Think The Pretexting Firms Are Running Scared?

from the looks-that-way dept

With so much attention on the practice of “pretexting” following the HP board spying scandal, do you think the companies involved in the practice are running scared? One of the firms that was charged by the FTC back in May for selling people’s phone and credit card records (obtained by pretending to be them) has decided that it would be wise to settle, and give up all the money they earned from doing it. Though, it’s worth noting, in this case, apparently that’s only $2,700. Considering how much attention pretexting has received, it’s interesting to see that, for at least one firm in the space, it didn’t appear to be very lucrative.

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Think The Pretexting Firms Are Running Scared?”

Subscribe: RSS Leave a comment
ghost says:


We don’t have privacy, not as we know it. We have two methods available to us. Privacy by the sheer weight of numbers, one tree in a massive forest, or privacy by active dis-information!!! Actively spread false data about yourself, use hotmail/gmail/yahoo/vfemail etc to make as many of yourself as you need, each a different avatar of your personalities. Lock down your credit crapola, get pre-paid cell phones, pay with cash everywhere.

Stu says:


Who defines the language wins the game. Euphemisms hide the raw truth.

Please – refuse to use euphemisms when it comes to politics and legal issues.

Some examples:
genocide = ethnic cleansing (how sanitary it sounds)
fraud = pretexting (sounds like some kind of “text messaging” doesn’t it?)

The rest of my post is from an article by Daniel Pipes about euphemisms at:
The press, however, generally shies away from the word terrorist, preferring euphemisms. Take the assault that led to the deaths of some 400 people, many of them children, in Beslan, Russia, on September 3. Journalists have delved deep into their thesauruses, finding at least twenty euphemisms for terrorists:

Assailants – National Public Radio.

Attackers – the Economist.

Bombers – the Guardian.

Captors – the Associated Press.

Commandos – Agence France-Presse refers to the terrorists both as “membres du
commando” and “commando.”

Criminals – the Times (London).

Extremists – United Press International.

Fighters – the Washington Post.

Group – the Australian.

Guerrillas: in a New York Post editorial.

Gunmen – Reuters.

Hostage-takers – the Los Angeles Times.

Insurgents – in a New York Times headline.

Kidnappers – the Observer (London).

Militants – the Chicago Tribune.

Perpetrators – the New York Times.

Radicals – the BBC.

Rebels – in a Sydney Morning Herald headline.

Separatists – the Christian Science Monitor.

And my favorite:
Activists – the Pakistan Times.

Davey says:

Re: Re: pretexting?

Identity theft is an even better word. “Pretexting” is just another PR-made term to make corporate crime seem less malignant, more sanitized. If the perps were just the peasant classes, the machine would have come up with an equally colorful equivalent to “pirate”, as promulgated by the “entertainment industry”.

Donald Duck says:


Re: Social Engineering Techniques/Terms

All Social Engineering techniques are based on flaws in human logic known as cognitive biases. These bias flaws are used in various combinations to create attack techniques.


Pretexting is the act of creating and using an invented scenario (the pretext) to obtain information from a target, usually over the telephone. It is more than a simple lie, as it regularly involves some prior research and the use of pieces of known information (e.g., Birthday, Social Security Number, last bill amount) to establish legitimacy in the mind of the target.

The purpose is often to trick a business into disclosing customer information, and is used by private investigators to obtain telephone records, utility records, banking records and other information directly from junior company service representatives. The information can then be used to establish even greater legitimacy under tougher questioning with a manager (e.g., to make account changes, get specific balances, etc).

As most U.S. companies still authenticate a client by asking only for a Social Security Number, Birthday, or Mother’s maiden name — all of which are easily obtained from public records — the method is extremely effective and will likely continue to work well until a more stringent identification method is adopted.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...