id sid tid token lemma pos 3355 1 1 222 222 CD 3355 1 2 INFORMATION information NN 3355 1 3 TECHNOLOGY technology NN 3355 1 4 AND and CC 3355 1 5 LIBRARIES library NNS 3355 1 6 | | CD 3355 1 7 DECEMBER DECEMBER NNP 3355 1 8 2006 2006 CD 3355 1 9 Social social JJ 3355 1 10 engineering engineering NN 3355 1 11 is be VBZ 3355 1 12 the the DT 3355 1 13 use use NN 3355 1 14 of of IN 3355 1 15 non- non- NNP 3355 1 16 technical technical JJ 3355 1 17 means mean VBZ 3355 1 18 to to TO 3355 1 19 gain gain VB 3355 1 20 unauthorized unauthorized JJ 3355 1 21 access access NN 3355 1 22 to to IN 3355 1 23 information information NN 3355 1 24 or or CC 3355 1 25 computer computer NN 3355 1 26 systems system NNS 3355 1 27 . . . 3355 2 1 While while IN 3355 2 2 this this DT 3355 2 3 method method NN 3355 2 4 is be VBZ 3355 2 5 rec- rec- RB 3355 2 6 ognized ognized JJ 3355 2 7 as as IN 3355 2 8 a a DT 3355 2 9 major major JJ 3355 2 10 security security NN 3355 2 11 threat threat NN 3355 2 12 in in IN 3355 2 13 the the DT 3355 2 14 computer computer NN 3355 2 15 industry industry NN 3355 2 16 , , , 3355 2 17 little little JJ 3355 2 18 has have VBZ 3355 2 19 been be VBN 3355 2 20 done do VBN 3355 2 21 to to TO 3355 2 22 address address VB 3355 2 23 it -PRON- PRP 3355 2 24 in in IN 3355 2 25 the the DT 3355 2 26 library library JJ 3355 2 27 field field NN 3355 2 28 . . . 3355 3 1 This this DT 3355 3 2 is be VBZ 3355 3 3 of of IN 3355 3 4 particular particular JJ 3355 3 5 concern concern NN 3355 3 6 because because IN 3355 3 7 libraries library NNS 3355 3 8 increasingly increasingly RB 3355 3 9 have have VBP 3355 3 10 access access NN 3355 3 11 to to IN 3355 3 12 databases database NNS 3355 3 13 of of IN 3355 3 14 both both CC 3355 3 15 proprietary proprietary JJ 3355 3 16 and and CC 3355 3 17 personal personal JJ 3355 3 18 information information NN 3355 3 19 . . . 3355 4 1 This this DT 3355 4 2 tutorial tutorial NN 3355 4 3 is be VBZ 3355 4 4 designed design VBN 3355 4 5 to to TO 3355 4 6 increase increase VB 3355 4 7 the the DT 3355 4 8 awareness awareness NN 3355 4 9 of of IN 3355 4 10 library library NN 3355 4 11 staff staff NN 3355 4 12 in in IN 3355 4 13 regard regard NN 3355 4 14 to to IN 3355 4 15 the the DT 3355 4 16 issue issue NN 3355 4 17 of of IN 3355 4 18 social social JJ 3355 4 19 engineering engineering NN 3355 4 20 . . . 3355 5 1 One one CD 3355 5 2 morning morning NN 3355 5 3 the the DT 3355 5 4 phone phone NN 3355 5 5 rings ring NNS 3355 5 6 at at IN 3355 5 7 the the DT 3355 5 8 circulation circulation NN 3355 5 9 desk desk NN 3355 5 10 ; ; : 3355 5 11 the the DT 3355 5 12 assistant assistant NN 3355 5 13 , , , 3355 5 14 Joyce Joyce NNP 3355 5 15 , , , 3355 5 16 answers answer NNS 3355 5 17 . . . 3355 6 1 “ " `` 3355 6 2 Seashore Seashore NNP 3355 6 3 Branch Branch NNP 3355 6 4 Public Public NNP 3355 6 5 Library Library NNP 3355 6 6 , , , 3355 6 7 how how WRB 3355 6 8 may may MD 3355 6 9 we -PRON- PRP 3355 6 10 help help VB 3355 6 11 you -PRON- PRP 3355 6 12 ? ? . 3355 6 13 ” " '' 3355 6 14 she -PRON- PRP 3355 6 15 asks ask VBZ 3355 6 16 , , , 3355 6 17 smiling smile VBG 3355 6 18 . . . 3355 7 1 “ " `` 3355 7 2 My -PRON- PRP$ 3355 7 3 wife wife NN 3355 7 4 and and CC 3355 7 5 I -PRON- PRP 3355 7 6 recently recently RB 3355 7 7 moved move VBD 3355 7 8 and and CC 3355 7 9 I -PRON- PRP 3355 7 10 wanted want VBD 3355 7 11 to to TO 3355 7 12 confirm confirm VB 3355 7 13 that that IN 3355 7 14 you -PRON- PRP 3355 7 15 had have VBD 3355 7 16 our -PRON- PRP$ 3355 7 17 current current JJ 3355 7 18 address address NN 3355 7 19 , , , 3355 7 20 ” " '' 3355 7 21 a a DT 3355 7 22 pleas- pleas- NN 3355 7 23 ant ant NNP 3355 7 24 male male JJ 3355 7 25 voice voice NN 3355 7 26 responds respond VBZ 3355 7 27 . . . 3355 8 1 “ " `` 3355 8 2 Could Could MD 3355 8 3 you -PRON- PRP 3355 8 4 give give VB 3355 8 5 me -PRON- PRP 3355 8 6 your -PRON- PRP$ 3355 8 7 name name NN 3355 8 8 please please VB 3355 8 9 ? ? . 3355 8 10 ” " '' 3355 8 11 “ " `` 3355 8 12 The the DT 3355 8 13 card card NN 3355 8 14 is be VBZ 3355 8 15 in in IN 3355 8 16 my -PRON- PRP$ 3355 8 17 wife wife NN 3355 8 18 ’s ’s POS 3355 8 19 name name NN 3355 8 20 , , , 3355 8 21 Jennifer Jennifer NNP 3355 8 22 Greene Greene NNP 3355 8 23 . . . 3355 9 1 We -PRON- PRP 3355 9 2 ’ve have VB 3355 9 3 been be VBN 3355 9 4 so so RB 3355 9 5 busy busy JJ 3355 9 6 with with IN 3355 9 7 the the DT 3355 9 8 move move NN 3355 9 9 that that WDT 3355 9 10 she -PRON- PRP 3355 9 11 has have VBZ 3355 9 12 n’t not RB 3355 9 13 had have VBN 3355 9 14 a a DT 3355 9 15 chance chance NN 3355 9 16 to to TO 3355 9 17 catch catch VB 3355 9 18 up up RP 3355 9 19 with with IN 3355 9 20 everything everything NN 3355 9 21 . . . 3355 9 22 ” " '' 3355 9 23 “ " `` 3355 9 24 Okay okay UH 3355 9 25 , , , 3355 9 26 I -PRON- PRP 3355 9 27 have have VBP 3355 9 28 her -PRON- PRP$ 3355 9 29 information information NN 3355 9 30 here here RB 3355 9 31 . . . 3355 10 1 123 123 CD 3355 10 2 Main Main NNP 3355 10 3 Street Street NNP 3355 10 4 , , , 3355 10 5 Apartment apartment NN 3355 10 6 2B. 2b. CD 3355 11 1 Is be VBZ 3355 11 2 that that DT 3355 11 3 correct correct JJ 3355 11 4 ? ? . 3355 11 5 ” " '' 3355 11 6 “ " `` 3355 11 7 Thank thank VBP 3355 11 8 you -PRON- PRP 3355 11 9 so so RB 3355 11 10 much much RB 3355 11 11 , , , 3355 11 12 that that DT 3355 11 13 ’s ’ VBZ 3355 11 14 it -PRON- PRP 3355 11 15 . . . 3355 12 1 Do do VBP 3355 12 2 you -PRON- PRP 3355 12 3 have have VB 3355 12 4 our -PRON- PRP$ 3355 12 5 new new JJ 3355 12 6 number number NN 3355 12 7 or or CC 3355 12 8 is be VBZ 3355 12 9 it -PRON- PRP 3355 12 10 still still RB 3355 12 11 555 555 CD 3355 12 12 - - HYPH 3355 12 13 555 555 CD 3355 12 14 - - HYPH 3355 12 15 1234 1234 CD 3355 12 16 in in IN 3355 12 17 your -PRON- PRP$ 3355 12 18 records record NNS 3355 12 19 ? ? . 3355 12 20 ” " '' 3355 12 21 “ " `` 3355 12 22 Let let VB 3355 12 23 me -PRON- PRP 3355 12 24 see see VB 3355 12 25 . . . 3355 13 1 . . . 3355 14 1 . . . 3355 15 1 no no UH 3355 15 2 , , , 3355 15 3 I -PRON- PRP 3355 15 4 think think VBP 3355 15 5 we -PRON- PRP 3355 15 6 have have VBP 3355 15 7 your -PRON- PRP$ 3355 15 8 new new JJ 3355 15 9 number number NN 3355 15 10 . . . 3355 15 11 ” " '' 3355 15 12 “ " `` 3355 15 13 Could Could MD 3355 15 14 you -PRON- PRP 3355 15 15 read read VB 3355 15 16 it -PRON- PRP 3355 15 17 back back RB 3355 15 18 to to IN 3355 15 19 me -PRON- PRP 3355 15 20 ? ? . 3355 15 21 ” " '' 3355 15 22 “ " `` 3355 15 23 Sure sure UH 3355 15 24 . . . 3355 16 1 . . . 3355 17 1 . . . 3355 18 1 555 555 CD 3355 18 2 - - HYPH 3355 18 3 555 555 CD 3355 18 4 - - HYPH 3355 18 5 6789 6789 CD 3355 18 6 , , , 3355 18 7 is be VBZ 3355 18 8 that that DT 3355 18 9 right right JJ 3355 18 10 ? ? . 3355 18 11 ” " '' 3355 18 12 “ " `` 3355 18 13 555 555 CD 3355 18 14 - - HYPH 3355 18 15 555 555 CD 3355 18 16 - - HYPH 3355 18 17 6789 6789 CD 3355 18 18 . . . 3355 19 1 . . . 3355 20 1 . . . 3355 21 1 that that DT 3355 21 2 ’s ’ VBZ 3355 21 3 right right JJ 3355 21 4 . . . 3355 22 1 Thank thank VBP 3355 22 2 you -PRON- PRP 3355 22 3 very very RB 3355 22 4 much much RB 3355 22 5 , , , 3355 22 6 you -PRON- PRP 3355 22 7 ’ve have VB 3355 22 8 been be VBN 3355 22 9 very very RB 3355 22 10 helpful helpful JJ 3355 22 11 . . . 3355 22 12 ’ ' '' 3355 22 13 “ " `` 3355 22 14 No no DT 3355 22 15 problem problem NN 3355 22 16 , , , 3355 22 17 that that DT 3355 22 18 ’s ’ VBZ 3355 22 19 what what WP 3355 22 20 we -PRON- PRP 3355 22 21 ’re be VBZ 3355 22 22 here here RB 3355 22 23 for for IN 3355 22 24 . . . 3355 22 25 ” " '' 3355 22 26 < < XX 3355 22 27 click click VB 3355 22 28 > > . 3355 22 29 What what WP 3355 22 30 just just RB 3355 22 31 happened happen VBD 3355 22 32 ? ? . 3355 23 1 What what WP 3355 23 2 happened happen VBD 3355 23 3 to to IN 3355 23 4 Joyce Joyce NNP 3355 23 5 may may MD 3355 23 6 have have VB 3355 23 7 been be VBN 3355 23 8 exactly exactly RB 3355 23 9 what what WP 3355 23 10 it -PRON- PRP 3355 23 11 appeared appear VBD 3355 23 12 to to TO 3355 23 13 be be VB 3355 23 14 — — : 3355 23 15 a a DT 3355 23 16 conscientious conscientious JJ 3355 23 17 spouse spouse NN 3355 23 18 trying try VBG 3355 23 19 to to TO 3355 23 20 make make VB 3355 23 21 sure sure JJ 3355 23 22 information information NN 3355 23 23 was be VBD 3355 23 24 updated update VBN 3355 23 25 after after IN 3355 23 26 a a DT 3355 23 27 move move NN 3355 23 28 . . . 3355 24 1 But but CC 3355 24 2 what what WP 3355 24 3 else else RB 3355 24 4 could could MD 3355 24 5 it -PRON- PRP 3355 24 6 have have VB 3355 24 7 been be VBN 3355 24 8 — — : 3355 24 9 research research NN 3355 24 10 for for IN 3355 24 11 an an DT 3355 24 12 identity identity NN 3355 24 13 theft theft NN 3355 24 14 , , , 3355 24 15 or or CC 3355 24 16 a a DT 3355 24 17 stalker stalker NN 3355 24 18 trying try VBG 3355 24 19 to to TO 3355 24 20 get get VB 3355 24 21 personal personal JJ 3355 24 22 information information NN 3355 24 23 ? ? . 3355 25 1 We -PRON- PRP 3355 25 2 have have VBP 3355 25 3 no no DT 3355 25 4 way way NN 3355 25 5 of of IN 3355 25 6 knowing know VBG 3355 25 7 . . . 3355 26 1 All all DT 3355 26 2 reasons reason NNS 3355 26 3 except except IN 3355 26 4 for for IN 3355 26 5 the the DT 3355 26 6 first first JJ 3355 26 7 , , , 3355 26 8 innocent innocent JJ 3355 26 9 , , , 3355 26 10 reason reason NN 3355 26 11 are be VBP 3355 26 12 covered cover VBN 3355 26 13 by by IN 3355 26 14 the the DT 3355 26 15 term term NN 3355 26 16 social social JJ 3355 26 17 engineering engineering NN 3355 26 18 . . . 3355 27 1 In in IN 3355 27 2 the the DT 3355 27 3 language language NN 3355 27 4 of of IN 3355 27 5 computer computer NN 3355 27 6 hackers hacker NNS 3355 27 7 , , , 3355 27 8 social social JJ 3355 27 9 engineering engineering NN 3355 27 10 is be VBZ 3355 27 11 a a DT 3355 27 12 non- non- NN 3355 27 13 technical technical JJ 3355 27 14 hack hack NN 3355 27 15 . . . 3355 28 1 It -PRON- PRP 3355 28 2 is be VBZ 3355 28 3 the the DT 3355 28 4 use use NN 3355 28 5 of of IN 3355 28 6 trickery trickery NN 3355 28 7 , , , 3355 28 8 persuasion persuasion NN 3355 28 9 , , , 3355 28 10 impersonation impersonation NN 3355 28 11 , , , 3355 28 12 emotional emotional JJ 3355 28 13 manipulation manipulation NN 3355 28 14 , , , 3355 28 15 and and CC 3355 28 16 abuse abuse NN 3355 28 17 of of IN 3355 28 18 trust trust NN 3355 28 19 to to TO 3355 28 20 gain gain VB 3355 28 21 information information NN 3355 28 22 or or CC 3355 28 23 computer computer NN 3355 28 24 - - HYPH 3355 28 25 system system NN 3355 28 26 access access NN 3355 28 27 through through IN 3355 28 28 the the DT 3355 28 29 human human JJ 3355 28 30 interface interface NN 3355 28 31 . . . 