsA Formal Model of Metaphor in Frame Semantics
A Formal Model of Metaphor in Frame SemanticsVasil Penchev
 
Dynamic presentations lisa akesson 2017
Dynamic presentations   lisa akesson 2017Dynamic presentations   lisa akesson 2017
Dynamic presentations lisa akesson 2017Matt Kendall
 
Twitter for Training
Twitter for TrainingTwitter for Training
Twitter for TrainingPhil Vincent
 
19th Annual SEDA Conference - Open Badges Workshop
19th Annual SEDA Conference - Open Badges Workshop19th Annual SEDA Conference - Open Badges Workshop
19th Annual SEDA Conference - Open Badges WorkshopPhil Vincent
 
Preliminary Revision
Preliminary RevisionPreliminary Revision
Preliminary Revisionsmoky_stu
 

Destaque (20)

Frame Your Campaign To Win
Frame Your Campaign To WinFrame Your Campaign To Win
Frame Your Campaign To Win
 
YSJ CPD Framework, UKPSF and Mahara ePortfolios
YSJ CPD Framework, UKPSF and Mahara ePortfoliosYSJ CPD Framework, UKPSF and Mahara ePortfolios
YSJ CPD Framework, UKPSF and Mahara ePortfolios
 
Layers and meaning: reflections on digitality
Layers and meaning: reflections on digitalityLayers and meaning: reflections on digitality
Layers and meaning: reflections on digitality
 
Both necessity and arbitrariness of the sign: information
Both necessity and arbitrariness of the sign: informationBoth necessity and arbitrariness of the sign: information
Both necessity and arbitrariness of the sign: information
 
Ontological and historical responsibility. The condition of possibility
Ontological and historical responsibility. The condition of possibilityOntological and historical responsibility. The condition of possibility
Ontological and historical responsibility. The condition of possibility
 
Creativity reframed in a loaf of bread!!!
Creativity reframed in a loaf of bread!!!Creativity reframed in a loaf of bread!!!
Creativity reframed in a loaf of bread!!!
 
Phil Vincent TELIC Introduction
Phil Vincent TELIC IntroductionPhil Vincent TELIC Introduction
Phil Vincent TELIC Introduction
 
E opowerpointblackhatfinal
E opowerpointblackhatfinalE opowerpointblackhatfinal
E opowerpointblackhatfinal
 
Interesting talks
Interesting talksInteresting talks
Interesting talks
 
Legal Aspects of Social Media
Legal Aspects of Social MediaLegal Aspects of Social Media
Legal Aspects of Social Media
 
"Possible Worlds and Substances“ by Vladislav Terekhovich
"Possible Worlds and Substances“ by Vladislav Terekhovich"Possible Worlds and Substances“ by Vladislav Terekhovich
"Possible Worlds and Substances“ by Vladislav Terekhovich
 
Four Frames of Leadership - Cohort 14
Four Frames of Leadership - Cohort 14Four Frames of Leadership - Cohort 14
Four Frames of Leadership - Cohort 14
 
A Formal Model of Metaphor in Frame Semantics
A Formal Model of Metaphor in Frame SemanticsA Formal Model of Metaphor in Frame Semantics
A Formal Model of Metaphor in Frame Semantics
 
Dynamic presentations lisa akesson 2017
Dynamic presentations   lisa akesson 2017Dynamic presentations   lisa akesson 2017
Dynamic presentations lisa akesson 2017
 
Twitter for Training
Twitter for TrainingTwitter for Training
Twitter for Training
 
Melbourne noir
Melbourne noirMelbourne noir
Melbourne noir
 
Open Badges
Open BadgesOpen Badges
Open Badges
 
19th Annual SEDA Conference - Open Badges Workshop
19th Annual SEDA Conference - Open Badges Workshop19th Annual SEDA Conference - Open Badges Workshop
19th Annual SEDA Conference - Open Badges Workshop
 
