{"id":13892,"date":"2023-03-21T02:36:22","date_gmt":"2023-03-21T01:36:22","guid":{"rendered":"https:\/\/www.graviton.at\/letterswaplibrary\/intelligence-and-interrogation-processes-by-master-of-impact-and-the-legion-of-hackers\/"},"modified":"2023-03-21T02:36:22","modified_gmt":"2023-03-21T01:36:22","slug":"intelligence-and-interrogation-processes-by-master-of-impact-and-the-legion-of-hackers","status":"publish","type":"post","link":"https:\/\/www.graviton.at\/letterswaplibrary\/intelligence-and-interrogation-processes-by-master-of-impact-and-the-legion-of-hackers\/","title":{"rendered":"Intelligence And Interrogation Processes By Master Of Impact And The Legion Of Hackers"},"content":{"rendered":"<p>   Intelligence and Interrogation Processes<br \/>\n   By:  Master Of Impact and the Legion Of Hackers<\/p>\n<p>                              INTRODUCTION:<br \/>\n                              =============<\/p>\n<p>   Doing what we do best always carries the risk of someone, somewhere, wanting<br \/>\nto hold you for questioning. In this article I hope to give those persons who<br \/>\nthat are in use (and are in no ways happen to be all new), that can give you<br \/>\nthe edge you need to come away &#8220;sin faulta&#8221;. In fact, these interrogation<br \/>\npracticies are used a lot by teachers, local police, the FBI and Secret Service<br \/>\ngirlfriends, wives, parents, etc. to obtain information from you that you<br \/>\nprobably don&#8217;t want to give out.<\/p>\n<p>     Interrogation is the art of questioning and examining a source in order to<br \/>\nobtain the maximum amount of useful information. The goal of any interrogation is to obtain useful and reliable information in a lawful manner and in a<br \/>\nminimum amount of time. The goal of any source is to deceive or hinder any<br \/>\nattempts of the interrogator to get information out of him.<\/p>\n<p>     This article will deal primarily with the principles, techniques, and<br \/>\nprocedures of intelligence interrogation. By reading this article, one<br \/>\nwho runs the risk of being interrogated can build countermeasures for common<br \/>\ninterrogation techniques. This article has some paraphrased material from a<br \/>\ngovernment interrogation manual but the majority of the information was from<br \/>\npersonal experience and prior knowledge of the subject.<\/p>\n<p>     You cannot hope to defeat interrogation techniques unless you first know<br \/>\nwhat they are. The ones listed herein are the most commonly used. After reading<br \/>\nthis article, you should be able to tell when you are being interrogated by<br \/>\npeople, and what technique(s) they are using when you probably would not have<br \/>\nknown before. Once you know what they are up to and how they are going to TRY<br \/>\nto accomplish it, YOU have the initiative!<\/p>\n<p>                                INITIATIVE:<br \/>\n                                ===========<\/p>\n<p>     Achieving and maintaining the initiative is essential to a successful<br \/>\ninterrogation just as offense is the key to success in combat operations. The<br \/>\ninitiative in any interrogation must rest with the interrogator throughout the<br \/>\nentire interrogation. He will have certain advantages at the beginning of an<br \/>\ninterrogation which will enable him to grasp the initiative and assist in<br \/>\nmaintaining the initiative throughout the interrogation.<\/p>\n<p>     The interrogator has a position of authority over you. You realize this<br \/>\nfact, and in some cases, believe that your future might well depend upon your<br \/>\nassociation with the interrogator. As in the case of police questioning,<br \/>\n&#8220;cooperate and we will go easy on you&#8221;. Like hell they will.<\/p>\n<p>     The interrogator knows the purpose of the interrogation; the source does<br \/>\nnot necessarily know the exact reason, but can generally assume (especially<br \/>\nin the case of a computer hacker or phone phreak, which is what the term<br \/>\n&#8220;source&#8221; will be referring to, during this article) because he or she is most<br \/>\nusually conscious of horrible and nasty wrong-doings he or she may have been<br \/>\nresponsible for.  Unfortunately for the source, he is generally very much in<br \/>\nthe dark about what&#8217;s happening to his life while it is, in fact, crumbling<br \/>\naround him (temporarily, anyway). This gives the source a not-so-illusionary<br \/>\nbehavior pattern of the proverbial chicken who&#8217;s had its head chopped off.