3355 29 1 Regardless regardless RB 3355 29 2 of of IN 3355 29 3 an an DT 3355 29 4 institution institution NN 3355 29 5 ’s ’s POS 3355 29 6 commit- commit- NNP 3355 29 7 ment ment JJ 3355 29 8 to to IN 3355 29 9 computer computer NN 3355 29 10 security security NN 3355 29 11 through through IN 3355 29 12 technology technology NN 3355 29 13 , , , 3355 29 14 it -PRON- PRP 3355 29 15 is be VBZ 3355 29 16 vulnerable vulnerable JJ 3355 29 17 to to IN 3355 29 18 social social JJ 3355 29 19 engineering engineering NN 3355 29 20 . . . 3355 30 1 Recently recently RB 3355 30 2 , , , 3355 30 3 the the DT 3355 30 4 Institute Institute NNP 3355 30 5 of of IN 3355 30 6 Management Management NNP 3355 30 7 and and CC 3355 30 8 Administration Administration NNP 3355 30 9 ( ( -LRB- 3355 30 10 IOMA IOMA NNP 3355 30 11 ) ) -RRB- 3355 30 12 reported report VBD 3355 30 13 social social JJ 3355 30 14 engineering engineering NN 3355 30 15 as as IN 3355 30 16 the the DT 3355 30 17 number number NN 3355 30 18 - - HYPH 3355 30 19 one one CD 3355 30 20 security security NN 3355 30 21 threat threat NN 3355 30 22 for for IN 3355 30 23 2005 2005 CD 3355 30 24 . . . 3355 31 1 According accord VBG 3355 31 2 to to IN 3355 31 3 IOMA IOMA NNP 3355 31 4 , , , 3355 31 5 this this DT 3355 31 6 method method NN 3355 31 7 of of IN 3355 31 8 security security NN 3355 31 9 violation violation NN 3355 31 10 is be VBZ 3355 31 11 on on IN 3355 31 12 the the DT 3355 31 13 rise rise NN 3355 31 14 due due IN 3355 31 15 to to IN 3355 31 16 continued continued JJ 3355 31 17 improvements improvement NNS 3355 31 18 in in IN 3355 31 19 techni- techni- NN 3355 31 20 cal cal NN 3355 31 21 protections protection NNS 3355 31 22 against against IN 3355 31 23 hackers.1 hackers.1 ADD 3355 31 24 Why why WRB 3355 31 25 and and CC 3355 31 26 how how WRB 3355 31 27 does do VBZ 3355 31 28 social social JJ 3355 31 29 engineering engineering NN 3355 31 30 work work NN 3355 31 31 ? ? . 3355 32 1 The the DT 3355 32 2 first first JJ 3355 32 3 thing thing NN 3355 32 4 to to TO 3355 32 5 keep keep VB 3355 32 6 in in IN 3355 32 7 mind mind NN 3355 32 8 about about IN 3355 32 9 social social JJ 3355 32 10 engineering engineering NN 3355 32 11 is be VBZ 3355 32 12 that that IN 3355 32 13 it -PRON- PRP 3355 32 14 does do VBZ 3355 32 15 work work NN 3355 32 16 . . . 3355 33 1 Kevin Kevin NNP 3355 33 2 Mitnick Mitnick NNP 3355 33 3 , , , 3355 33 4 possibly possibly RB 3355 33 5 the the DT 3355 33 6 best well RBS 3355 33 7 known known JJ 3355 33 8 hacker hacker NN 3355 33 9 of of IN 3355 33 10 recent recent JJ 3355 33 11 decades decade NNS 3355 33 12 , , , 3355 33 13 carried carry VBD 3355 33 14 out out RP 3355 33 15 most most JJS 3355 33 16 of of IN 3355 33 17 his -PRON- PRP$ 3355 33 18 questionable questionable JJ 3355 33 19 activities activity NNS 3355 33 20 through through IN 3355 33 21 the the DT 3355 33 22 medium medium NN 3355 33 23 of of IN 3355 33 24 social social JJ 3355 33 25 engineering.2 engineering.2 CD 3355 33 26 He -PRON- PRP 3355 33 27 did do VBD 3355 33 28 not not RB 3355 33 29 need need VB 3355 33 30 to to TO 3355 33 31 use use VB 3355 33 32 his -PRON- PRP$ 3355 33 33 technical technical JJ 3355 33 34 expertise expertise NN 3355 33 35 because because IN 3355 33 36 it -PRON- PRP 3355 33 37 was be VBD 3355 33 38 easier easy JJR 3355 33 39 to to TO 3355 33 40 just just RB 3355 33 41 ask ask VB 3355 33 42 for for IN 3355 33 43 the the DT 3355 33 44 infor- infor- JJ 3355 33 45 mation mation NN 3355 33 46 he -PRON- PRP 3355 33 47 wanted want VBD 3355 33 48 . . . 3355 34 1 He -PRON- PRP 3355 34 2 discovered discover VBD 3355 34 3 that that IN 3355 34 4 people people NNS 3355 34 5 , , , 3355 34 6 when when WRB 3355 34 7 questioned question VBD 3355 34 8 appropri- appropri- JJ 3355 34 9 ately ately RB 3355 34 10 , , , 3355 34 11 would would MD 3355 34 12 give give VB 3355 34 13 him -PRON- PRP 3355 34 14 the the DT 3355 34 15 information information NN 3355 34 16 he -PRON- PRP 3355 34 17 wanted want VBD 3355 34 18 . . . 3355 35 1 Social social JJ 3355 35 2 engineering engineering NN 3355 35 3 succeeds succeed VBZ 3355 35 4 because because IN 3355 35 5 most most JJS 3355 35 6 people people NNS 3355 35 7 work work VBP 3355 35 8 under under IN 3355 35 9 the the DT 3355 35 10 assumption assumption NN 3355 35 11 that that IN 3355 35 12 others other NNS 3355 35 13 are be VBP 3355 35 14 essentially essentially RB 3355 35 15 honest honest JJ 3355 35 16 . . . 3355 36 1 As as IN 3355 36 2 a a DT 3355 36 3 pure pure JJ 3355 36 4 matter matter NN 3355 36 5 of of IN 3355 36 6 probabil- probabil- NNP 3355 36 7 ity ity NNP 3355 36 8 , , , 3355 36 9 this this DT 3355 36 10 is be VBZ 3355 36 11 true true JJ 3355 36 12 ; ; : 3355 36 13 the the DT 3355 36 14 vast vast JJ 3355 36 15 majority majority NN 3355 36 16 of of IN 3355 36 17 communications communication NNS 3355 36 18 that that WDT 3355 36 19 we -PRON- PRP 3355 36 20 receive receive VBP 3355 36 21 dur- dur- VBG 3355 36 22 ing e VBG 3355 36 23 the the DT 3355 36 24 day day NN 3355 36 25 are be VBP 3355 36 26 completely completely RB 3355 36 27 innocent innocent JJ 3355 36 28 in in IN 3355 36 29 character character NN 3355 36 30 . . . 3355 37 1 This this DT 3355 37 2 fact fact NN 3355 37 3 allows allow VBZ 3355 37 4 the the DT 3355 37 5 social social JJ 3355 37 6 engineer engineer NN 3355 37 7 to to TO 3355 37 8 be be VB 3355 37 9 effective effective JJ 3355 37 10 . . . 3355 38 1 By by IN 3355 38 2 making make VBG 3355 38 3 seemingly seemingly RB 3355 38 4 innocuous innocuous JJ 3355 38 5 requests request NNS 3355 38 6 for for IN 3355 38 7 information information NN 3355 38 8 , , , 3355 38 9 or or CC 3355 38 10 making make VBG 3355 38 11 requests request NNS 3355 38 12 in in IN 3355 38 13 a a DT 3355 38 14 way way NN 3355 38 15 that that WDT 3355 38 16 seems seem VBZ 3355 38 17 reasonable reasonable JJ 3355 38 18 at at IN 3355 38 19 the the DT 3355 38 20 time time NN 3355 38 21 , , , 3355 38 22 the the DT 3355 38 23 social social JJ 3355 38 24 engineer engineer NN 3355 38 25 can can MD 3355 38 26 gather gather VB 3355 38 27 the the DT 3355 38 28 information information NN 3355 38 29 that that WDT 3355 38 30 he -PRON- PRP 3355 38 31 or or CC 3355 38 32 she -PRON- PRP 3355 38 33 is be VBZ 3355 38 34 look- look- NN 3355 38 35 ing e VBG 3355 38 36 for for IN 3355 38 37 . . . 3355 39 1 Methods method NNS 3355 39 2 of of IN 3355 39 3 social social JJ 3355 39 4 engineering engineering NN 3355 39 5 The the DT 3355 39 6 arsenal arsenal NN 3355 39 7 of of IN 3355 39 8 the the DT 3355 39 9 social social JJ 3355 39 10 engineer engineer NN 3355 39 11 is be VBZ 3355 39 12 large large JJ 3355 39 13 and and CC 3355 39 14 very very RB 3355 39 15 well well RB 3355 39 16 established establish VBN 3355 39 17 . . . 3355 40 1 This this DT 3355 40 2 is be VBZ 3355 40 3 mainly mainly RB 3355 40 4 because because IN 3355 40 5 social social JJ 3355 40 6 engineering engineering NN 3355 40 7 amounts amount VBZ 3355 40 8 to to IN 3355 40 9 a a DT 3355 40 10 variation variation NN 3355 40 11 on on IN 3355 40 12 confidence confidence NN 3355 40 13 trickery trickery NN 3355 40 14 , , , 3355 40 15 an an DT 3355 40 16 art art NN 3355 40 17 that that WDT 3355 40 18 goes go VBZ 3355 40 19 back back RB 3355 40 20 as as RB 3355 40 21 far far RB 3355 40 22 as as IN 3355 40 23 human human JJ 3355 40 24 history history NN 3355 40 25 can can MD 3355 40 26 recall recall VB 3355 40 27 . . . 3355 41 1 One one PRP 3355 41 2 might may MD 3355 41 3 argue argue VB 3355 41 4 that that IN 3355 41 5 Homer Homer NNP 3355 41 6 ’s ’s POS 3355 41 7 Iliad Iliad NNP 3355 41 8 contains contain VBZ 3355 41 9 the the DT 3355 41 10 first first JJ 3355 41 11 record record NN 3355 41 12 of of IN 3355 41 13 a a DT 3355 41 14 social social JJ 3355 41 15 engineer- engineer- NN 3355 41 16 ing ing NN 3355 41 17 attack attack NN 3355 41 18 in in IN 3355 41 19 the the DT 3355 41 20 form form NN 3355 41 21 of of IN 3355 41 22 the the DT 3355 41 23 Trojan Trojan NNP 3355 41 24 Horse Horse NNP 3355 41 25 . . . 3355 42 1 Direct direct JJ 3355 42 2 requests request NNS 3355 42 3 Many many JJ 3355 42 4 social social JJ 3355 42 5 - - HYPH 3355 42 6 engineering engineering NN 3355 42 7 methods method NNS 3355 42 8 are be VBP 3355 42 9 complex complex JJ 3355 42 10 and and CC 3355 42 11 require require VBP 3355 42 12 significant significant JJ 3355 42 13 plan- plan- NN 3355 42 14 ning ning NN 3355 42 15 . . . 3355 43 1 However however RB 3355 43 2 , , , 3355 43 3 there there EX 3355 43 4 is be VBZ 3355 43 5 a a DT 3355 43 6 simple simple JJ 3355 43 7 and and CC 3355 43 8 effective effective JJ 3355 43 9 method method NN 3355 43 10 that that WDT 3355 43 11 is be VBZ 3355 43 12 often often RB 3355 43 13 just just RB 3355 43 14 as as RB 3355 43 15 effective effective JJ 3355 43 16 . . . 3355 44 1 The the DT 3355 44 2 social social JJ 3355 44 3 engineer engineer NN 3355 44 4 contacts contact VBZ 3355 44 5 his -PRON- PRP$ 3355 44 6 or or CC 3355 44 7 her -PRON- PRP$ 3355 44 8 target target NN 3355 44 9 and and CC 3355 44 10 simply simply RB 3355 44 11 asks ask VBZ 3355 44 12 for for IN 3355 44 13 the the DT 3355 44 14 information information NN 3355 44 15 . . . 3355 45 1 Preying prey VBG 3355 45 2 on on IN 3355 45 3 trust trust NN 3355 45 4 and and CC 3355 45 5 emotion emotion VBP 3355 45 6 Social social JJ 3355 45 7 engineering engineering NN 3355 45 8 is be VBZ 3355 45 9 a a DT 3355 45 10 method method NN 3355 45 11 of of IN 3355 45 12 gain- gain- JJ 3355 45 13 ing ing NNP 3355 45 14 information information NN 3355 45 15 through through IN 3355 45 16 the the DT 3355 45 17 persua- persua- JJ 3355 45 18 sion sion NN 3355 45 19 of of IN 3355 45 20 human human JJ 3355 45 21 sources source NNS 3355 45 22 , , , 3355 45 23 based base VBN 3355 45 24 on on IN 3355 45 25 the the DT 3355 45 26 abuse abuse NN 3355 45 27 of of IN 3355 45 28 trust trust NN 3355 45 29 and and CC 3355 45 30 the the DT 3355 45 31 manipulation manipulation NN 3355 45 32 of of IN 3355 45 33 emotion emotion NN 3355 45 34 . . . 3355 46 1 In in IN 3355 46 2 his -PRON- PRP$ 3355 46 3 book book NN 3355 46 4 , , , 3355 46 5 The the DT 3355 46 6 Art Art NNP 3355 46 7 of of IN 3355 46 8 Deception Deception NNP 3355 46 9 , , , 3355 46 10 Mitnick Mitnick NNP 3355 46 11 makes make VBZ 3355 46 12 the the DT 3355 46 13 argu- argu- JJ 3355 46 14 ment ment JJ 3355 46 15 that that IN 3355 46 16 once once RB 3355 46 17 a a DT 3355 46 18 social social JJ 3355 46 19 engineer engineer NN 3355 46 20 has have VBZ 3355 46 21 established establish VBN 3355 46 22 the the DT 3355 46 23 trust trust NN 3355 46 24 of of IN 3355 46 25 a a DT 3355 46 26 contact contact NN 3355 46 27 , , , 3355 46 28 then then RB 3355 46 29 all all DT 3355 46 30 security security NN 3355 46 31 is be VBZ 3355 46 32 effectively effectively RB 3355 46 33 voided void VBN 3355 46 34 and and CC 3355 46 35 Helping help VBG 3355 46 36 the the DT 3355 46 37 Hacker Hacker NNP 3355 46 38 ? ? . 