Preliminary Revision
Preliminary RevisionPreliminary Revision
Preliminary Revision
 
SLR Cameras
SLR CamerasSLR Cameras
SLR Cameras
 

Semelhante a Social Engineering: Frames and Frame Control

Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Sónia
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Kimberley Dray
 
Feldman1psychlife ppt ch12
Feldman1psychlife ppt ch12Feldman1psychlife ppt ch12
Feldman1psychlife ppt ch12coutsron
 
CSA Fall Summit 2017
CSA Fall Summit 2017CSA Fall Summit 2017
CSA Fall Summit 2017Chad Hoffmann
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2James Sutter
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Ppt perception and individual Decision Making
Ppt perception and individual Decision MakingPpt perception and individual Decision Making
Ppt perception and individual Decision MakingDeni Triyanto
 
The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoLina Angel
 
Sorry, Your Mum Is Not a Valid Test Participant
Sorry, Your Mum Is Not a Valid Test ParticipantSorry, Your Mum Is Not a Valid Test Participant
Sorry, Your Mum Is Not a Valid Test ParticipantMichael Rawling
 
SRVision 2019, Utrecht: Swarming and Cynefin
SRVision 2019, Utrecht: Swarming and CynefinSRVision 2019, Utrecht: Swarming and Cynefin
SRVision 2019, Utrecht: Swarming and CynefinJon Stevens-Hall
 
Simone Borsci - Deceptive design, user experience and trust
Simone Borsci - Deceptive design, user experience and trustSimone Borsci - Deceptive design, user experience and trust
Simone Borsci - Deceptive design, user experience and trustnois3
 
Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality DATAVERSITY
 
Oscon2015 150724001540-lva1-app6891
Oscon2015 150724001540-lva1-app6891Oscon2015 150724001540-lva1-app6891
Oscon2015 150724001540-lva1-app6891Gerald Mayfield
 
Building a Successful Organization By Mastering Failure
Building a Successful Organization By Mastering FailureBuilding a Successful Organization By Mastering Failure
Building a Successful Organization By Mastering Failurejgoulah
 
Velocity19 Berlin: Swarming, Cynefin… and avoiding the problems of becoming a...
Velocity19 Berlin: Swarming, Cynefin…and avoiding the problems of becoming a...Velocity19 Berlin: Swarming, Cynefin…and avoiding the problems of becoming a...
Velocity19 Berlin: Swarming, Cynefin… and avoiding the problems of becoming a...Jon Stevens-Hall
 
A design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignA design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignSónia
 
Communication and Its Barrier (Google)
Communication and Its Barrier (Google)Communication and Its Barrier (Google)
Communication and Its Barrier (Google)Pulkit Bordia
 
Session 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptxSession 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptxssuserde1c26
 

Semelhante a Social Engineering: Frames and Frame Control (20)

Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective
 
Lessons from lockdown webinar, 8 September 2020
Lessons from lockdown webinar, 8 September 2020Lessons from lockdown webinar, 8 September 2020
Lessons from lockdown webinar, 8 September 2020
 
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
Co-Presented: YOU are the Alpha and Omega of a Secure Future (Kottova / Dray)...
 
Feldman1psychlife ppt ch12
Feldman1psychlife ppt ch12Feldman1psychlife ppt ch12
Feldman1psychlife ppt ch12
 
CSA Fall Summit 2017
CSA Fall Summit 2017CSA Fall Summit 2017
CSA Fall Summit 2017
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Ppt perception and individual Decision Making
Ppt perception and individual Decision MakingPpt perception and individual Decision Making
Ppt perception and individual Decision Making
 
The Best from the UX Summit in Chicago
The Best from the UX Summit in ChicagoThe Best from the UX Summit in Chicago
The Best from the UX Summit in Chicago
 