<\/p>\n<p>     Having gained the initial advantage which is quite an understatement,<br \/>\nseeing that, although the risks to the source during the perpetration of<br \/>\na crime are quite obvious, the possible realistic results of being caught<br \/>\naren&#8217;t quite as impressive while one is getting away with a crime than when<br \/>\none&#8217;s home is invaded by the JC Penny-suit men wearing mirrored sunglasses,<br \/>\nthe interrogator must strive to maintain the initiative applying appropriate<br \/>\ninterrogation techniques through the exercise of self-control; by taking<br \/>\nadvantage of the source&#8217;s weaknesses as they become apparent; and by<br \/>\ncontinuously displaying an attitude of confidence and self-assurance. The<br \/>\ninterrogator, however, is &#8216;supposed&#8217; to never take advantage of your weaknesses<br \/>\nto`tae extent that the interrogation involves threats, insults, torture<br \/>\nor exposure to unpleasant or inhumane treatment of any kind. Remember, the<br \/>\nkeyword is supposed.<\/p>\n<p>     It is possible for the interrogator to lose the initiative during the<br \/>\ninterrogation of a source. If this should occur, he will probably postpone the<br \/>\ninterrogation and reassess the situation. If the interrogation is resumed, a<br \/>\ndifferent interrogator will probably be introduced. Following are some examples<br \/>\nof loss of initiative:<\/p>\n<p>* The interrogator becomes angry and completely loses his self-control because<br \/>\n  of the arrogant actions of the source (such as the unbuttoning of a jacket<br \/>\n  to reveal &#8220;Secret Service Sucks&#8221; spray painted onto the source&#8217;s T-shirt.)<br \/>\n  As a result, the interrogator loses sight of his objective and concentrates<br \/>\n  his efforts on humbling the source.<\/p>\n<p>* During the interrogation the interrogator fails to note significant<br \/>\n  discrepancies in the source&#8217;s story. The interrogator may lose his initiative<br \/>\n  as the source gains confidence from his success and resorts to further<br \/>\n  deception, leading the interrogator away from his objective.<\/p>\n<p>* The interrogator becomes overly friendly with the source and allows him to<br \/>\n  lead the interrogation. The source reports only what he believes to be<br \/>\n  important and neglects several significant items of info which could have<br \/>\n  been obtained had the interrogator maintained the initiative.<\/p>\n<p>                           PHASES OF INTERROGATION:<br \/>\n                           ========================<\/p>\n<p>      Approach Phase:<br \/>\n      &#8212;&#8212;&#8212;&#8212;&#8212;<\/p>\n<p>     Regardless of the type of source you are and your outward personality, you<br \/>\ndo possess weaknesses which, if recognized by the interrogator, can be<br \/>\nexploited. A human being is likely to:<\/p>\n<p>      o   Talk, especially after harrowing experiences<br \/>\n      o   Show deference when confronted by superior authority<br \/>\n      o   Rationalize acts about which he feels guilty<br \/>\n      o   Lack the ability to apply or to remember lessons he may have been<br \/>\n          taught regarding security if confronted with a disorganized or a<br \/>\n          strange situation.<br \/>\n      o   Cooperate with those who have control over him<br \/>\n      o   Attach less importance to a topic which the interrogator demonstrates<br \/>\n          identical or related experiences and knowledge<br \/>\n      o   Appreciate flattery and exoneration from guilt<br \/>\n      o   Cooperate readily when given material rewards<br \/>\n      o   Cooperate readily when treated as an equal<\/p>\n<p>                                  TECHNIQUES:<br \/>\n                                  ===========<\/p>\n<p>       &#8220;File and Dossier&#8221;<br \/>\n        &#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>     The interrogator prepares a dossier containing all available info obtained<br \/>\nfrom records and docs concerning you. Careful arrangement of the material with-<br \/>\nin the file may give the illusion that it contains more data than is actually<br \/>\nthere. The file may be &#8220;padded&#8221; with extra paper, if necessary. Index tabs with<br \/>\ntitles such as &#8220;education&#8221;, &#8220;employment&#8221;, &#8220;criminal record&#8221;, &#8220;bulletin boards&#8221;,<br \/>\n&#8220;violated computer systems&#8221;, and others are particularly effective for this<br \/>\npurpose. The interrogtor will confront you with the dossier at the beginning of<br \/>\nthe interrogation and explain that &#8220;intelligence&#8221; has provided a complete<br \/>\nrecord of every significant happening in your life; therefore, it would<br \/>\nbe useless to resist interrogation. The interrogator may read a few selected<br \/>\nbits of known data to further impress you. If the technique is successful, you<br \/>\nwill be impressed with and more importantly, terrified by the &#8220;voluminous&#8221;<br \/>\nfile, conclude that everything is known, and resign to complete cooperation.