3355 47 1 Library Library NNP 3355 47 2 Information Information NNP 3355 47 3 , , , 3355 47 4 Security Security NNP 3355 47 5 , , , 3355 47 6 and and CC 3355 47 7 Social Social NNP 3355 47 8 Engineering Engineering NNP 3355 47 9 Samuel Samuel NNP 3355 47 10 T. T. NNP 3355 47 11 C. C. NNP 3355 47 12 Thompson Thompson NNP 3355 47 13 Samuel Samuel NNP 3355 47 14 T. T. NNP 3355 47 15 C. C. NNP 3355 47 16 Thompson Thompson NNP 3355 47 17 ( ( -LRB- 3355 47 18 sthompson@ sthompson@ NNP 3355 47 19 collier-lib.org collier-lib.org NNP 3355 47 20 ) ) -RRB- 3355 47 21 , , , 3355 47 22 is be VBZ 3355 47 23 a a DT 3355 47 24 public public JJ 3355 47 25 service service NN 3355 47 26 librar- librar- NN 3355 47 27 ian ian NNP 3355 47 28 at at IN 3355 47 29 the the DT 3355 47 30 Collier Collier NNP 3355 47 31 County County NNP 3355 47 32 Public Public NNP 3355 47 33 Library Library NNP 3355 47 34 , , , 3355 47 35 Naples Naples NNP 3355 47 36 , , , 3355 47 37 Florida Florida NNP 3355 47 38 . . . 3355 48 1 HELPING help VBG 3355 48 2 THE the DT 3355 48 3 HACKER HACKER NNS 3355 48 4 ? ? . 3355 49 1 | | NNP 3355 49 2 THOMPSON THOMPSON NNP 3355 49 3 223 223 CD 3355 49 4 the the DT 3355 49 5 social social JJ 3355 49 6 engineer engineer NN 3355 49 7 can can MD 3355 49 8 gather gather VB 3355 49 9 what- what- NN 3355 49 10 ever ever RB 3355 49 11 information information NN 3355 49 12 is be VBZ 3355 49 13 required require VBN 3355 49 14 . . . 3355 50 1 The the DT 3355 50 2 most most RBS 3355 50 3 common common JJ 3355 50 4 method method NN 3355 50 5 of of IN 3355 50 6 tar- tar- NN 3355 50 7 geting get VBG 3355 50 8 computer computer NN 3355 50 9 end end NN 3355 50 10 - - HYPH 3355 50 11 users user NNS 3355 50 12 is be VBZ 3355 50 13 through through IN 3355 50 14 the the DT 3355 50 15 manipulation manipulation NN 3355 50 16 of of IN 3355 50 17 gratitude gratitude NN 3355 50 18 . . . 3355 51 1 In in IN 3355 51 2 these these DT 3355 51 3 cases case NNS 3355 51 4 , , , 3355 51 5 a a DT 3355 51 6 social social JJ 3355 51 7 engineer engineer NN 3355 51 8 , , , 3355 51 9 usually usually RB 3355 51 10 impersonating impersonate VBG 3355 51 11 a a DT 3355 51 12 technician technician NN 3355 51 13 , , , 3355 51 14 contacts contact VBZ 3355 51 15 a a DT 3355 51 16 user user NN 3355 51 17 and and CC 3355 51 18 states state VBZ 3355 51 19 that that IN 3355 51 20 there there EX 3355 51 21 is be VBZ 3355 51 22 something something NN 3355 51 23 wrong wrong JJ 3355 51 24 on on IN 3355 51 25 the the DT 3355 51 26 victim victim NN 3355 51 27 ’s ’s POS 3355 51 28 end end NN 3355 51 29 , , , 3355 51 30 and and CC 3355 51 31 that that IN 3355 51 32 the the DT 3355 51 33 social social JJ 3355 51 34 engineer engineer NN 3355 51 35 needs need VBZ 3355 51 36 a a DT 3355 51 37 few few JJ 3355 51 38 pieces piece NNS 3355 51 39 of of IN 3355 51 40 information information NN 3355 51 41 to to TO 3355 51 42 “ " `` 3355 51 43 help help VB 3355 51 44 ” " '' 3355 51 45 the the DT 3355 51 46 user user NN 3355 51 47 . . . 3355 52 1 Appreciative appreciative JJ 3355 52 2 of of IN 3355 52 3 the the DT 3355 52 4 assistance assistance NN 3355 52 5 , , , 3355 52 6 the the DT 3355 52 7 vic- vic- NN 3355 52 8 tim tim NN 3355 52 9 provides provide VBZ 3355 52 10 the the DT 3355 52 11 necessary necessary JJ 3355 52 12 informa- informa- JJ 3355 52 13 tion tion NN 3355 52 14 to to IN 3355 52 15 the the DT 3355 52 16 helpful helpful JJ 3355 52 17 caller caller NN 3355 52 18 or or CC 3355 52 19 carries carry VBZ 3355 52 20 out out RP 3355 52 21 the the DT 3355 52 22 requested request VBN 3355 52 23 actions action NNS 3355 52 24 . . . 3355 53 1 Predictably predictably RB 3355 53 2 , , , 3355 53 3 no no DT 3355 53 4 problem problem NN 3355 53 5 ever ever RB 3355 53 6 existed exist VBD 3355 53 7 and and CC 3355 53 8 the the DT 3355 53 9 victim victim NN 3355 53 10 has have VBZ 3355 53 11 now now RB 3355 53 12 provided provide VBN 3355 53 13 the the DT 3355 53 14 social social JJ 3355 53 15 engineer engineer NN 3355 53 16 either either CC 3355 53 17 access access NN 3355 53 18 to to IN 3355 53 19 a a DT 3355 53 20 computer computer NN 3355 53 21 system system NN 3355 53 22 or or CC 3355 53 23 with with IN 3355 53 24 the the DT 3355 53 25 information information NN 3355 53 26 needed need VBN 3355 53 27 to to TO 3355 53 28 gain gain VB 3355 53 29 that that DT 3355 53 30 access access NN 3355 53 31 . . . 3355 54 1 A a DT 3355 54 2 counterpoint counterpoint NN 3355 54 3 to to IN 3355 54 4 the the DT 3355 54 5 manipula- manipula- JJ 3355 54 6 tion tion NN 3355 54 7 of of IN 3355 54 8 gratitude gratitude NN 3355 54 9 is be VBZ 3355 54 10 the the DT 3355 54 11 manipulation manipulation NN 3355 54 12 of of IN 3355 54 13 sympathy sympathy NN 3355 54 14 . . . 3355 55 1 This this DT 3355 55 2 method method NN 3355 55 3 is be VBZ 3355 55 4 most most RBS 3355 55 5 often often RB 3355 55 6 used use VBN 3355 55 7 on on IN 3355 55 8 information information NN 3355 55 9 providers provider NNS 3355 55 10 such such JJ 3355 55 11 as as IN 3355 55 12 help help NN 3355 55 13 - - HYPH 3355 55 14 desk desk NN 3355 55 15 personnel personnel NNS 3355 55 16 , , , 3355 55 17 techni- techni- VBG 3355 55 18 cians cian NNS 3355 55 19 , , , 3355 55 20 and and CC 3355 55 21 library library NN 3355 55 22 staff staff NN 3355 55 23 members member NNS 3355 55 24 . . . 3355 56 1 In in IN 3355 56 2 this this DT 3355 56 3 scenario scenario NN 3355 56 4 , , , 3355 56 5 a a DT 3355 56 6 social social JJ 3355 56 7 engineer engineer NN 3355 56 8 con- con- NN 3355 56 9 tacts tact VBZ 3355 56 10 a a DT 3355 56 11 victim victim NN 3355 56 12 and and CC 3355 56 13 claims claim NNS 3355 56 14 to to TO 3355 56 15 have have VB 3355 56 16 either either CC 3355 56 17 lost lose VBN 3355 56 18 information information NN 3355 56 19 , , , 3355 56 20 is be VBZ 3355 56 21 out out IN 3355 56 22 of of IN 3355 56 23 contact contact NN 3355 56 24 with with IN 3355 56 25 a a DT 3355 56 26 normal normal JJ 3355 56 27 source source NN 3355 56 28 , , , 3355 56 29 or or CC 3355 56 30 is be VBZ 3355 56 31 simply simply RB 3355 56 32 ignorant ignorant JJ 3355 56 33 of of IN 3355 56 34 something something NN 3355 56 35 that that WDT 3355 56 36 he -PRON- PRP 3355 56 37 or or CC 3355 56 38 she -PRON- PRP 3355 56 39 should should MD 3355 56 40 know know VB 3355 56 41 . . . 3355 57 1 As as IN 3355 57 2 anyone anyone NN 3355 57 3 can can MD 3355 57 4 empathize empathize VB 3355 57 5 with with IN 3355 57 6 this this DT 3355 57 7 plea plea NN 3355 57 8 , , , 3355 57 9 the the DT 3355 57 10 victim victim NN 3355 57 11 is be VBZ 3355 57 12 often often RB 3355 57 13 all all RB 3355 57 14 too too RB 3355 57 15 willing willing JJ 3355 57 16 to to TO 3355 57 17 provide provide VB 3355 57 18 the the DT 3355 57 19 information information NN 3355 57 20 sought seek VBN 3355 57 21 by by IN 3355 57 22 the the DT 3355 57 23 social social JJ 3355 57 24 engineer engineer NN 3355 57 25 . . . 3355 58 1 Using use VBG 3355 58 2 these these DT 3355 58 3 methods method NNS 3355 58 4 — — : 3355 58 5 taking take VBG 3355 58 6 advantage advantage NN 3355 58 7 of of IN 3355 58 8 the the DT 3355 58 9 gratitude gratitude NN 3355 58 10 , , , 3355 58 11 sympathy sympathy NN 3355 58 12 , , , 3355 58 13 and and CC 3355 58 14 empathy empathy NN 3355 58 15 of of IN 3355 58 16 their -PRON- PRP$ 3355 58 17 victims victim NNS 3355 58 18 — — : 3355 58 19 social social JJ 3355 58 20 engineers engineer NNS 3355 58 21 are be VBP 3355 58 22 able able JJ 3355 58 23 to to TO 3355 58 24 achieve achieve VB 3355 58 25 their -PRON- PRP$ 3355 58 26 aims aim NNS 3355 58 27 . . . 3355 59 1 Impersonation impersonation NN 3355 59 2 Because because IN 3355 59 3 forming form VBG 3355 59 4 trust trust NN 3355 59 5 relationships relationship NNS 3355 59 6 with with IN 3355 59 7 their -PRON- PRP$ 3355 59 8 victims victim NNS 3355 59 9 is be VBZ 3355 59 10 critical critical JJ 3355 59 11 to to IN 3355 59 12 a a DT 3355 59 13 social- social- NN 3355 59 14 engineering engineering NN 3355 59 15 attack attack NN 3355 59 16 , , , 3355 59 17 it -PRON- PRP 3355 59 18 is be VBZ 3355 59 19 not not RB 3355 59 20 surprising surprising JJ 3355 59 21 that that IN 3355 59 22 social social JJ 3355 59 23 engineers engineer NNS 3355 59 24 often often RB 3355 59 25 pretend pretend VBP 3355 59 26 to to TO 3355 59 27 be be VB 3355 59 28 someone someone NN 3355 59 29 or or CC 3355 59 30 something something NN 3355 59 31 that that WDT 3355 59 32 they -PRON- PRP 3355 59 33 are be VBP 3355 59 34 not not RB 3355 59 35 . . . 3355 60 1 Two two CD 3355 60 2 of of IN 3355 60 3 the the DT 3355 60 4 major major JJ 3355 60 5 tools tool NNS 3355 60 6 of of IN 3355 60 7 imper- imper- NN 3355 60 8 sonation sonation NN 3355 60 9 are be VBP 3355 60 10 ( ( -LRB- 3355 60 11 1 1 LS 3355 60 12 ) ) -RRB- 3355 60 13 speaking speak VBG 3355 60 14 the the DT 3355 60 15 language language NN 3355 60 16 of of IN 3355 60 17 the the DT 3355 60 18 victim victim NN 3355 60 19 institution institution NN 3355 60 20 and and CC 3355 60 21 ( ( -LRB- 3355 60 22 2 2 LS 3355 60 23 ) ) -RRB- 3355 60 24 knowl- knowl- NNP 3355 60 25 edge edge NN 3355 60 26 of of IN 3355 60 27 personnel personnel NNS 3355 60 28 and and CC 3355 60 29 policy policy NN 3355 60 30 . . . 3355 61 1 To to TO 3355 61 2 allay allay VB 3355 61 3 suspicion suspicion NN 3355 61 4 , , , 3355 61 5 a a DT 3355 61 6 social social JJ 3355 61 7 engi- engi- NNP 3355 61 8 neer neer NN 3355 61 9 needs need VBZ 3355 61 10 to to TO 3355 61 11 know know VB 3355 61 12 and and CC 3355 61 13 be be VB 3355 61 14 able able JJ 3355 61 15 to to TO 3355 61 16 use use VB 3355 61 17 an an DT 3355 61 18 institution institution NN 3355 61 19 ’s ’s POS 3355 61 20 terminology terminology NN 3355 61 21 . . . 3355 62 1 Being be VBG 3355 62 2 unable unable JJ 3355 62 3 to to TO 3355 62 4 do do VB 3355 62 5 so so RB 3355 62 6 would would MD 3355 62 7 cause cause VB 3355 62 8 the the DT 3355 62 9 victim victim NN 3355 62 10 to to TO 3355 62 11 suspect suspect VB 3355 62 12 , , , 3355 62 13 rather rather RB 3355 62 14 than than IN 3355 62 15 trust trust VB 3355 62 16 , , , 3355 62 17 the the DT 3355 62 18 social social JJ 3355 62 19 engineer engineer NN 3355 62 20 . . . 3355 63 1 With with IN 3355 63 2 a a DT 3355 63 3 working work VBG 3355 63 4 knowledge knowledge NN 3355 63 5 of of IN 3355 63 6 an an DT 3355 63 7 organization organization NN 3355 63 8 ’s ’s POS 3355 63 9 par- par- NN 3355 63 10 ticular ticular NNP 3355 63 11 vocabulary vocabulary NNP 3355 63 12 , , , 3355 63 13 a a DT 3355 63 14 social social JJ 3355 63 15 engineer engineer NN 3355 63 16 can can MD 3355 63 17 phrase phrase VB 3355 63 18 his -PRON- PRP$ 3355 63 19 or or CC 3355 63 20 her -PRON- PRP$ 3355 63 21 request request NN 3355 63 22 in in IN 3355 63 23 terms term NNS 3355 63 24 that that WDT 3355 63 25 will will MD 3355 63 26 not not RB 3355 63 27 rouse rouse VB 3355 63 28 alarm alarm NN 3355 63 29 with with IN 3355 63 30 the the DT 3355 63 31 intended intend VBN 3355 63 32 victim victim NN 3355 63 33 . . . 