Overview
Syllabus
Intro
Traditional online deception types
Catfishing
Case study I: Mark and John (UK, 2003)
Case study II: Robin Sage (US, 2010)
Chapter II: Attack
Filters
Methodology outline
Persona construction
Establishing credibility
Building a synthetic network
The hook
Maintenance
Priming
The pay-off
Case study IV: Mia Ash (Middle East, 2017)
Case study V: Syria, 2015
Ethics and legality
Chapter III: Defence
Challenges for defenders
Understanding deception
Why do we fall for it?
Interpersonal deception theory
Expanded prominence-interpretation theory
Media richness theory
Media synchronicity theory
Communication accommodation theory
Cognitive load
Strategies, processes and detection
Detecting deception
Linguistic markers
Forensic linguistics
Case study VI: Diederik Stapel
Passive detection
Active detection
Chapter IV: Fighting back
Turning the tables
Case study VII: Shannen Rossmiller
Chapter V: Conclusions
ROSE detection checklist
Future research
Shameless plug
Black Hat Sound Bytes
Feedback, questions, collaboration
References
Taught by
Black Hat