<\/p>\n<p>      &#8220;We know ALL&#8221;<br \/>\n       &#8212;&#8212;&#8212;&#8211;<\/p>\n<p>     This technique may be employed in conjunction with the above or by itself.<br \/>\nThe interrogator must first become thoroughly familiar with the available data<br \/>\nconcerning you. To begin the interrogation, the interrogator asks questions<br \/>\nbased on his known data. When you hesitate, refuse to answer, or provide an<br \/>\nincomplete or incorrect reply, the interrogator himself provides the detailed<br \/>\nanswer. Through the careful use of the limited number of known details, the<br \/>\ninterrogator may convince you that all the info is already known; therefore,<br \/>\nyour answers to the questions are of no consequence. When you begin to give<br \/>\naccurate and complete information, the interrogator interjects questions<br \/>\ndesigned to gain the needed info. Questions to which answers are already known<br \/>\nare also asked to test you and to maintain the deception that all the info is<br \/>\nalready known. A VERY effective technique I might add.<\/p>\n<p>     &#8220;Rapid Fire<\/p>\n<p>  This approach technique involves a psychological ploy based on the principles<br \/>\nthat:<\/p>\n<p>    * Everyone likes to be heard when they speak; and<\/p>\n<p>    * It is confusing to be interrupted in mid-sentence with an unrelated<br \/>\n      question.<\/p>\n<p>     This technique may be used with one, or simultaneously by two or more<br \/>\ninterrogators in questioning the same source. In employing this technique the<br \/>\ninterrogator asks a series of questions in such a manner that you do not have<br \/>\ntime to answer a question completely before the next question is asked. This<br \/>\ntends to confuse you and you are apt to contradict yourself, as you have little<br \/>\ntime to prepare your answers. The interrogator then confronts you with the<br \/>\ninconsistencies, causing further contradictions. In many instances you<br \/>\nwill begin to talk freely in an attempt to explain yourself and deny the<br \/>\ninconsistencies pointed out by the interrogator. In attempting to explain your<br \/>\nanswers, you are likely to reveal more than you intend, thus creating<br \/>\nadditional leads for the interrogator.<\/p>\n<p>       &#8220;Mutt and Jeff&#8221;<br \/>\n        &#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>     This technique involves a psychological ploy which takes advantage of the<br \/>\nnatural uncertainty and guilt which a source has as a result of being detained<br \/>\nand questioned. Use of this technique necessitates the employment of two<br \/>\nexperienced interrogators who are convincing as actors. Basically, the two<br \/>\ninterrogators will display opposing personalities and attitudes towards you.<br \/>\nFor example the first interrogator is very formal and displays an unsympathetic<br \/>\nattitude. This is to make you feel cut off from your friends. At the time when<br \/>\nyou act hopeless and alone, the second interrogator appears (having received<br \/>\nhis cue by a signal, and is hidden from you), scolds the first interrogator for<br \/>\nhis harsh behavior and orders him from the room. He then apologizes to soothe<br \/>\nyou, perhaps offering coffee and a cigarette. He explains that the actions of<br \/>\nthe first interrogator were largely the result of an inferior intellect and<br \/>\nlack of human sensitivity. The inference is created that the other interrogator<br \/>\nand you have in common a high degree of intelligence and an awareness of human<br \/>\nsensitivity, above and beyond that of the first interrogator. You are normally<br \/>\ninclined to have a feeling of gratitude towards the second interrogator, who<br \/>\ncontinues to show a sympathetic attitude in an effort to increase the rapport<br \/>\nand control for the questioning which will follow. Should your cooperativeness<br \/>\nbegin to fade, the second interrogator can hint that since he is of high rank,<br \/>\nhaving many other duties, he cannot afford to waste time on an uncooperative<br \/>\nsource. He may broadly infer that the first interrogator might return to<br \/>\ncontinue the questioning. When used against the proper source, this trick will<br \/>\nnormally gain complete cooperation for the interrogation.