3355 64 1 The the DT 3355 64 2 other other JJ 3355 64 3 major major JJ 3355 64 4 goal goal NN 3355 64 5 of of IN 3355 64 6 a a DT 3355 64 7 social social JJ 3355 64 8 engineer engineer NN 3355 64 9 in in IN 3355 64 10 preparing prepare VBG 3355 64 11 a a DT 3355 64 12 successful successful JJ 3355 64 13 impersonation impersonation NN 3355 64 14 is be VBZ 3355 64 15 to to TO 3355 64 16 develop develop VB 3355 64 17 a a DT 3355 64 18 famil- famil- JJ 3355 64 19 iarity iarity NN 3355 64 20 with with IN 3355 64 21 the the DT 3355 64 22 “ " `` 3355 64 23 lay lay NN 3355 64 24 of of IN 3355 64 25 the the DT 3355 64 26 land land NN 3355 64 27 , , , 3355 64 28 ” " '' 3355 64 29 i.e. i.e. FW 3355 64 30 , , , 3355 64 31 the the DT 3355 64 32 specifics specific NNS 3355 64 33 of of IN 3355 64 34 and and CC 3355 64 35 personnel personnel NNS 3355 64 36 within within IN 3355 64 37 an an DT 3355 64 38 organization organization NN 3355 64 39 . . . 3355 65 1 For for IN 3355 65 2 instance instance NN 3355 65 3 , , , 3355 65 4 a a DT 3355 65 5 social social JJ 3355 65 6 engineer engineer NN 3355 65 7 needs need VBZ 3355 65 8 to to TO 3355 65 9 discover discover VB 3355 65 10 who who WP 3355 65 11 has have VBZ 3355 65 12 what what WP 3355 65 13 authority authority NN 3355 65 14 within within IN 3355 65 15 an an DT 3355 65 16 organization organization NN 3355 65 17 so so IN 3355 65 18 as as IN 3355 65 19 to to TO 3355 65 20 understand understand VB 3355 65 21 for for IN 3355 65 22 whom whom WP 3355 65 23 he -PRON- PRP 3355 65 24 or or CC 3355 65 25 she -PRON- PRP 3355 65 26 needs need VBZ 3355 65 27 to to TO 3355 65 28 claim claim VB 3355 65 29 to to TO 3355 65 30 speak speak VB 3355 65 31 . . . 3355 66 1 Research research NN 3355 66 2 To to TO 3355 66 3 establish establish VB 3355 66 4 trust trust NN 3355 66 5 in in IN 3355 66 6 their -PRON- PRP$ 3355 66 7 victims victim NNS 3355 66 8 , , , 3355 66 9 social social JJ 3355 66 10 engineers engineer NNS 3355 66 11 use use VBP 3355 66 12 research research NN 3355 66 13 as as IN 3355 66 14 a a DT 3355 66 15 tool tool NN 3355 66 16 . . . 3355 67 1 This this DT 3355 67 2 comes come VBZ 3355 67 3 in in IN 3355 67 4 two two CD 3355 67 5 forms form NNS 3355 67 6 , , , 3355 67 7 background background NN 3355 67 8 research research NN 3355 67 9 and and CC 3355 67 10 cumulative cumulative JJ 3355 67 11 research research NN 3355 67 12 . . . 3355 68 1 Background Background NNP 3355 68 2 research research NN 3355 68 3 is be VBZ 3355 68 4 the the DT 3355 68 5 pro- pro- NN 3355 68 6 cess cess NN 3355 68 7 by by IN 3355 68 8 which which WDT 3355 68 9 a a DT 3355 68 10 social social JJ 3355 68 11 engineer engineer NN 3355 68 12 uses use VBZ 3355 68 13 publicly publicly RB 3355 68 14 available available JJ 3355 68 15 resources resource NNS 3355 68 16 to to TO 3355 68 17 learn learn VB 3355 68 18 what what WP 3355 68 19 to to TO 3355 68 20 ask ask VB 3355 68 21 for for IN 3355 68 22 , , , 3355 68 23 how how WRB 3355 68 24 to to TO 3355 68 25 ask ask VB 3355 68 26 for for IN 3355 68 27 it -PRON- PRP 3355 68 28 , , , 3355 68 29 and and CC 3355 68 30 whom whom WP 3355 68 31 to to TO 3355 68 32 ask ask VB 3355 68 33 it -PRON- PRP 3355 68 34 of of IN 3355 68 35 . . . 3355 69 1 While while IN 3355 69 2 the the DT 3355 69 3 intent intent NN 3355 69 4 and and CC 3355 69 5 goal goal NN 3355 69 6 of of IN 3355 69 7 this this DT 3355 69 8 research research NN 3355 69 9 differs differ VBZ 3355 69 10 from from IN 3355 69 11 the the DT 3355 69 12 techniques technique NNS 3355 69 13 used use VBN 3355 69 14 by by IN 3355 69 15 students student NNS 3355 69 16 , , , 3355 69 17 librarians librarian NNS 3355 69 18 , , , 3355 69 19 and and CC 3355 69 20 other other JJ 3355 69 21 members member NNS 3355 69 22 of of IN 3355 69 23 the the DT 3355 69 24 population population NN 3355 69 25 , , , 3355 69 26 the the DT 3355 69 27 actual actual JJ 3355 69 28 process process NN 3355 69 29 is be VBZ 3355 69 30 the the DT 3355 69 31 same same JJ 3355 69 32 . . . 3355 70 1 Cumulative cumulative JJ 3355 70 2 research research NN 3355 70 3 is be VBZ 3355 70 4 the the DT 3355 70 5 process process NN 3355 70 6 by by IN 3355 70 7 which which WDT 3355 70 8 a a DT 3355 70 9 social social JJ 3355 70 10 engineer engineer NN 3355 70 11 gathers gather VBZ 3355 70 12 the the DT 3355 70 13 information information NN 3355 70 14 that that WDT 3355 70 15 he -PRON- PRP 3355 70 16 or or CC 3355 70 17 she -PRON- PRP 3355 70 18 needs need VBZ 3355 70 19 to to TO 3355 70 20 make make VB 3355 70 21 more more RBR 3355 70 22 critical critical JJ 3355 70 23 requests request NNS 3355 70 24 of of IN 3355 70 25 their -PRON- PRP$ 3355 70 26 victims victim NNS 3355 70 27 . . . 3355 71 1 The the DT 3355 71 2 facts fact NNS 3355 71 3 that that WDT 3355 71 4 a a DT 3355 71 5 social social JJ 3355 71 6 engineer engineer NN 3355 71 7 seeks seek VBZ 3355 71 8 through through IN 3355 71 9 cumulative cumulative JJ 3355 71 10 research research NN 3355 71 11 may may MD 3355 71 12 seem seem VB 3355 71 13 without without IN 3355 71 14 value value NN 3355 71 15 to to IN 3355 71 16 the the DT 3355 71 17 casual casual JJ 3355 71 18 observer observer NN 3355 71 19 , , , 3355 71 20 but but CC 3355 71 21 put put VB 3355 71 22 together together RB 3355 71 23 properly properly RB 3355 71 24 , , , 3355 71 25 they -PRON- PRP 3355 71 26 are be VBP 3355 71 27 anything anything NN 3355 71 28 but but IN 3355 71 29 that that DT 3355 71 30 . . . 3355 72 1 Questions question NNS 3355 72 2 can can MD 3355 72 3 include include VB 3355 72 4 names name NNS 3355 72 5 of of IN 3355 72 6 staff staff NN 3355 72 7 , , , 3355 72 8 internal internal JJ 3355 72 9 phone phone NN 3355 72 10 numbers number NNS 3355 72 11 , , , 3355 72 12 procedures procedure NNS 3355 72 13 , , , 3355 72 14 or or CC 3355 72 15 seemingly seemingly RB 3355 72 16 minor minor JJ 3355 72 17 technical technical JJ 3355 72 18 details detail NNS 3355 72 19 about about IN 3355 72 20 the the DT 3355 72 21 library library NN 3355 72 22 ’s ’s POS 3355 72 23 network network NN 3355 72 24 ( ( -LRB- 3355 72 25 e.g. e.g. RB 3355 72 26 , , , 3355 72 27 what what WP 3355 72 28 operating operating NN 3355 72 29 system system NN 3355 72 30 are be VBP 3355 72 31 you -PRON- PRP 3355 72 32 running run VBG 3355 72 33 ? ? . 3355 72 34 ) ) -RRB- 3355 72 35 . . . 3355 73 1 Late late RB 3355 73 2 in in IN 3355 73 3 the the DT 3355 73 4 afternoon afternoon NN 3355 73 5 the the DT 3355 73 6 phone phone NN 3355 73 7 at at IN 3355 73 8 the the DT 3355 73 9 reference reference NN 3355 73 10 desk desk NN 3355 73 11 rings ring NNS 3355 73 12 . . . 3355 74 1 Marcy Marcy NNP 3355 74 2 , , , 3355 74 3 the the DT 3355 74 4 librarian librarian NN 3355 74 5 on on IN 3355 74 6 duty duty NN 3355 74 7 answers answer NNS 3355 74 8 , , , 3355 74 9 “ " `` 3355 74 10 Reference reference NN 3355 74 11 desk desk NN 3355 74 12 . . . 3355 74 13 ” " '' 3355 74 14 “ " `` 3355 74 15 Hi hi UH 3355 74 16 there there RB 3355 74 17 , , , 3355 74 18 this this DT 3355 74 19 is be VBZ 3355 74 20 Dave Dave NNP 3355 74 21 Simpson Simpson NNP 3355 74 22 calling call VBG 3355 74 23 from from IN 3355 74 24 information information NN 3355 74 25 services service NNS 3355 74 26 at at IN 3355 74 27 the the DT 3355 74 28 main main JJ 3355 74 29 branch branch NN 3355 74 30 . . . 3355 75 1 Sorry sorry JJ 3355 75 2 about about IN 3355 75 3 the the DT 3355 75 4 echo echo NN 3355 75 5 , , , 3355 75 6 I -PRON- PRP 3355 75 7 ’m be VBP 3355 75 8 working work VBG 3355 75 9 in in IN 3355 75 10 the the DT 3355 75 11 cabling cable VBG 3355 75 12 closet closet NN 3355 75 13 at at IN 3355 75 14 the the DT 3355 75 15 moment moment NN 3355 75 16 , , , 3355 75 17 so so CC 3355 75 18 I -PRON- PRP 3355 75 19 ’m be VBP 3355 75 20 calling call VBG 3355 75 21 you -PRON- PRP 3355 75 22 on on IN 3355 75 23 my -PRON- PRP$ 3355 75 24 cell cell NN 3355 75 25 phone phone NN 3355 75 26 . . . 3355 75 27 ” " '' 3355 75 28 “ " `` 3355 75 29 No no DT 3355 75 30 problem problem NN 3355 75 31 , , , 3355 75 32 I -PRON- PRP 3355 75 33 can can MD 3355 75 34 hear hear VB 3355 75 35 you -PRON- PRP 3355 75 36 fine fine JJ 3355 75 37 . . . 3355 76 1 What what WP 3355 76 2 can can MD 3355 76 3 I -PRON- PRP 3355 76 4 do do VB 3355 76 5 for for IN 3355 76 6 you -PRON- PRP 3355 76 7 ? ? . 3355 76 8 ” " '' 3355 76 9 “ " `` 3355 76 10 Thanks thanks UH 3355 76 11 . . . 3355 77 1 A a DT 3355 77 2 lot lot NN 3355 77 3 of of IN 3355 77 4 the the DT 3355 77 5 branches branch NNS 3355 77 6 have have VBP 3355 77 7 been be VBN 3355 77 8 having have VBG 3355 77 9 network network NN 3355 77 10 problems problem NNS 3355 77 11 over over IN 3355 77 12 the the DT 3355 77 13 last last JJ 3355 77 14 few few JJ 3355 77 15 days day NNS 3355 77 16 . . . 3355 78 1 Has have VBZ 3355 78 2 everything everything NN 3355 78 3 been be VBN 3355 78 4 okay okay JJ 3355 78 5 at at IN 3355 78 6 the the DT 3355 78 7 Seashore Seashore NNP 3355 78 8 Branch Branch NNP 3355 78 9 reference reference NN 3355 78 10 desk desk NN 3355 78 11 ? ? . 3355 78 12 ” " '' 3355 78 13 “ " `` 3355 78 14 I -PRON- PRP 3355 78 15 think think VBP 3355 78 16 so so RB 3355 78 17 . . . 3355 78 18 ” " '' 3355 78 19 “ " `` 3355 78 20 Okay okay UH 3355 78 21 , , , 3355 78 22 that that DT 3355 78 23 ’s ’ VBZ 3355 78 24 good good JJ 3355 78 25 . . . 3355 79 1 I -PRON- PRP 3355 79 2 ’m be VBP 3355 79 3 running run VBG 3355 79 4 a a DT 3355 79 5 test test NN 3355 79 6 right right RB 3355 79 7 now now RB 3355 79 8 on on IN 3355 79 9 the the DT 3355 79 10 network network NN 3355 79 11 and and CC 3355 79 12 needed need VBD 3355 79 13 to to TO 3355 79 14 find find VB 3355 79 15 a a DT 3355 79 16 terminal terminal NN 3355 79 17 that that WDT 3355 79 18 was be VBD 3355 79 19 behaving behave VBG 3355 79 20 itself -PRON- PRP 3355 79 21 . . . 3355 80 1 Could Could MD 3355 80 2 you -PRON- PRP 3355 80 3 log log VB 3355 80 4 off off RP 3355 80 5 and and CC 3355 80 6 let let VB 3355 80 7 me -PRON- PRP 3355 80 8 know know VB 3355 80 9 if if IN 3355 80 10 any any DT 3355 80 11 messages message NNS 3355 80 12 come come VB 3355 80 13 up up RP 3355 80 14 ? ? . 3355 80 15 ” " '' 3355 80 16 “ " `` 3355 80 17 No no DT 3355 80 18 problem problem NN 3355 80 19 . . . 3355 80 20 ” " '' 3355 80 21 Marcy marcy NN 3355 80 22 logs log VBZ 3355 80 23 off off IN 3355 80 24 of of IN 3355 80 25 the the DT 3355 80 26 reference reference NN 3355 80 27 computer computer NN 3355 80 28 ; ; : 3355 80 29 nothing nothing NN 3355 80 30 strange strange JJ 3355 80 31 happens happen NNS 3355 80 32 . . . 3355 81 1 “ " `` 3355 81 2 Just just RB 3355 81 3 the the DT 3355 81 4 usual usual JJ 3355 81 5 mes- mes- NN 3355 81 6 sages sage NNS 3355 81 7 . . . 3355 81 8 ” " '' 3355 81 9 “ " `` 3355 81 10 Good good UH 3355 81 11 . . . 