Sorry, Your Mum Is Not a Valid Test Participant
Sorry, Your Mum Is Not a Valid Test ParticipantSorry, Your Mum Is Not a Valid Test Participant
Sorry, Your Mum Is Not a Valid Test Participant
 
Social engineering and indian jugaad
Social engineering and indian jugaadSocial engineering and indian jugaad
Social engineering and indian jugaad
 
SRVision 2019, Utrecht: Swarming and Cynefin
SRVision 2019, Utrecht: Swarming and CynefinSRVision 2019, Utrecht: Swarming and Cynefin
SRVision 2019, Utrecht: Swarming and Cynefin
 
Simone Borsci - Deceptive design, user experience and trust
Simone Borsci - Deceptive design, user experience and trustSimone Borsci - Deceptive design, user experience and trust
Simone Borsci - Deceptive design, user experience and trust
 
Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality Enterprise Data World Webinar: A Strategic Approach to Data Quality
Enterprise Data World Webinar: A Strategic Approach to Data Quality
 
Oscon2015 150724001540-lva1-app6891
Oscon2015 150724001540-lva1-app6891Oscon2015 150724001540-lva1-app6891
Oscon2015 150724001540-lva1-app6891
 
Building a Successful Organization By Mastering Failure
Building a Successful Organization By Mastering FailureBuilding a Successful Organization By Mastering Failure
Building a Successful Organization By Mastering Failure
 
Velocity19 Berlin: Swarming, Cynefin… and avoiding the problems of becoming a...
Velocity19 Berlin: Swarming, Cynefin…and avoiding the problems of becoming a...Velocity19 Berlin: Swarming, Cynefin…and avoiding the problems of becoming a...
Velocity19 Berlin: Swarming, Cynefin… and avoiding the problems of becoming a...
 
A design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction DesignA design space for Trust-enabling Interaction Design
A design space for Trust-enabling Interaction Design
 
Communication and Its Barrier (Google)
Communication and Its Barrier (Google)Communication and Its Barrier (Google)
Communication and Its Barrier (Google)
 
Session 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptxSession 4 - Lectures in Leadership (Relating).pptx
Session 4 - Lectures in Leadership (Relating).pptx
 

Último

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Social Engineering: Frames and Frame Control