<\/p>\n<p>       &#8220;Repetition&#8221;<br \/>\n        &#8212;&#8212;&#8212;-<\/p>\n<p>     Repetition is used to induce cooperation from a hostile source. The inter-<br \/>\nrogator listens carefully to your answer to a question, and then repeats both<br \/>\nthe question and answer several times. He does this with each succeeding<br \/>\nquestion until you become so bored with the procedure that you answer the<br \/>\nquestion fully and truthfully to satisfy the interrogator and to gain relief<br \/>\nfrom the monotony of this method of questioning. The repetition technique will<br \/>\ngenerally not work when employed against introverted sources or those having<br \/>\ngreat self control.<\/p>\n<p>       &#8220;Pride and Ego&#8221;<br \/>\n        &#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>   This technique works effectively on many phreaks and hackers due to the fact<br \/>\nthat many are so damn egotistical. The strategy is to trick you into revealing<br \/>\ndesired information by flattering you.  It is effective with sources who have<br \/>\ndisplayed weaknesses or feelings of inferiority. The interrogator accuses you<br \/>\nof weakness or implies that you are unable to do a certain thing.  The proud or<br \/>\negotistical source will jump to the defensive. An example of an opening<br \/>\nquestion for this technique may be:  &#8220;Why would you own a blue box when you<br \/>\nhave absolutely no idea how to use one?&#8221; or, &#8220;Why do you hack VMS systems if<br \/>\nyou can&#8217;t do a damn thing once you&#8217;re inside of one?&#8221; It provides you with the<br \/>\nopportunity to show someone that you have &#8220;brains&#8221; and in doing so, you give<br \/>\nthe interrogator more information than you should have.<\/p>\n<p>        &#8220;Silent&#8221;<br \/>\n         &#8212;&#8212;<\/p>\n<p>   The Silent technique may be successful when used against either the nervous,<br \/>\nor the confident-type source.  When employing this technique, the interrogator<br \/>\nsays nothing to you, but looks you squarely in the eye, probably with a slight<br \/>\nsmile on his face. It is important for the interrogator not to look away from<br \/>\nyou, but force you to break eye contact first. You will become nervous, begin<br \/>\nto shift around in your chair, and look away. If you ask questions the<br \/>\ninterrogator probably will not answer them until he is ready to break the<br \/>\nsilence. A source may blurt out questions such as, &#8220;What the hell do you want<br \/>\nwith me&#8221;. When the interrogator is ready to break the silence, he may do so<br \/>\nwith some quite nonchalant questions such as, &#8220;You&#8217;ve been logging on to our<br \/>\nsystem for a long time now, haven&#8217;t you? Did you hack the passwords yourself?&#8221;.<\/p>\n<p>    In some cases the interrogator will use several approach techniques<br \/>\nconcurrently, or in succession.<\/p>\n<p>                               QUESTIONS:<br \/>\n                               ==========<\/p>\n<p>There are various questions that the interrogator may ask you:<\/p>\n<p>* Prepared questions:  When the topic under inquiry is very technical or when<br \/>\n  legal aspects of the interrogation require preciseness, the interrogator will<br \/>\n  have a list of prepared questions to follow during the interrogation.<\/p>\n<p>* Control questions:  To maintain control and to check on the truthfulness of<br \/>\n  a source, the normal questions will be mixed with control questions-those<br \/>\n  with known answers. If you fail to answer these questions, or answer wrong,<br \/>\n  it will indicate that you are either not knowledgeable in the topic or that<br \/>\n  you are lying.<\/p>\n<p>* Nonpertinent questions:  Sometimes it is necessary for the interrogator to<br \/>\n  keep the true objective of the interrogation from you. By carefully blending<br \/>\n  pertinent questions with nonpertinent questions, the interrogator can conceal<br \/>\n  the true purpose of the inquiry.<\/p>\n<p>* Direct and leading questions:  The manner in which the questions are worded<br \/>\n  has a direct bearing on your response.  A question may be posed in a number<br \/>\n  of ways:<\/p>\n<p>  o &#8220;What system did you hack into on 11\/11\/86?&#8221;<\/p>\n<p>  o &#8220;Did you break into General Dynamics&#8217; computer on 11\/11\/86?&#8221;<\/p>\n<p>  o &#8220;You did break into GD&#8217;s computer on 11\/11\/86?&#8221;<\/p>\n<p>  o &#8220;You didn&#8217;t break into GD&#8217;S computer on 11\/11\/86, did you?