3355 82 1 Now now RB 3355 82 2 start start VB 3355 82 3 logging log VBG 3355 82 4 back back RB 3355 82 5 on on RB 3355 82 6 . . . 3355 83 1 What what WDT 3355 83 2 user user NN 3355 83 3 are be VBP 3355 83 4 you -PRON- PRP 3355 83 5 going go VBG 3355 83 6 in in RB 3355 83 7 as as IN 3355 83 8 ? ? . 3355 84 1 I -PRON- PRP 3355 84 2 mean mean VBP 3355 84 3 which which WDT 3355 84 4 login login NNP 3355 84 5 name name NN 3355 84 6 are be VBP 3355 84 7 you -PRON- PRP 3355 84 8 using use VBG 3355 84 9 ? ? . 3355 84 10 ” " '' 3355 84 11 “ " `` 3355 84 12 Searef Searef NNP 3355 84 13 . . . 3355 85 1 Okay okay UH 3355 85 2 , , , 3355 85 3 I -PRON- PRP 3355 85 4 ’m be VBP 3355 85 5 logged log VBN 3355 85 6 on on RP 3355 85 7 now now RB 3355 85 8 . . . 3355 85 9 ” " '' 3355 85 10 “ " `` 3355 85 11 No no DT 3355 85 12 strange strange JJ 3355 85 13 messages message NNS 3355 85 14 ? ? . 3355 85 15 ” " '' 3355 85 16 “ " `` 3355 85 17 Nothing nothing NN 3355 85 18 . . . 3355 85 19 ” " '' 3355 85 20 “ " `` 3355 85 21 That that DT 3355 85 22 ’s ’ VBZ 3355 85 23 great great JJ 3355 85 24 . . . 3355 86 1 Look look VB 3355 86 2 , , , 3355 86 3 our -PRON- PRP$ 3355 86 4 problem problem NN 3355 86 5 might may MD 3355 86 6 be be VB 3355 86 7 kids kid NNS 3355 86 8 hacking hack VBG 3355 86 9 into into IN 3355 86 10 the the DT 3355 86 11 system system NN 3355 86 12 so so IN 3355 86 13 I -PRON- PRP 3355 86 14 need need VBP 3355 86 15 you -PRON- PRP 3355 86 16 to to TO 3355 86 17 change change VB 3355 86 18 the the DT 3355 86 19 password password NN 3355 86 20 . . . 3355 87 1 Do do VBP 3355 87 2 you -PRON- PRP 3355 87 3 know know VB 3355 87 4 how how WRB 3355 87 5 to to TO 3355 87 6 do do VB 3355 87 7 that that DT 3355 87 8 ? ? . 3355 87 9 ” " '' 3355 87 10 “ " `` 3355 87 11 I -PRON- PRP 3355 87 12 think think VBP 3355 87 13 so so RB 3355 87 14 . . . 3355 87 15 ” " '' 3355 87 16 “ " `` 3355 87 17 Well well UH 3355 87 18 , , , 3355 87 19 let let VB 3355 87 20 me -PRON- PRP 3355 87 21 walk walk VB 3355 87 22 you -PRON- PRP 3355 87 23 through through IN 3355 87 24 it -PRON- PRP 3355 87 25 . . . 3355 87 26 ” " '' 3355 87 27 Dave Dave NNP 3355 87 28 spends spend VBZ 3355 87 29 a a DT 3355 87 30 couple couple NN 3355 87 31 of of IN 3355 87 32 minutes minute NNS 3355 87 33 walking walk VBG 3355 87 34 Marcy Marcy NNP 3355 87 35 through through IN 3355 87 36 changing change VBG 3355 87 37 the the DT 3355 87 38 system system NN 3355 87 39 password password NN 3355 87 40 . . . 3355 88 1 The the DT 3355 88 2 password password NN 3355 88 3 is be VBZ 3355 88 4 now now RB 3355 88 5 changed change VBN 3355 88 6 to to IN 3355 88 7 5eaR3f 5ear3f CD 3355 88 8 , , , 3355 88 9 a a DT 3355 88 10 moderately moderately RB 3355 88 11 secure secure JJ 3355 88 12 password password NN 3355 88 13 . . . 3355 89 1 “ " `` 3355 89 2 Thanks thanks UH 3355 89 3 , , , 3355 89 4 Marcy Marcy NNP 3355 89 5 . . . 3355 90 1 You -PRON- PRP 3355 90 2 ’ve have VB 3355 90 3 been be VBN 3355 90 4 a a DT 3355 90 5 great great JJ 3355 90 6 help help NN 3355 90 7 . . . 3355 91 1 We -PRON- PRP 3355 91 2 have have VBP 3355 91 3 your -PRON- PRP$ 3355 91 4 new new JJ 3355 91 5 password password NN 3355 91 6 logged log VBN 3355 91 7 into into IN 3355 91 8 the the DT 3355 91 9 system system NN 3355 91 10 . . . 3355 92 1 Could Could MD 3355 92 2 you -PRON- PRP 3355 92 3 pass pass VB 3355 92 4 on on RP 3355 92 5 the the DT 3355 92 6 new new JJ 3355 92 7 password password NN 3355 92 8 to to IN 3355 92 9 the the DT 3355 92 10 other other JJ 3355 92 11 reference reference NN 3355 92 12 per- per- NN 3355 92 13 sonnel sonnel NN 3355 92 14 ? ? . 3355 92 15 ” " '' 3355 92 16 “ " `` 3355 92 17 Sure sure UH 3355 92 18 . . . 3355 92 19 ” " '' 3355 92 20 “ " `` 3355 92 21 Wonderful wonderful JJ 3355 92 22 . . . 3355 93 1 Just just RB 3355 93 2 remember remember VB 3355 93 3 not not RB 3355 93 4 to to TO 3355 93 5 give give VB 3355 93 6 the the DT 3355 93 7 password password NN 3355 93 8 out out RP 3355 93 9 to to IN 3355 93 10 anyone anyone NN 3355 93 11 who who WP 3355 93 12 does do VBZ 3355 93 13 n’t not RB 3355 93 14 need need VB 3355 93 15 it -PRON- PRP 3355 93 16 , , , 3355 93 17 and and CC 3355 93 18 do do VB 3355 93 19 n’t not RB 3355 93 20 write write VB 3355 93 21 it -PRON- PRP 3355 93 22 down down RP 3355 93 23 where where WRB 3355 93 24 anyone anyone NN 3355 93 25 who who WP 3355 93 26 should should MD 3355 93 27 n’t not RB 3355 93 28 have have VB 3355 93 29 it -PRON- PRP 3355 93 30 can can MD 3355 93 31 get get VB 3355 93 32 at at IN 3355 93 33 it -PRON- PRP 3355 93 34 . . . 3355 94 1 Have have VB 3355 94 2 a a DT 3355 94 3 great great JJ 3355 94 4 day day NN 3355 94 5 . . . 3355 94 6 ” " '' 3355 94 7 “ " `` 3355 94 8 You -PRON- PRP 3355 94 9 too too RB 3355 94 10 . . . 3355 94 11 ” " '' 3355 94 12 < < XX 3355 94 13 click click VB 3355 94 14 > > NFP 3355 94 15 224 224 CD 3355 94 16 INFORMATION INFORMATION NNS 3355 94 17 TECHNOLOGY technology NN 3355 94 18 AND and CC 3355 94 19 LIBRARIES library NNS 3355 94 20 | | CD 3355 94 21 DECEMBER DECEMBER NNP 3355 94 22 2006 2006 CD 3355 94 23 Why why WRB 3355 94 24 are be VBP 3355 94 25 libraries library NNS 3355 94 26 vulnerable vulnerable JJ 3355 94 27 ? ? . 3355 95 1 Libraries library NNS 3355 95 2 are be VBP 3355 95 3 vulnerable vulnerable JJ 3355 95 4 to to IN 3355 95 5 social social JJ 3355 95 6 - - HYPH 3355 95 7 engi- engi- JJ 3355 95 8 neering neering JJ 3355 95 9 attacks attack NNS 3355 95 10 for for IN 3355 95 11 two two CD 3355 95 12 major major JJ 3355 95 13 reasons reason NNS 3355 95 14 : : : 3355 95 15 ( ( -LRB- 3355 95 16 1 1 LS 3355 95 17 ) ) -RRB- 3355 95 18 ignorance ignorance NN 3355 95 19 and and CC 3355 95 20 ( ( -LRB- 3355 95 21 2 2 LS 3355 95 22 ) ) -RRB- 3355 95 23 institutional institutional JJ 3355 95 24 psychology psychology NN 3355 95 25 . . . 3355 96 1 The the DT 3355 96 2 first first JJ 3355 96 3 of of IN 3355 96 4 these these DT 3355 96 5 diffi- diffi- JJ 3355 96 6 culties cultie NNS 3355 96 7 is be VBZ 3355 96 8 the the DT 3355 96 9 easiest easy JJS 3355 96 10 to to TO 3355 96 11 address address VB 3355 96 12 . . . 3355 97 1 The the DT 3355 97 2 ignorance ignorance NN 3355 97 3 of of IN 3355 97 4 library library JJ 3355 97 5 professionals professional NNS 3355 97 6 in in IN 3355 97 7 this this DT 3355 97 8 matter matter NN 3355 97 9 is be VBZ 3355 97 10 easily easily RB 3355 97 11 explained explain VBN 3355 97 12 — — : 3355 97 13 there there EX 3355 97 14 is be VBZ 3355 97 15 very very RB 3355 97 16 little little JJ 3355 97 17 literature literature NN 3355 97 18 to to IN 3355 97 19 date date NN 3355 97 20 about about IN 3355 97 21 the the DT 3355 97 22 issue issue NN 3355 97 23 of of IN 3355 97 24 social social JJ 3355 97 25 engineering engineering NN 3355 97 26 directed direct VBN 3355 97 27 at at IN 3355 97 28 library library NN 3355 97 29 personnel personnel NNS 3355 97 30 . . . 3355 98 1 What what WP 3355 98 2 exists exist VBZ 3355 98 3 is be VBZ 3355 98 4 usually usually RB 3355 98 5 mixed mix VBN 3355 98 6 in in IN 3355 98 7 larger large JJR 3355 98 8 articles article NNS 3355 98 9 on on IN 3355 98 10 general general JJ 3355 98 11 security security NN 3355 98 12 issues issue NNS 3355 98 13 and and CC 3355 98 14 receives receive VBZ 3355 98 15 little little JJ 3355 98 16 focus focus NN 3355 98 17 . . . 3355 99 1 This this DT 3355 99 2 lack lack NN 3355 99 3 of of IN 3355 99 4 concern concern NN 3355 99 5 about about IN 3355 99 6 social social JJ 3355 99 7 engineering engineering NN 3355 99 8 can can MD 3355 99 9 also also RB 3355 99 10 be be VB 3355 99 11 seen see VBN 3355 99 12 in in IN 3355 99 13 com- com- NN 3355 99 14 puter puter NN 3355 99 15 professional professional JJ 3355 99 16 literature literature NN 3355 99 17 , , , 3355 99 18 where where WRB 3355 99 19 it -PRON- PRP 3355 99 20 is be VBZ 3355 99 21 dwarfed dwarf VBN 3355 99 22 by by IN 3355 99 23 the the DT 3355 99 24 volume volume NN 3355 99 25 of of IN 3355 99 26 articles article NNS 3355 99 27 concerning concern VBG 3355 99 28 technical technical JJ 3355 99 29 security security NN 3355 99 30 issues issue NNS 3355 99 31 . . . 3355 100 1 This this DT 3355 100 2 is be VBZ 3355 100 3 a a DT 3355 100 4 curious curious JJ 3355 100 5 gap gap NN 3355 100 6 , , , 3355 100 7 considering consider VBG 3355 100 8 the the DT 3355 100 9 high high JJ 3355 100 10 rate rate NN 3355 100 11 of of IN 3355 100 12 occurrence occurrence NN 3355 100 13 of of IN 3355 100 14 this this DT 3355 100 15 kind kind NN 3355 100 16 of of IN 3355 100 17 attack attack NN 3355 100 18 . . . 3355 101 1 Is be VBZ 3355 101 2 it -PRON- PRP 3355 101 3 because because IN 3355 101 4 many many JJ 3355 101 5 techni- techni- NN 3355 101 6 cal cal NN 3355 101 7 professionals professional NNS 3355 101 8 are be VBP 3355 101 9 less less RBR 3355 101 10 comfortable comfortable JJ 3355 101 11 with with IN 3355 101 12 a a DT 3355 101 13 social social JJ 3355 101 14 issue issue NN 3355 101 15 — — : 3355 101 16 that that WDT 3355 101 17 can can MD 3355 101 18 only only RB 3355 101 19 be be VB 3355 101 20 solved solve VBN 3355 101 21 through through IN 3355 101 22 people people NNS 3355 101 23 — — : 3355 101 24 than than IN 3355 101 25 with with IN 3355 101 26 a a DT 3355 101 27 technical technical JJ 3355 101 28 security security NN 3355 101 29 issue issue NN 3355 101 30 that that WDT 3355 101 31 can can MD 3355 101 32 be be VB 3355 101 33 solved solve VBN 3355 101 34 through through IN 3355 101 35 the the DT 3355 101 36 development development NN 3355 101 37 or or CC 3355 101 38 implementation implementation NN 3355 101 39 of of IN 3355 101 40 proper proper JJ 3355 101 41 software?3 software?3 NN 3355 101 42 Unfortunately unfortunately RB 3355 101 43 , , , 3355 101 44 not not RB 3355 101 45 knowing know VBG 3355 101 46 about about IN 3355 101 47 a a DT 3355 101 48 method method NN 3355 101 49 of of IN 3355 101 50 security security NN 3355 101 51 violation violation NN 3355 101 52 leaves leave VBZ 3355 101 53 one one CD 3355 101 54 vulnerable vulnerable JJ 3355 101 55 to to IN 3355 101 56 that that DT 3355 101 57 method method NN 3355 101 58 . . . 3355 102 1 It -PRON- PRP 3355 102 2 is be VBZ 3355 102 3 incumbent incumbent JJ 3355 102 4 on on IN 3355 102 5 librarians librarian NNS 3355 102 6 , , , 3355 102 7 computer computer NN 3355 102 8 administrations administration NNS 3355 102 9 , , , 3355 102 10 and and CC 3355 102 11 security security NN 3355 102 12 profes- profes- NN 3355 102 13 sionals sional NNS 3355 102 14 to to TO 3355 102 15 be be VB 3355 102 16 aware aware JJ 3355 102 17 of of IN 3355 102 18 these these DT 3355 102 19 issues issue NNS 3355 102 20 . . . 3355 103 1 The the DT 3355 103 2 second second JJ 3355 103 3 factor factor NN 3355 103 4 is be VBZ 3355 103 5 harder hard JJR 3355 103 6 to to TO 3355 103 7 address address VB 3355 103 8 but but CC 3355 103 9 equally equally RB 3355 103 10 important important JJ 3355 103 11 . . . 