"𝑾𝒆𝒍𝒍, π‘°β€™π’Ž 𝒏𝒐𝒕 π’“π’†π’‚π’π’π’š 𝒔𝒖𝒑𝒑𝒐𝒔𝒆𝒅 𝒕𝒐 𝒔𝒉𝒂𝒓𝒆 π’•π’‰π’Šπ’”, 𝒃𝒖𝒕…"
Have you ever heard someone utter this phrase? There is a chance that they could be on the verge of revealing something sensitiveβ€”possibly without realizing the implications. And they could be brought to this point, intentionally.

Used in social engineering, intelligence gathering, and even corporate environments, elicitation is the art of extracting valuable or sensitive information during a seemingly regular conversation.

The techniques are usually subtle, non-threatening, easy to disguise, deniable, and effective.

My new article dives into:
πŸ”Ή What elicitation is and why it works.
πŸ”Ή The psychological tendencies that make us vulnerable.
πŸ”Ή 3 highly effective elicitation techniques (plus a bonus one).

Understanding these techniques isn’t just about learning how they work; it’s also about recognizing when they’re being used against you. Whether you’re in security, law enforcement, negotiations, or simply someone who wants to protect sensitive information, this is a skill worth knowing about.

And before you go, think: have you ever witnessed (or been part of) a situation where someone unknowingly shared too much? How did it play out?

#Elicitation #SocialEngineering #HumanBehavior #InformationSecurity #Awareness #CyberSecurity

https://christina-lekati.medium.com/elicitation-techniques-74be36e212f8

ELICITATION TECHNIQUES - Christina Lekati - Medium

β€žWell, I’m not really supposed to share this, but…” Plentiful social engineering and HUMINT attempts that aim at information collection lead the subject to share a phrase like this (followed by…

Medium

@ChristinaLekati
"And before you go, think: have you ever witnessed (or been part of) a situation where someone unknowingly shared too much? How did it play out?"

well tried 😁

@Xilokar πŸ˜‚πŸ˜‚πŸ˜‚ had to try