Showing posts with label socialengineering. Show all posts
Showing posts with label socialengineering. Show all posts

Thursday, April 16, 2020

Event 201 - Pandemic Exercise - Segments 1 - 5


Published November 2019
Event 201 is a pandemic tabletop exercise hosted by The Johns Hopkins Center for Health Security in partnership with the World Economic Forum and the Bill and Melinda Gates Foundation on October 18, 2019, in New York, NY. The exercise illustrated the pandemic preparedness efforts needed to diminish the large-scale economic and societal consequences of a severe pandemic.

Drawing from actual events, Event 201 identifies important policy issues and preparedness challenges that could be solved with sufficient political will and attention. These issues were designed in a narrative to engage and educate the participants and the audience.

Segment 1: Intro and Medical Countermeasures 

Segment 2: Trade and Travel Discussion 

Segment 3: Finance Discussion

Segment 4: Communications Discussion and Epilogue Video

Segment 5: Hotwash and Conclusion


Sharing Alternative Information Everyone Should Know


Subscribe by Email

Video not displaying? Copy & Paste the title into YouTube search or startpage.com to find another copy.

Sunday, May 20, 2018

Exposing Human Programming ... stepping out of the Matrix!



Published on 23 Mar 2014
Groomed to becoming consumers, we become unwitting but willing slaves to the Temple of Global Corporatism ... an agenda which serves to suppress our true selves, preventing us from realising who we are and from achieving our full potential.

Alternative News Feed


Tuesday, October 11, 2016

DEFCON 16: Advanced Physical Attacks: Going Beyond Social Engineering and Dumpster Diving


Uploaded on 21 Jan 2011
Speaker: Eric SchmiedlSecurity Researcher

Your stack is smash-proof. Your dumpster is fully alarmed. And your firewall is so secure that it has former Soviet officials green with envy. So why are the developers finding their undocumented features in competitors' products, or company executives on a constant hunt for leaks and traitors? There's a whole lot more to doing an end-run around network security than calling up and pretending to be the help desk or hoping someone chucks a service manual in the trash Professional attackers with specific targets have a whole rash of techniques -- from using targeted employees to hiding microphones -- adopted from the world of espionage, and this talk is all about how they do what they do.

For more information visit: http://bit.ly/defcon16_information
To download the video visit: http://bit.ly/defcon16_videos

Tuesday, September 13, 2016

The History of Political Correctness (Complete)


Uploaded on 30 Mar 2011
The origins of "political correctness" or "cultural Marxism" can be found in the early parts of the 20th century from the Frankfurt School, which was the headquarters for the Communists scheming in Germany. Max Horkheimer, T.W. Adorno, Herbert Marcuse, Leo Lowenthal, and Erich Fromm were all there.

"The role of the Frankfurt School is creating the victim groups that constitutes the politically correct coalition."

Made by the Free Congress Foundation and narrated by William Lind.

Who Stole Our Culture?
http://www.wnd.com/news/article.asp?A...

Erich Fromm, Judaism, and the Frankfurt School
http://mail.blockyourid.com/~gbpprorg...

The Frankfurt School of Social Research - Review by Jett and Jahn
http://www.jettandjahn.com/2010/10/fr...

How a Handfull of Marxist Jews Turned Western and U.S. Culture Upside Down
http://www.davidduke.com/general/how-...

The Frankfurt School: Conspiracy to Corrupt
http://incogman.net/05/2009/the-frank...

Monday, September 12, 2016

Psywar - Full Documentary


Published on 2 Apr 2014
This film explores the evolution of propaganda and public relations in the United States, with an emphasis on the "elitist theory of democracy" and the relationship between war, propaganda and class.

Includes original interviews with a number of dissident scholars including Noam Chomsky, Howard Zinn, Michael Parenti, Peter Phillips ("Project Censored"), John Stauber ("PR Watch"), Christopher Simpson ("The Science of Coercion") and others.

See more at http://www.ConspiracyDocumentaries.com

Sunday, August 28, 2016

PLUTOCRACY Political Repression In The U.S.A. (2015) HQ FULL


Published on 9 Dec 2015
Hopefully, Youtube will not attempt to suppress this upload like they did with my upload of Scott Nobles HUMAN RESOURCES Social Engineering In The 20th Century film a few years ago.

Just in case, you can view the film in it's entirety here:
http://www.filmsforaction.org/watch/p...

Watch this presentation now while you can in case YT loses it's mind again and decides to unfairly censor this one also.

YOUTUBE: PLEASE NOTE:
I HAVE PERMISSION TO UPLOAD THIS FILM! Contact: Scott Noble Website: http://metanoia-films.org

Read More

Friday, February 26, 2016

DeepSec 2010: The Future of Social Engineering



Uploaded on 6 Aug 2011
Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube.

Speaker: Sharon Conheady, First Defence Information Security Ltd

Social engineering is hitting the headlines more than ever. As computer security becomes more sophisticated, hackers are combining their technical expertise with social engineering to gain access to IT infrastructures and critical information. In any security programme people are the weakest link. It can often be easier and quicker to target the end user than using technical hacking techniques. When you combine both social engineering and traditional hacking techniques, you have an extremely dangerous attack. So what's next on the social engineering agenda? What are the emerging trends and what social engineering techniques might we expect to see in the future? In this talk, I will give an overview of the types of social engineering attacks people have used throughout the ages, from tricks used by the classic conmen of the past to the phishing attacks that are at an all time high, and the proliferation of social networking and how useful this is to social engineers. I will describe some of the new social engineering techniques and trends that are emerging and discuss war stories from my experience of social engineering, describing techniques I have used to gain access to sensitive information

For more information visit: http://bit.ly/DeepSec_2010_information
To download the video visit: http://bit.ly/DeepSec_2010_videos

Saturday, February 20, 2016

Social Engineering 101



Published on 24 Jan 2016
SHOW NOTES and MP3: https://www.corbettreport.com/?p=4868

Your habits, your opinions, your thoughts and routines: what could be more personal than these? But what if your thoughts are not your own? Join us this week on The Corbett Report as we expose the social engineering agenda, from the bigger bigger picture to the nitty gritty detail.

Psychological Tricks of the Social Engineer


Published on 23 Nov 2012

Visit https://www.grrcon.org for more information

Synopsis: Psychological Tricks of the Social Engineer: Demystifying Human Behavior
Micro-Expression Reader, and Certified Subtle Expression reader.

While several Social Engineering talks and books focus on the techniques no one clearly explains why they work. Learn why the techniques are used and what impact they have on behavior. Discover aspects of human social interaction that can be leveraged to accomplish discrete and specific goals. Gain a firm understanding of the limitations of humans objective reasoning. Finally understand the social rules that are used to navigate within the social engineering construct.

Participants will learn:
What behaviors SE's rely on to accomplish their goals
Why those behaviors exist in the first place
How to partially mitigate those behaviors
How to communicate with individuals about these behaviors removing the shame and stigma of having fallen for social engineering tricks
How to communicate to Executive Management the real impact of social engineers