3355 104 1 Unlike unlike IN 3355 104 2 almost almost RB 3355 104 3 any any DT 3355 104 4 other other JJ 3355 104 5 profession profession NN 3355 104 6 , , , 3355 104 7 librarians librarian NNS 3355 104 8 are be VBP 3355 104 9 expected expect VBN 3355 104 10 to to TO 3355 104 11 fulfill fulfill VB 3355 104 12 their -PRON- PRP$ 3355 104 13 patrons patron NNS 3355 104 14 ’ ’ POS 3355 104 15 informational informational JJ 3355 104 16 needs need NNS 3355 104 17 without without IN 3355 104 18 ques- ques- NNP 3355 104 19 tion tion NN 3355 104 20 or or CC 3355 104 21 bias bias NN 3355 104 22 . . . 3355 105 1 This this DT 3355 105 2 laudable laudable JJ 3355 105 3 goal goal NN 3355 105 4 makes make VBZ 3355 105 5 librarians librarian NNS 3355 105 6 vulnerable vulnerable JJ 3355 105 7 to to IN 3355 105 8 social social JJ 3355 105 9 - - HYPH 3355 105 10 engi- engi- JJ 3355 105 11 neering neering JJ 3355 105 12 attacks attack NNS 3355 105 13 because because IN 3355 105 14 the the DT 3355 105 15 inquiries inquiry NNS 3355 105 16 made make VBN 3355 105 17 by by IN 3355 105 18 a a DT 3355 105 19 social social JJ 3355 105 20 engineer engineer NN 3355 105 21 about about IN 3355 105 22 the the DT 3355 105 23 information information NN 3355 105 24 resources resource NNS 3355 105 25 available available JJ 3355 105 26 at at IN 3355 105 27 a a DT 3355 105 28 library library NN 3355 105 29 may may MD 3355 105 30 be be VB 3355 105 31 used use VBN 3355 105 32 for for IN 3355 105 33 nefarious nefarious JJ 3355 105 34 purposes purpose NNS 3355 105 35 . . . 3355 106 1 A a DT 3355 106 2 reference reference NN 3355 106 3 interview interview NN 3355 106 4 over over IN 3355 106 5 these these DT 3355 106 6 issues issue NNS 3355 106 7 may may MD 3355 106 8 be be VB 3355 106 9 very very RB 3355 106 10 successful successful JJ 3355 106 11 from from IN 3355 106 12 the the DT 3355 106 13 point point NN 3355 106 14 of of IN 3355 106 15 view view NN 3355 106 16 of of IN 3355 106 17 both both DT 3355 106 18 parties party NNS 3355 106 19 involved involve VBN 3355 106 20 , , , 3355 106 21 as as IN 3355 106 22 the the DT 3355 106 23 librarian librarian NN 3355 106 24 fills fill VBZ 3355 106 25 the the DT 3355 106 26 open- open- JJ 3355 106 27 ended ended JJ 3355 106 28 inquiries inquiry NNS 3355 106 29 of of IN 3355 106 30 the the DT 3355 106 31 social social JJ 3355 106 32 engineer engineer NN 3355 106 33 , , , 3355 106 34 and and CC 3355 106 35 the the DT 3355 106 36 social social JJ 3355 106 37 engineer engineer NN 3355 106 38 receives receive VBZ 3355 106 39 much much RB 3355 106 40 , , , 3355 106 41 if if IN 3355 106 42 not not RB 3355 106 43 all all DT 3355 106 44 , , , 3355 106 45 of of IN 3355 106 46 the the DT 3355 106 47 information information NN 3355 106 48 that that WDT 3355 106 49 he -PRON- PRP 3355 106 50 or or CC 3355 106 51 she -PRON- PRP 3355 106 52 needs need VBZ 3355 106 53 to to TO 3355 106 54 violate violate VB 3355 106 55 the the DT 3355 106 56 library library NN 3355 106 57 ’s ’s POS 3355 106 58 internal internal JJ 3355 106 59 information information NN 3355 106 60 systems system NNS 3355 106 61 . . . 3355 107 1 Why why WRB 3355 107 2 libraries library NNS 3355 107 3 can can MD 3355 107 4 be be VB 3355 107 5 targets target NNS 3355 107 6 At at IN 3355 107 7 this this DT 3355 107 8 point point NN 3355 107 9 , , , 3355 107 10 it -PRON- PRP 3355 107 11 is be VBZ 3355 107 12 relevant relevant JJ 3355 107 13 to to TO 3355 107 14 ask ask VB 3355 107 15 why why WRB 3355 107 16 security security NN 3355 107 17 violators violator NNS 3355 107 18 would would MD 3355 107 19 even even RB 3355 107 20 bother bother VB 3355 107 21 with with IN 3355 107 22 library library JJ 3355 107 23 computer computer NN 3355 107 24 networks network NNS 3355 107 25 . . . 3355 108 1 What what WP 3355 108 2 do do VBP 3355 108 3 libraries library NNS 3355 108 4 have have VB 3355 108 5 that that DT 3355 108 6 is be VBZ 3355 108 7 worth worth JJ 3355 108 8 possibly possibly RB 3355 108 9 committing commit VBG 3355 108 10 a a DT 3355 108 11 crime crime NN 3355 108 12 to to TO 3355 108 13 get get VB 3355 108 14 ? ? . 3355 109 1 Personal personal JJ 3355 109 2 information information NN 3355 109 3 is be VBZ 3355 109 4 probably probably RB 3355 109 5 the the DT 3355 109 6 most most RBS 3355 109 7 tempting tempting JJ 3355 109 8 target target NN 3355 109 9 in in IN 3355 109 10 a a DT 3355 109 11 library library NN 3355 109 12 computer computer NN 3355 109 13 system system NN 3355 109 14 . . . 3355 110 1 Libraries library NNS 3355 110 2 possess possess VBP 3355 110 3 databases database NNS 3355 110 4 of of IN 3355 110 5 names name NNS 3355 110 6 , , , 3355 110 7 addresses address NNS 3355 110 8 , , , 3355 110 9 and and CC 3355 110 10 other other JJ 3355 110 11 personal personal JJ 3355 110 12 data datum NNS 3355 110 13 about about IN 3355 110 14 library library NN 3355 110 15 card- card- JJ 3355 110 16 holders holder NNS 3355 110 17 . . . 3355 111 1 This this DT 3355 111 2 information information NN 3355 111 3 is be VBZ 3355 111 4 valuable valuable JJ 3355 111 5 , , , 3355 111 6 and and CC 3355 111 7 not not RB 3355 111 8 all all DT 3355 111 9 of of IN 3355 111 10 it -PRON- PRP 3355 111 11 is be VBZ 3355 111 12 easily easily RB 3355 111 13 available available JJ 3355 111 14 from from IN 3355 111 15 public public JJ 3355 111 16 sources source NNS 3355 111 17 . . . 3355 112 1 As as IN 3355 112 2 may may MD 3355 112 3 be be VB 3355 112 4 seen see VBN 3355 112 5 in in IN 3355 112 6 the the DT 3355 112 7 section section NN 3355 112 8 of of IN 3355 112 9 this this DT 3355 112 10 article article NN 3355 112 11 on on IN 3355 112 12 techniques technique NNS 3355 112 13 , , , 3355 112 14 such such JJ 3355 112 15 information information NN 3355 112 16 could could MD 3355 112 17 be be VB 3355 112 18 used use VBN 3355 112 19 as as IN 3355 112 20 an an DT 3355 112 21 end end NN 3355 112 22 unto unto IN 3355 112 23 itself -PRON- PRP 3355 112 24 or or CC 3355 112 25 as as IN 3355 112 26 a a DT 3355 112 27 stepping stepping JJ 3355 112 28 stone stone NN 3355 112 29 to to IN 3355 112 30 security security NN 3355 112 31 violations violation NNS 3355 112 32 in in IN 3355 112 33 other other JJ 3355 112 34 systems system NNS 3355 112 35 . . . 3355 113 1 Subscriptions subscription NNS 3355 113 2 to to IN 3355 113 3 proprietary proprietary JJ 3355 113 4 data- data- JJ 3355 113 5 bases basis NNS 3355 113 6 are be VBP 3355 113 7 quite quite RB 3355 113 8 expensive expensive JJ 3355 113 9 , , , 3355 113 10 as as IN 3355 113 11 any any DT 3355 113 12 acquisitions acquisition NNS 3355 113 13 librarian librarian NN 3355 113 14 will will MD 3355 113 15 explain explain VB 3355 113 16 . . . 3355 114 1 Given give VBN 3355 114 2 the the DT 3355 114 3 high high JJ 3355 114 4 prices price NNS 3355 114 5 and and CC 3355 114 6 limited limited JJ 3355 114 7 licensing licensing NN 3355 114 8 , , , 3355 114 9 a a DT 3355 114 10 hacker hacker NN 3355 114 11 may may MD 3355 114 12 want want VB 3355 114 13 to to TO 3355 114 14 gain gain VB 3355 114 15 access access NN 3355 114 16 to to IN 3355 114 17 these these DT 3355 114 18 information information NN 3355 114 19 resources resource NNS 3355 114 20 . . . 3355 115 1 This this DT 3355 115 2 could could MD 3355 115 3 be be VB 3355 115 4 a a DT 3355 115 5 casual casual JJ 3355 115 6 hacker hacker NN 3355 115 7 who who WP 3355 115 8 wants want VBZ 3355 115 9 to to TO 3355 115 10 have have VB 3355 115 11 access access NN 3355 115 12 to to IN 3355 115 13 a a DT 3355 115 14 library library NN 3355 115 15 - - HYPH 3355 115 16 only only RB 3355 115 17 resource resource NN 3355 115 18 from from IN 3355 115 19 his -PRON- PRP$ 3355 115 20 or or CC 3355 115 21 her -PRON- PRP$ 3355 115 22 home home NN 3355 115 23 com- com- NN 3355 115 24 puter puter NN 3355 115 25 , , , 3355 115 26 or or CC 3355 115 27 this this DT 3355 115 28 may may MD 3355 115 29 be be VB 3355 115 30 a a DT 3355 115 31 criminal criminal NN 3355 115 32 who who WP 3355 115 33 wishes wish VBZ 3355 115 34 to to TO 3355 115 35 steal steal VB 3355 115 36 intellectual intellectual JJ 3355 115 37 properties property NNS 3355 115 38 from from IN 3355 115 39 a a DT 3355 115 40 database database NN 3355 115 41 provider provider NN 3355 115 42 . . . 3355 116 1 Libraries library NNS 3355 116 2 often often RB 3355 116 3 have have VBP 3355 116 4 broadband broadband NN 3355 116 5 access access NN 3355 116 6 designed design VBN 3355 116 7 for for IN 3355 116 8 a a DT 3355 116 9 large large JJ 3355 116 10 network network NN 3355 116 11 ( ( -LRB- 3355 116 12 e.g. e.g. RB 3355 116 13 , , , 3355 116 14 T1 T1 NNP 3355 116 15 ) ) -RRB- 3355 116 16 . . . 3355 117 1 As as IN 3355 117 2 these these DT 3355 117 3 lines line NNS 3355 117 4 are be VBP 3355 117 5 very very RB 3355 117 6 expensive expensive JJ 3355 117 7 , , , 3355 117 8 few few JJ 3355 117 9 individuals individual NNS 3355 117 10 can can MD 3355 117 11 afford afford VB 3355 117 12 them -PRON- PRP 3355 117 13 . . . 3355 118 1 At at IN 3355 118 2 the the DT 3355 118 3 same same JJ 3355 118 4 time time NN 3355 118 5 , , , 3355 118 6 it -PRON- PRP 3355 118 7 has have VBZ 3355 118 8 been be VBN 3355 118 9 observed observe VBN 3355 118 10 that that IN 3355 118 11 these these DT 3355 118 12 broadband broadband NN 3355 118 13 lines line NNS 3355 118 14 have have VBP 3355 118 15 immense immense JJ 3355 118 16 capabilities capability NNS 3355 118 17 for for IN 3355 118 18 down- down- JJ 3355 118 19 loading loading NN 3355 118 20 information information NN 3355 118 21 from from IN 3355 118 22 other other JJ 3355 118 23 net- net- NN 3355 118 24 works work NNS 3355 118 25 . . . 3355 119 1 There there EX 3355 119 2 are be VBP 3355 119 3 many many JJ 3355 119 4 reasons reason NNS 3355 119 5 why why WRB 3355 119 6 a a DT 3355 119 7 hacker hacker NN 3355 119 8 would would MD 3355 119 9 seek seek VB 3355 119 10 to to TO 3355 119 11 illicitly illicitly RB 3355 119 12 use use VB 3355 119 13 such such PDT 3355 119 14 a a DT 3355 119 15 resource resource NN 3355 119 16 . . . 3355 120 1 For for IN 3355 120 2 instance instance NN 3355 120 3 , , , 3355 120 4 a a DT 3355 120 5 casual casual JJ 3355 120 6 hacker hacker NN 3355 120 7 may may MD 3355 120 8 want want VB 3355 120 9 to to TO 3355 120 10 download download VB 3355 120 11 a a DT 3355 120 12 large large JJ 3355 120 13 number number NN 3355 120 14 of of IN 3355 120 15 bootlegged bootleg VBN 3355 120 16 movie movie NN 3355 120 17 files file NNS 3355 120 18 , , , 3355 120 19 or or CC 3355 120 20 a a DT 3355 120 21 criminal criminal NN 3355 120 22 may may MD 3355 120 23 wish wish VB 3355 120 24 to to TO 3355 120 25 download download VB 3355 120 26 a a DT 3355 120 27 corporate corporate JJ 3355 120 28 database database NN 3355 120 29 . . . 