Concessions of a CIA Spy
This book’s author is a CFE
What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this book, you will discover detailed methodologies that author Peter Warmka, CFE and other threat actors use to breach the security of their targets, whether they’re high-profile individuals or entire organizations.
In this book, you will learn:
- The motivations and objectives behind attempted breaches by foreign intelligence services, criminal groups, industrial competitors, activists and other threat actors.
- How social media and carefully crafted insights into a victim’s motivations and vulnerabilities are leveraged during phishing, smishing, vishing and other advanced social engineering operations to obtain even closely held information.
- The psychology behind why humans are so susceptible to social engineering, and how influence techniques are used to circumvent established security protocols.
- How spies and other social engineers use elicitation to legally procure protected information from victims who often have no idea they’re being used.
Whether you want to learn more about the intricate methods threat actors can use to access sensitive information on your organization or want to be able to spot the ways a social engineer might manipulate you in person or online, this book will change the way you think about that innocuous email in your inbox or that unusual interaction with an eager stranger.
Ordering and Returns
If you are not 100% satisfied with any ACFE product, you may return it to us, provided it is in excellent condition, for a full refund of the item minus the cost of shipping. Toolkits and bundles may only be returned as a complete set.Ordering & Returns Policy