  • 1. Social Engineering: Frames, Framing, and Frame Control Mike Murr mike@socialexploits.com http://www.socialexploits.com http://www.twitter.com/SocialExploits
  • 2. What This Talk is About • Framing – Constructs used to give meaning to information – Defining the current situation (“here and now”) – Cognitive context • Fundamental to social engineering – Control the frame, control the meaning of an interaction – Messages are dependent on meaning • And consequently emotions • A hacker stole your PII, We lost your PII, Your PII was lost Social Engineering: Framing and Frame Control – © Social Exploits 2010 2
  • 3. Social Engineering • Social engineering is persuasion – Goal is to affect behavior – Increase likelihood of compliance – More than pretending to be help desk – Not reconnaissance • This is not mind control – Nothing is 100% effective, always have free will – People can accept or reject frames – Still highly effective though • Ethics (is a relative term) – These are tools – How you use the tools is your decision – Reflection of character – Personal responsibility Social Engineering: Framing and Frame Control – © Social Exploits 2010 3
  • 4. Frames • Frames are constructs used to give meaning – Personal interpretation – Highlight certain aspects, ignore others – Each person has their own • Frame constructs (not exhaustive) – Beliefs • “Design” of the frame • Cultural, Biological, Life Experience – Mental models of reality • Help organize thoughts, set expectations • Defines boundaries (what is emphasized and ignored) • Form the “shape” of the frame • A representation / implementation of beliefs Social Engineering: Framing and Frame Control – © Social Exploits 2010 4
  • 5. Framing • Framing (to frame, set a frame, etc.) – Asserting a frame – Persuade others to accept our frame over theirs • Metaframe – Focused more on underlying aspects of situation (or beliefs) – Also known as master frames • Reframe – Assert a new frame over an existing frame • People often play frame games – Get others to accept / understand a frame – Can relate to power or influence (controlling meaning) – Natural part of interpersonal communication Social Engineering: Framing and Frame Control – © Social Exploits 2010 5
  • 6. Communicating a Frame • 3 major components – Linguistic, paralinguistic, nonverbals • Nonverbals (and paralinguistic) are key – Play a majority role of a message’s influence • Often trusted more than verbal • More difficult to fake – Various tactics to hold attention • What we focus on sets the frame • Strong facial expressions • Varied tone / tempo • Hand gestures / movement (esp. large ones) Social Engineering: Framing and Frame Control – © Social Exploits 2010 6
  • 7. Sources for Frames • Useful for identifying elements of influential frames • Cultural – Collectivist vs. individualist – Familiar ideas and concepts • Biological – Primal and evolutionary motivations – Strong emphasis around survival and replication • Mental models – Pay attention to what people say (and how they say it) – Note attributes / properties / characteristics Social Engineering: Framing and Frame Control – © Social Exploits 2010 7
  • 8. Linguistic Tools (1) Social Engineering: Framing and Frame Control – © Social Exploits 2010 8 Relating Frames Metaphors • Frames resemble each other (not literally) • A firewall is a security guard at the front door Analogies • Useful for emphasizing similarities • Frames elements are similar • Can be used to suggest agreements in areas not explicitly stated • An IDS is like a “computer burglar alarm” Contrast • Useful for emphasizing differences • Frames do not agree • Can be used as motivation / rationale for new behavior • Unlike an IDS which can only detect, an IPS can block traffic
  • 9. Linguistic Tools (2) Social Engineering: Framing and Frame Control – © Social Exploits 2010 9 Framing Content Feeling • Describes frames in terms of emotions • I hate a poorly tuned IDS Stories • Uses a narrative to set the frame • Often has a theme or metaphor basis • Tell a story about how an IDS prevent an incident and saved $$$ Spin • Describes a frame in terms of positive or negative • Similar to emotional valence • An IPS is a great way to detect and respond to incidents Jargon • Describes a frame using familiar terminology • Using terms such as Asset Value, ALE, SLE, ROI, etc.
  • 10. Linguistic Tools (3) Social Engineering: Framing and Frame Control – © Social Exploits 2010 10 Framing Structure Argument • Frame in terms of rationale • Supported by evidence • Our anti-virus costs the least, offers the most features Categorizing • Describe frame in terms of included or excluded categories • This isn’t your parent’s anti-virus, it’s enterprise grade Repetition • Emphasize aspects of frame by repeating specific elements • Protect, Protect, Protect, that’s what our anti-virus does for your data Lists • Organize content into easy to remember chunks • Often three elements • We can sum up our anti-virus in three words: Safe, Fast, Reliable
  • 11. Useful Frames: Interpersonal Social Engineering: Framing and Frame Control – © Social Exploits 2010 11 Being helpful • You are helping them • Offer help • They are helpful people • Ask them to help you out Avoiding blame • Provides emotional justification for behavior • Can make accepting related frames easier Team members • Working towards a common goal • Can solidify using “us vs. them”