3355 121 1 With with IN 3355 121 2 access access NN 3355 121 3 to to IN 3355 121 4 a a DT 3355 121 5 library library NN 3355 121 6 ’s ’s POS 3355 121 7 high high JJ 3355 121 8 bandwith bandwith NN 3355 121 9 internet internet NN 3355 121 10 line line NN 3355 121 11 , , , 3355 121 12 these these DT 3355 121 13 actions action NNS 3355 121 14 can can MD 3355 121 15 be be VB 3355 121 16 carried carry VBN 3355 121 17 out out RP 3355 121 18 quickly quickly RB 3355 121 19 and and CC 3355 121 20 with with IN 3355 121 21 a a DT 3355 121 22 minimized minimize VBN 3355 121 23 chance chance NN 3355 121 24 of of IN 3355 121 25 detection detection NN 3355 121 26 . . . 3355 122 1 Libraries library NNS 3355 122 2 possess possess VBP 3355 122 3 large large JJ 3355 122 4 numbers number NNS 3355 122 5 of of IN 3355 122 6 computers computer NNS 3355 122 7 due due IN 3355 122 8 to to IN 3355 122 9 their -PRON- PRP$ 3355 122 10 increas- increas- JJ 3355 122 11 ing ing NN 3355 122 12 automation automation NN 3355 122 13 . . . 3355 123 1 These these DT 3355 123 2 computer computer NN 3355 123 3 resources resource NNS 3355 123 4 can can MD 3355 123 5 , , , 3355 123 6 if if IN 3355 123 7 compromised compromise VBN 3355 123 8 , , , 3355 123 9 be be VB 3355 123 10 used use VBN 3355 123 11 as as IN 3355 123 12 anonymous anonymous JJ 3355 123 13 remote remote JJ 3355 123 14 comput- comput- NNP 3355 123 15 ers ers NNP 3355 123 16 by by IN 3355 123 17 hackers hacker NNS 3355 123 18 . . . 3355 124 1 Called call VBN 3355 124 2 “ " `` 3355 124 3 zombies zombie NNS 3355 124 4 , , , 3355 124 5 ” " '' 3355 124 6 compromised compromise VBN 3355 124 7 computers computer NNS 3355 124 8 could could MD 3355 124 9 be be VB 3355 124 10 used use VBN 3355 124 11 to to TO 3355 124 12 deliver deliver VB 3355 124 13 illegal illegal JJ 3355 124 14 spam spam NN 3355 124 15 , , , 3355 124 16 distrib- distrib- JJ 3355 124 17 uted uted JJ 3355 124 18 denial denial NN 3355 124 19 of of IN 3355 124 20 service service NN 3355 124 21 ( ( -LRB- 3355 124 22 DDoS ddos NN 3355 124 23 ) ) -RRB- 3355 124 24 attacks attack NNS 3355 124 25 , , , 3355 124 26 or or CC 3355 124 27 as as IN 3355 124 28 servers server NNS 3355 124 29 to to TO 3355 124 30 distribute distribute VB 3355 124 31 illegal illegal JJ 3355 124 32 materials material NNS 3355 124 33 . . . 3355 125 1 If if IN 3355 125 2 library library JJ 3355 125 3 computers computer NNS 3355 125 4 are be VBP 3355 125 5 used use VBN 3355 125 6 in in IN 3355 125 7 this this DT 3355 125 8 way way NN 3355 125 9 , , , 3355 125 10 there there EX 3355 125 11 is be VBZ 3355 125 12 a a DT 3355 125 13 potential potential NN 3355 125 14 for for IN 3355 125 15 a a DT 3355 125 16 library library NN 3355 125 17 to to TO 3355 125 18 face face VB 3355 125 19 legal legal JJ 3355 125 20 responsibil- responsibil- JJ 3355 125 21 ity ity NN 3355 125 22 for for IN 3355 125 23 the the DT 3355 125 24 actions action NNS 3355 125 25 of of IN 3355 125 26 its -PRON- PRP$ 3355 125 27 computers computer NNS 3355 125 28 or or CC 3355 125 29 for for IN 3355 125 30 the the DT 3355 125 31 questionable questionable JJ 3355 125 32 materials material NNS 3355 125 33 found find VBN 3355 125 34 on on IN 3355 125 35 them -PRON- PRP 3355 125 36 . . . 3355 126 1 Prevention prevention NN 3355 126 2 The the DT 3355 126 3 tools tool NNS 3355 126 4 needed need VBN 3355 126 5 to to TO 3355 126 6 prevent prevent VB 3355 126 7 social social JJ 3355 126 8 engineering engineering NN 3355 126 9 from from IN 3355 126 10 succeeding succeed VBG 3355 126 11 are be VBP 3355 126 12 awareness awareness NN 3355 126 13 , , , 3355 126 14 policy policy NN 3355 126 15 , , , 3355 126 16 and and CC 3355 126 17 training training NN 3355 126 18 . . . 3355 127 1 These these DT 3355 127 2 tools tool NNS 3355 127 3 feed feed VBP 3355 127 4 into into IN 3355 127 5 one one CD 3355 127 6 another another DT 3355 127 7 — — : 3355 127 8 we -PRON- PRP 3355 127 9 become become VBP 3355 127 10 aware aware JJ 3355 127 11 of of IN 3355 127 12 the the DT 3355 127 13 possibility possibility NN 3355 127 14 of of IN 3355 127 15 social social JJ 3355 127 16 - - HYPH 3355 127 17 engineering engineering NN 3355 127 18 attacks attack NNS 3355 127 19 , , , 3355 127 20 develop develop VB 3355 127 21 policy policy NN 3355 127 22 to to TO 3355 127 23 communicate communicate VB 3355 127 24 these these DT 3355 127 25 concerns concern NNS 3355 127 26 to to IN 3355 127 27 others other NNS 3355 127 28 , , , 3355 127 29 and and CC 3355 127 30 then then RB 3355 127 31 train train VB 3355 127 32 others other NNS 3355 127 33 in in IN 3355 127 34 these these DT 3355 127 35 policies policy NNS 3355 127 36 to to TO 3355 127 37 protect protect VB 3355 127 38 them -PRON- PRP 3355 127 39 and and CC 3355 127 40 their -PRON- PRP$ 3355 127 41 libraries library NNS 3355 127 42 from from IN 3355 127 43 social social JJ 3355 127 44 engineering engineering NN 3355 127 45 . . . 3355 128 1 Libraries library NNS 3355 128 2 should should MD 3355 128 3 have have VB 3355 128 4 a a DT 3355 128 5 simple simple JJ 3355 128 6 set set NN 3355 128 7 of of IN 3355 128 8 policies policy NNS 3355 128 9 to to TO 3355 128 10 help help VB 3355 128 11 prevent prevent VB 3355 128 12 social social NNP 3355 128 13 engi- engi- NNP 3355 128 14 neering neere VBG 3355 128 15 from from IN 3355 128 16 affecting affect VBG 3355 128 17 them -PRON- PRP 3355 128 18 . . . 3355 129 1 This this DT 3355 129 2 pol- pol- NN 3355 129 3 icy icy NN 3355 129 4 need nee MD 3355 129 5 not not RB 3355 129 6 be be VB 3355 129 7 long long JJ 3355 129 8 ; ; : 3355 129 9 ideally ideally RB 3355 129 10 , , , 3355 129 11 it -PRON- PRP 3355 129 12 should should MD 3355 129 13 be be VB 3355 129 14 a a DT 3355 129 15 small small JJ 3355 129 16 page page NN 3355 129 17 of of IN 3355 129 18 bullet bullet NN 3355 129 19 points point NNS 3355 129 20 that that WDT 3355 129 21 are be VBP 3355 129 22 easy easy JJ 3355 129 23 to to TO 3355 129 24 remember remember VB 3355 129 25 or or CC 3355 129 26 to to TO 3355 129 27 post post VB 3355 129 28 near near IN 3355 129 29 telephones telephone NNS 3355 129 30 . . . 3355 130 1 What what WP 3355 130 2 is be VBZ 3355 130 3 important important JJ 3355 130 4 is be VBZ 3355 130 5 that that IN 3355 130 6 it -PRON- PRP 3355 130 7 is be VBZ 3355 130 8 easy easy JJ 3355 130 9 to to TO 3355 130 10 remember remember VB 3355 130 11 and and CC 3355 130 12 implement implement VB 3355 130 13 when when WRB 3355 130 14 a a DT 3355 130 15 call call NN 3355 130 16 or or CC 3355 130 17 e e NN 3355 130 18 - - NN 3355 130 19 mail mail NN 3355 130 20 comes come VBZ 3355 130 21 in.4 in.4 '' 3355 130 22 Basic basic JJ 3355 130 23 guidelines guideline NNS 3355 130 24 for for IN 3355 130 25 protection protection NN 3355 130 26 against against IN 3355 130 27 social social JJ 3355 130 28 engineering engineering NN 3355 130 29 ■ ■ CD 3355 130 30 Be be VB 3355 130 31 suspicious suspicious JJ 3355 130 32 of of IN 3355 130 33 unsolicited unsolicited JJ 3355 130 34 communications communication NNS 3355 130 35 asking ask VBG 3355 130 36 about about IN 3355 130 37 employees employee NNS 3355 130 38 , , , 3355 130 39 technical technical JJ 3355 130 40 informa- informa- NNP 3355 130 41 tion tion NN 3355 130 42 , , , 3355 130 43 or or CC 3355 130 44 other other JJ 3355 130 45 internal internal JJ 3355 130 46 details detail NNS 3355 130 47 . . . 3355 131 1 ■ ■ NFP 3355 131 2 Do do VBP 3355 131 3 not not RB 3355 131 4 provide provide VB 3355 131 5 passwords password NNS 3355 131 6 or or CC 3355 131 7 login login NN 3355 131 8 names name NNS 3355 131 9 over over IN 3355 131 10 the the DT 3355 131 11 phone phone NN 3355 131 12 or or CC 3355 131 13 HELPING HELPING NNP 3355 131 14 THE the DT 3355 131 15 HACKER HACKER NNS 3355 131 16 ? ? . 3355 132 1 | | NNP 3355 132 2 THOMPSON thompson VBP 3355 132 3 225 225 CD 3355 132 4 via via IN 3355 132 5 e e NN 3355 132 6 - - NN 3355 132 7 mail mail NN 3355 132 8 no no DT 3355 132 9 matter matter RB 3355 132 10 who who WP 3355 132 11 claims claim VBZ 3355 132 12 to to TO 3355 132 13 be be VB 3355 132 14 asking ask VBG 3355 132 15 . . . 3355 133 1 ■ ■ NFP 3355 133 2 Do do VBP 3355 133 3 not not RB 3355 133 4 provide provide VB 3355 133 5 patron patron NN 3355 133 6 informa- informa- NNP 3355 133 7 tion tion NN 3355 133 8 to to IN 3355 133 9 anyone anyone NN 3355 133 10 but but CC 3355 133 11 the the DT 3355 133 12 patron patron NN 3355 133 13 in in IN 3355 133 14 person person NN 3355 133 15 and and CC 3355 133 16 only only RB 3355 133 17 upon upon IN 3355 133 18 presenta- presenta- JJ 3355 133 19 tion tion NN 3355 133 20 of of IN 3355 133 21 the the DT 3355 133 22 patron patron NN 3355 133 23 ’s ’s POS 3355 133 24 library library NN 3355 133 25 card card NN 3355 133 26 or or CC 3355 133 27 other other JJ 3355 133 28 proper proper JJ 3355 133 29 identification identification NN 3355 133 30 . . . 3355 134 1 ■ ■ NFP 3355 134 2 If if IN 3355 134 3 you -PRON- PRP 3355 134 4 are be VBP 3355 134 5 not not RB 3355 134 6 sure sure JJ 3355 134 7 if if IN 3355 134 8 a a DT 3355 134 9 request request NN 3355 134 10 is be VBZ 3355 134 11 legitimate legitimate JJ 3355 134 12 , , , 3355 134 13 contact contact VB 3355 134 14 the the DT 3355 134 15 appropri- appropri- JJ 3355 134 16 ate ate NN 3355 134 17 authorities authority NNS 3355 134 18 . . . 3355 135 1 ■ ■ NFP 3355 135 2 Trust trust VB 3355 135 3 your -PRON- PRP$ 3355 135 4 instincts instinct NNS 3355 135 5 . . . 3355 136 1 If if IN 3355 136 2 you -PRON- PRP 3355 136 3 feel feel VBP 3355 136 4 suspicious suspicious JJ 3355 136 5 about about IN 3355 136 6 a a DT 3355 136 7 question question NN 3355 136 8 or or CC 3355 136 9 communication communication NN 3355 136 10 , , , 3355 136 11 there there EX 3355 136 12 is be VBZ 3355 136 13 prob- prob- JJ 3355 136 14 ably ably RB 3355 136 15 a a DT 3355 136 16 good good JJ 3355 136 17 reason reason NN 3355 136 18 . . . 3355 137 1 ■ ■ NFP 3355 137 2 Document document NN 3355 137 3 and and CC 3355 137 4 report report VB 3355 137 5 suspicious suspicious JJ 3355 137 6 communications communication NNS 3355 137 7 . . . 3355 138 1 In in IN 3355 138 2 closing close VBG 3355 138 3 Social social JJ 3355 138 4 engineering engineering NN 3355 138 5 is be VBZ 3355 138 6 an an DT 3355 138 7 immensely immensely RB 3355 138 8 effective effective JJ 3355 138 9 method method NN 3355 138 10 of of IN 3355 138 11 breaching breach VBG 3355 138 12 com- com- NN 3355 138 13 puter puter NN 3355 138 14 and and CC 3355 138 15 network network NN 3355 138 16 security security NN 3355 138 17 . . . 