&#8221;<\/p>\n<p>                         PSYCHOLOGY IN INTERROGATION:<br \/>\n                         ============================<\/p>\n<p>The interrogator will watch for various psychological responses from you during<br \/>\nan interrogation.  Some of these are:<\/p>\n<p>*   Rationalization:  Creating plausible excuses or explanations for one&#8217;s acts<br \/>\n    without being aware that these excuses or explanations are way off the<br \/>\n    [obvious] reality.<\/p>\n<p>*   Identification:  To identify with and mimic a mental image of some one<br \/>\n    important to you.<\/p>\n<p>*   Compensation: Trying to make up for a psychological weakness by building<br \/>\n    up or exaggerating a psychological strength.<\/p>\n<p>*   Exhibitionism:  Showing off, bragging, etc.<\/p>\n<p>*   Fear, Anger, Frustration, etc.<\/p>\n<p>Of course when being interrogated, you should remain as emotionless as possible<br \/>\nand never show anger, or get upset (NEVER inflict physical abuse upon the<br \/>\nunsuspecting interrogator. This only creates tension between both the inter-<br \/>\nrogator and yourself). Your every move, every response, every action is noted<br \/>\nand used by the interrogator to get you to screw up and give him what he wants.<\/p>\n<p>There can be two main objectives that you can obtain when being interrogated.<br \/>\nThe first is to find ways to force the interrogator to lose his initiative. You<br \/>\ncan do this in many ways. A few that come to mind are:  Repeat everything the<br \/>\ninterrogator says. Mimic the interrogator. Laugh at the interrogator. Basically<br \/>\npiss the interrogator off and make him so mad that he loses sight of his<br \/>\nobjective. This may however, get you in deeper trouble, but it may give you<br \/>\nextra time while another interrogator is found.<\/p>\n<p>Lie like hell to the interrogator and piss him off. Such as the pathological<br \/>\nliar gimmick: &#8220;I broke into the NSA&#8217;s computer, yeah, and then used their<br \/>\nnetwork to get into the presidents private computer yeah that&#8217;s it, the<br \/>\npassword was uh&#8230;Bonzo, yeah, and then used it to take control of a satellite<br \/>\nused for Star Wars, and made it land right on top of the Kremlin, yeah that&#8217;s<br \/>\nthe ticket!&#8221;<\/p>\n<p>You can also change the subject over and over again to totally unrelated things<br \/>\nsuch as: its a nice day out today, hows the wife and kids, how about some food,<br \/>\nwho do you think is going to the superbowl, etc.<\/p>\n<p>The other and probably better objective is simply to pretend to fall for any of<br \/>\nthe various techniques used against you and feed the interrogator more and more<br \/>\nbullshit, of course being very sincere. This way he gets totally bogus<br \/>\ninformation while thinking you are cooperating fully.<\/p>\n<p>Well, I hope you never have to put this article to use in a legal manner, but<br \/>\nyou would be surprised how everyday you are interrogated without even<br \/>\nrealizing it by normal people who probably don&#8217;t realize they are interrogating<br \/>\nyou!<\/p>\n<div class='watch-action'><div class='watch-position align-right'><div class='action-like'><a class='lbg-style1 like-13892 jlk' href='javascript:void(0)' data-task='like' data-post_id='13892' data-nonce='41b6e01389' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.graviton.at\/letterswaplibrary\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Like' \/><span class='lc-13892 lc'>0<\/span><\/a><\/div><\/div> <div class='status-13892 status align-right'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>Intelligence and Interrogation Processes By: Master Of Impact and the Legion Of Hackers INTRODUCTION: ============= Doing what&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[27],"class_list":["post-13892","post","type-post","status-publish","format-standard","hentry","category-othernonsense","tag-english","wpcat-7-id"],"_links":{"self":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/13892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/comments?post=13892"}],"version-history":[{"count":1,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/13892\/revisions"}],"predecessor-version":[{"id":13893,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/13892\/revisions\/13893"}],"wp:attachment":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/media?parent=13892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/categories?post=13892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/tags?post=13892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}