  • 12. Useful Frames: “Cialdini 6” Social Engineering: Framing and Frame Control – © Social Exploits 2010 12 •Tend to be influenced by authority positions •Vendor XYZ is the international leader in host-based IDS Authority •We tend to be influenced by those we like •Sales person identifies similar hobbies / interests Liking •Looking to others to determine correct behavior •Government agencies worldwide use our software Social Proof •Value is tied to (lack of) availability •Only available to select enterprise customers Scarcity •Obligation to return what others provide (favors) •Vendor buys lunch Reciprocity •Pressure to remain consistent with prior commitments •You’ve already stated information protection is a top concern Commitment and Consistency
  • 13. Useful Frames: General Social Engineering: Framing and Frame Control – © Social Exploits 2010 13 Simplifying • Reduce complexity • Easier to understand Loss Aversion • Loss is a stronger motivator than potential to gain • Depends on relative value Credibility • Increases believability • Emphasis on truth and what is real Certainty • People crave certainty • Provides stability, clarity • Increases trust • Facilitates rapport • Reduces unknown
  • 14. Frame Warfare (1) Social Engineering: Framing and Frame Control – © Social Exploits 2010 14 • Understand a person’s interpretation • Doesn’t guarantee acceptance of a frame Acknowledging a frame • Hold an interpretation as true • Leads to persuasion • Implies understanding a frame Accepting a frame • Refuse to accept an interpretation as true • May or may not understand a frame Rejecting (denying) a frame
  • 15. Frame Warfare (2) Social Engineering: Framing and Frame Control – © Social Exploits 2010 15 • Merge interpretations together • Accepting one can lead to accepting the other • This is an art Combining frames • Link interpretations together • Frames agree and are related • Traditionally associated w/politics • Useful for transitioning frames • Useful for behavior motivation Aligning frames
  • 16. Frame Alignment Patterns Social Engineering: Framing and Frame Control – © Social Exploits 2010 16 Bridging •Frames are similar in basis, different in specifics •Data theft is on the rise, maintain personal freedom, buy our id. product Amplification •Increase focus or emphasis on what is important •Simultaneously decreases emphasis on other points •Provide a safe learning environment for your family, buy our firewall Extension •Increase the “boundaries” of the frame •This anti-virus can help protect your id. by stopping malware Transformation •Use existing elements with a new frame •Change frame by replacing meaning of elements •This “little malware incident” demonstrates people are the cause of problems •They can’t be trusted •Our IPS fixes human problems
  • 17. Reframing Patterns (1) Change intent behind behavior • Remove a firewall rule to facilitate a business process Redefine by using similar words • Different meaning / implication • Data theft vs. data loss Change specificity (chunk size) • Increase • Our detection mechanisms alerted us in real time • Decrease • On the whole, this is part of the cost of running a business Social Engineering: Framing and Frame Control – © Social Exploits 2010 17
  • 18. Reframing Patterns (2) Change context • Changing scope / size • Only lost information on 1% of our customers • Changing environment • Data was copied from one machine to another • Change role / perspective • We are helping protect our customers by working with law enforcement to help locate, arrest, and convict the suspect Alternating Frames • Switch between frames • Meet unrelated / opposite goals • Blame someone else, and accept responsibility Social Engineering: Framing and Frame Control – © Social Exploits 2010 18
  • 19. Building Your Framing Skills Understanding •Reading •Thinking •General learning Observation •Observe and analyze your and others’ frames Priming • Mental preparation • Conscious thought influences unconscious response Infield Work • Assert frames • Assess reactions and changes Reflection • Keep a journal • Look for patterns Social Engineering: Framing and Frame Control – © Social Exploits 2010 19
  • 20. Parting Thoughts • Useful beyond just social engineering – Interpersonal communication – Vital component of leadership • “Through framing, we create the realities to which we must then respond” – Fairhurst 2010 Social Engineering: Framing and Frame Control – © Social Exploits 2010 20
  • 21. Books (1) • The Power of Framing (Fairhurst) • Introducing NLP (O’Connor) • Sleight of Mouth (Dilts) • Mind-Lines (Hall) • Influence: Science and Practice (Cialdini) Social Engineering: Framing and Frame Control – © Social Exploits 2010 21
  • 22. Books (2) Social Engineering: Framing and Frame Control – © Social Exploits 2010 22
  • 23. Questions? • Feel free to email me at mike@socialexploits.com • Blog: www.socialexploits.com • Twitter: twitter.com/SocialExploits • Upcoming conferences – Next conference: SANS London 2010 Social Engineering: Framing and Frame Control – © Social Exploits 2010 23