3355 139 1 It -PRON- PRP 3355 139 2 is be VBZ 3355 139 3 , , , 3355 139 4 how- how- RB 3355 139 5 ever ever RB 3355 139 6 , , , 3355 139 7 entirely entirely RB 3355 139 8 dependent dependent JJ 3355 139 9 on on IN 3355 139 10 the the DT 3355 139 11 ability ability NN 3355 139 12 of of IN 3355 139 13 the the DT 3355 139 14 social social JJ 3355 139 15 engineer engineer NN 3355 139 16 to to TO 3355 139 17 persuade persuade VB 3355 139 18 staff staff NN 3355 139 19 members member NNS 3355 139 20 into into IN 3355 139 21 providing provide VBG 3355 139 22 information information NN 3355 139 23 or or CC 3355 139 24 access access NN 3355 139 25 that that IN 3355 139 26 they -PRON- PRP 3355 139 27 should should MD 3355 139 28 not not RB 3355 139 29 provide provide VB 3355 139 30 . . . 3355 140 1 With with IN 3355 140 2 care care NN 3355 140 3 and and CC 3355 140 4 good good JJ 3355 140 5 information information NN 3355 140 6 poli- poli- NNP 3355 140 7 cies cie NNS 3355 140 8 , , , 3355 140 9 we -PRON- PRP 3355 140 10 can can MD 3355 140 11 prevent prevent VB 3355 140 12 social social JJ 3355 140 13 engineer- engineer- NN 3355 140 14 ing ing NNP 3355 140 15 from from IN 3355 140 16 working work VBG 3355 140 17 . . . 3355 141 1 After after RB 3355 141 2 all all RB 3355 141 3 , , , 3355 141 4 do do VBP 3355 141 5 we -PRON- PRP 3355 141 6 really really RB 3355 141 7 want want VB 3355 141 8 to to TO 3355 141 9 be be VB 3355 141 10 helping help VBG 3355 141 11 the the DT 3355 141 12 hacker hacker NN 3355 141 13 ? ? . 3355 142 1 The the DT 3355 142 2 circulation circulation NN 3355 142 3 desk desk NN 3355 142 4 phone phone NN 3355 142 5 rings ring NNS 3355 142 6 . . . 3355 143 1 Joyce Joyce NNP 3355 143 2 answers answer VBZ 3355 143 3 , , , 3355 143 4 “ " `` 3355 143 5 Seashore Seashore NNP 3355 143 6 Branch Branch NNP 3355 143 7 Public Public NNP 3355 143 8 Library Library NNP 3355 143 9 , , , 3355 143 10 how how WRB 3355 143 11 may may MD 3355 143 12 we -PRON- PRP 3355 143 13 help help VB 3355 143 14 you -PRON- PRP 3355 143 15 ? ? . 3355 143 16 ” " '' 3355 143 17 “ " `` 3355 143 18 Hi hi UH 3355 143 19 there there RB 3355 143 20 , , , 3355 143 21 I -PRON- PRP 3355 143 22 ’m be VBP 3355 143 23 worried worried JJ 3355 143 24 that that IN 3355 143 25 I -PRON- PRP 3355 143 26 have have VBP 3355 143 27 n’t not RB 3355 143 28 turned turn VBN 3355 143 29 in in RP 3355 143 30 all all PDT 3355 143 31 the the DT 3355 143 32 books book NNS 3355 143 33 I -PRON- PRP 3355 143 34 have have VBP 3355 143 35 out out RP 3355 143 36 , , , 3355 143 37 and and CC 3355 143 38 I -PRON- PRP 3355 143 39 really really RB 3355 143 40 do do VBP 3355 143 41 n’t not RB 3355 143 42 want want VB 3355 143 43 to to TO 3355 143 44 get get VB 3355 143 45 stuck stick VBN 3355 143 46 with with IN 3355 143 47 a a DT 3355 143 48 fine fine NN 3355 143 49 . . . 3355 144 1 Could Could MD 3355 144 2 you -PRON- PRP 3355 144 3 tell tell VB 3355 144 4 me -PRON- PRP 3355 144 5 what what WP 3355 144 6 I -PRON- PRP 3355 144 7 have have VBP 3355 144 8 out out RP 3355 144 9 ? ? . 3355 144 10 ” " '' 3355 144 11 “ " `` 3355 144 12 No no DT 3355 144 13 problem problem NN 3355 144 14 . . . 3355 145 1 What what WP 3355 145 2 is be VBZ 3355 145 3 you -PRON- PRP 3355 145 4 name name NN 3355 145 5 ? ? . 3355 145 6 ” " '' 3355 145 7 “ " `` 3355 145 8 Sean Sean NNP 3355 145 9 Grey Grey NNP 3355 145 10 . . . 3355 145 11 ” " '' 3355 145 12 Joyce Joyce NNP 3355 145 13 brings bring VBZ 3355 145 14 up up RP 3355 145 15 Sean Sean NNP 3355 145 16 Grey Grey NNP 3355 145 17 ’s ’s POS 3355 145 18 circu- circu- NN 3355 145 19 lation lation NN 3355 145 20 records record NNS 3355 145 21 , , , 3355 145 22 and and CC 3355 145 23 then then RB 3355 145 24 remembers remember VBZ 3355 145 25 about about IN 3355 145 26 the the DT 3355 145 27 library library NN 3355 145 28 ’s ’s POS 3355 145 29 information information NN 3355 145 30 policy policy NN 3355 145 31 and and CC 3355 145 32 decides decide VBZ 3355 145 33 to to TO 3355 145 34 ask ask VB 3355 145 35 another another DT 3355 145 36 question question NN 3355 145 37 , , , 3355 145 38 “ " `` 3355 145 39 Could Could MD 3355 145 40 you -PRON- PRP 3355 145 41 give give VB 3355 145 42 me -PRON- PRP 3355 145 43 your -PRON- PRP$ 3355 145 44 library library NN 3355 145 45 card card NN 3355 145 46 number number NN 3355 145 47 ? ? . 3355 145 48 ” " '' 3355 145 49 “ " `` 3355 145 50 I -PRON- PRP 3355 145 51 do do VBP 3355 145 52 n’t not RB 3355 145 53 have have VB 3355 145 54 that that DT 3355 145 55 with with IN 3355 145 56 me -PRON- PRP 3355 145 57 . . . 3355 146 1 I -PRON- PRP 3355 146 2 really really RB 3355 146 3 do do VBP 3355 146 4 n’t not RB 3355 146 5 want want VB 3355 146 6 to to TO 3355 146 7 get get VB 3355 146 8 stuck stick VBN 3355 146 9 with with IN 3355 146 10 those those DT 3355 146 11 fines fine NNS 3355 146 12 . . . 3355 146 13 ” " '' 3355 146 14 “ " `` 3355 146 15 I -PRON- PRP 3355 146 16 ’m be VBP 3355 146 17 sorry sorry JJ 3355 146 18 . . . 3355 147 1 Mr. Mr. NNP 3355 147 2 Grey Grey NNP 3355 147 3 , , , 3355 147 4 to to TO 3355 147 5 preserve preserve VB 3355 147 6 patron patron NN 3355 147 7 privacy privacy NN 3355 147 8 we -PRON- PRP 3355 147 9 can can MD 3355 147 10 only only RB 3355 147 11 give give VB 3355 147 12 out out RP 3355 147 13 circulation circulation NN 3355 147 14 information information NN 3355 147 15 if if IN 3355 147 16 you -PRON- PRP 3355 147 17 give give VBP 3355 147 18 us -PRON- PRP 3355 147 19 your -PRON- PRP$ 3355 147 20 card card NN 3355 147 21 number number NN 3355 147 22 or or CC 3355 147 23 if if IN 3355 147 24 you -PRON- PRP 3355 147 25 are be VBP 3355 147 26 here here RB 3355 147 27 in in IN 3355 147 28 person person NN 3355 147 29 with with IN 3355 147 30 your -PRON- PRP$ 3355 147 31 card card NN 3355 147 32 or or CC 3355 147 33 ID ID NNP 3355 147 34 . . . 3355 147 35 ” " '' 3355 147 36 “ " `` 3355 147 37 But but CC 3355 147 38 I -PRON- PRP 3355 147 39 just just RB 3355 147 40 want want VBP 3355 147 41 to to TO 3355 147 42 avoid avoid VB 3355 147 43 a a DT 3355 147 44 fine fine NN 3355 147 45 . . . 3355 148 1 Ca can MD 3355 148 2 n’t not RB 3355 148 3 you -PRON- PRP 3355 148 4 help help VB 3355 148 5 ? ? . 3355 148 6 ” " '' 3355 148 7 “ " `` 3355 148 8 Do do VB 3355 148 9 n’t not RB 3355 148 10 worry worry VB 3355 148 11 ; ; : 3355 148 12 if if IN 3355 148 13 you -PRON- PRP 3355 148 14 are be VBP 3355 148 15 late late JJ 3355 148 16 by by IN 3355 148 17 accident accident NN 3355 148 18 on on IN 3355 148 19 occasion occasion NN 3355 148 20 , , , 3355 148 21 we -PRON- PRP 3355 148 22 are be VBP 3355 148 23 willing willing JJ 3355 148 24 to to TO 3355 148 25 forgive forgive VB 3355 148 26 a a DT 3355 148 27 fine fine NN 3355 148 28 . . . 3355 148 29 ” " '' 3355 148 30 “ " `` 3355 148 31 So so RB 3355 148 32 you -PRON- PRP 3355 148 33 ca can MD 3355 148 34 n’t not RB 3355 148 35 give give VB 3355 148 36 me -PRON- PRP 3355 148 37 my -PRON- PRP$ 3355 148 38 records record NNS 3355 148 39 ? ? . 3355 148 40 ” " '' 3355 148 41 “ " `` 3355 148 42 I -PRON- PRP 3355 148 43 ’m be VBP 3355 148 44 sorry sorry JJ 3355 148 45 but but CC 3355 148 46 we -PRON- PRP 3355 148 47 have have VBP 3355 148 48 to to TO 3355 148 49 protect protect VB 3355 148 50 patron patron NN 3355 148 51 privacy privacy NN 3355 148 52 . . . 3355 149 1 I -PRON- PRP 3355 149 2 ’m be VBP 3355 149 3 sure sure JJ 3355 149 4 you -PRON- PRP 3355 149 5 under- under- VBG 3355 149 6 stand stand NN 3355 149 7 . . . 3355 149 8 ” " '' 3355 149 9 “ " `` 3355 149 10 I -PRON- PRP 3355 149 11 guess guess VBP 3355 149 12 so so RB 3355 149 13 . . . 3355 150 1 Goodbye goodbye UH 3355 150 2 . . . 3355 150 3 ” " '' 3355 150 4 “ " `` 3355 150 5 Have have VB 3355 150 6 a a DT 3355 150 7 good good JJ 3355 150 8 day day NN 3355 150 9 . . . 3355 150 10 ” " '' 3355 150 11 < < XX 3355 150 12 click click VB 3355 150 13 > > XX 3355 150 14 ■ ■ NFP 3355 150 15 References reference NNS 3355 150 16 1 1 CD 3355 150 17 . . . 3355 151 1 Institute Institute NNP 3355 151 2 of of IN 3355 151 3 Management Management NNP 3355 151 4 & & CC 3355 151 5 Admin- Admin- NNP 3355 151 6 istration istration NN 3355 151 7 , , , 3355 151 8 “ " `` 3355 151 9 Six six CD 3355 151 10 Security Security NNP 3355 151 11 Threats Threats NNP 3355 151 12 That that WDT 3355 151 13 Will Will MD 3355 151 14 Make make VB 3355 151 15 Headlines headline NNS 3355 151 16 in in IN 3355 151 17 ’ ' '' 3355 151 18 05 05 CD 3355 151 19 , , , 3355 151 20 ” " '' 3355 151 21 IOMA IOMA NNP 3355 151 22 ’s ’s POS 3355 151 23 Security Security NNP 3355 151 24 Director Director NNP 3355 151 25 ’s ’s POS 3355 151 26 Report Report NNP 3355 151 27 5 5 CD 3355 151 28 , , , 3355 151 29 no no UH 3355 151 30 . . . 3355 152 1 1 1 CD 3355 152 2 ( ( -LRB- 3355 152 3 2004 2004 CD 3355 152 4 ) ) -RRB- 3355 152 5 : : : 3355 152 6 1–14 1–14 CD 3355 152 7 . . . 3355 153 1 2 2 LS 3355 153 2 . . . 3355 154 1 K. K. NNP 3355 154 2 Manske Manske NNP 3355 154 3 , , , 3355 154 4 “ " `` 3355 154 5 An an DT 3355 154 6 Introduction introduction NN 3355 154 7 to to IN 3355 154 8 Social Social NNP 3355 154 9 Engineering Engineering NNP 3355 154 10 , , , 3355 154 11 ” " '' 3355 154 12 Security Security NNP 3355 154 13 Management Management NNP 3355 154 14 Practices Practices NNPS 3355 154 15 ( ( -LRB- 3355 154 16 Nov./Dec Nov./Dec NNP 3355 154 17 . . . 3355 155 1 2000 2000 CD 3355 155 2 ) ) -RRB- 3355 155 3 : : : 3355 155 4 53–59 53–59 LS 3355 155 5 . . . 3355 156 1 3 3 LS 3355 156 2 . . . 3355 157 1 M. M. NNP 3355 157 2 McDowell McDowell NNP 3355 157 3 , , , 3355 157 4 “ " `` 3355 157 5 Cyber Cyber NNP 3355 157 6 - - HYPH 3355 157 7 Security Security NNP 3355 157 8 Tip Tip NNP 3355 157 9 ST04 ST04 NNP 3355 157 10 - - HYPH 3355 157 11 014 014 CD 3355 157 12 , , , 3355 157 13 ” " '' 3355 157 14 ( ( -LRB- 3355 157 15 2005 2005 CD 3355 157 16 ) ) -RRB- 3355 157 17 , , , 3355 157 18 http://www.us.cert http://www.us.cert NNP 3355 157 19 . . . 3355 158 1 gov gov NNP 3355 158 2 / / SYM 3355 158 3 cas cas NNP 3355 158 4 / / SYM 3355 158 5 tips tip NNS 3355 158 6 / / SYM 3355 158 7 ST04 ST04 NNP 3355 158 8 - - HYPH 3355 158 9 014.html 014.html NNP 3355 158 10 ( ( -LRB- 3355 158 11 accessed access VBN 3355 158 12 June June NNP 3355 158 13 5 5 CD 3355 158 14 , , , 3355 158 15 2005 2005 CD 3355 158 16 ) ) -RRB- 3355 158 17 . . . 3355 159 1 4 4 LS 3355 159 2 . . . 3355 160 1 K. K. NNP 3355 160 2 Mitnick Mitnick NNP 3355 160 3 and and CC 3355 160 4 W. W. NNP 3355 160 5 Simon Simon NNP 3355 160 6 , , , 3355 160 7 The the DT 3355 160 8 Art art NN 3355 160 9 of of IN 3355 160 10 Deception deception NN 3355 160 11 ( ( -LRB- 3355 160 12 Indianapolis Indianapolis NNP 3355 160 13 : : : 3355 160 14 Wiley Wiley NNP 3355 160 15 , , , 3355 160 16 2002 2002 CD 3355 160 17 ) ) -RRB- 3355 160 18 . . . 3355 161 1 ALCTS ALCTS NNP 3355 161 2 cover cover VBP 3355 161 3 2 2 CD 3355 161 4 LAMA LAMA NNP 3355 161 5 cover cover NN 3355 161 6 3 3 CD 3355 161 7 LITA LITA NNP 3355 161 8 180 180 CD 3355 161 9 , , , 3355 161 10 216 216 CD 3355 161 11 , , , 3355 161 12 cover cover NN 3355 161 13 4 4 CD 3355 161 14 Index Index NNP 3355 161 15 to to IN 3355 161 16 Advertisers advertiser NNS