Telephonic Deceptions: Part II
by Rick Brenner
Deception at work probably wasn't invented at work. Most likely it is a continuation of deception in the rest of life. But the technologies of the modern workplace offer new opportunities to practice the art. Here's Part II of a handy guide for telephonic self-defense.
Nature has many versions of Caller ID spoofing, one of which is most familiar to dog owners. Pictured is Duma, a wolf at the UK Wolf Conservation Trust, as she rolls to capture a scent atop a mound. She's rolling on some aftershave sprinkled on the ground a few minutes earlier. Scent-rolling is believed to be a method for disguising the individual's own scent, as a means of avoiding detection by prey. It provides olfactory camouflage. Photo by Retron at en.Wikipedia.
Last time we looked at deceptions involved in faking calls, circumventing personal cell phone bans, and borrowing phones. Here is Part II of our catalog of telephonic deceptions.
- Faux hang-ups
- In these days of frequently broken cellular connections, we've all become accustomed to interrupted conversations. Usually, broken connections are due to malfunctions. But some people have taken advantage of the situation by actually terminating calls they no longer wish to continue. To avoid paying a social price if they do it angrily, they break the connection while they themselves are speaking calmly, as if engaged in the conversation. Their conversation partners then assume that the broken connection is a mishap, but the conversation breakers don't renew the connection, and they don't pick up if their partners try to renew.
- Common mistakes: breaking the connection while the other person is speaking, or breaking it while audibly angry.
- Background sounds made to order
- Background sounds might not be what they seem. You can buy recordings of background sounds from airports, train stations, busy streets, traffic jams, sports events, arguing kids, and more. There are even apps for recording your own custom background sounds, to ensure, for example, that flight number announcements match what they are supposed to be, or that the arguing kids are actually your kids.
- Common mistakes: re-using a recorded background sound once too often with the same person, or using a busy airport background when the airport in question is actually closed by weather or mishap.
- Caller ID spoofing
- Caller ID spoofing In telephone conversations,
background sounds might not
be what they seemwas the key technique used by the hackers working for News of the World. Using a paid service, the call initiator provides two phone numbers — the number to call, and the spoofed caller ID. The service then places the call to the first number in such a manner that it appears to have been originated from the second. This deception can make a call appear to come from a phone different from the originator's phone. Thus, for example, the originator can appear to be calling from work when actually calling from his or her mobile phone. If the originator's work phone is forwarded to his or her mobile phone, not even an immediate callback will unwrap the deception.
- Common mistake: failing to control the background sounds of the originator's location well enough to match the location of the spoofed phone.
Caller ID spoofing can present real security concerns. For example, in the News of the World scandal, Caller ID spoofing gave abusers access to voice mailboxes that were not protected by password access. Most voicemail systems do provide this option, but most users never turn it on. Is your voice mailbox protected by a password? First in this series Top Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrensGvRGfoPGrjhZJYAner@ChacEaXoZLgTPbNhfyDeoCanyon.comSend me your comments by email
, or by Web form
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful,
and that you'll consider recommending it to a friend.
Point Lookout is a free weekly email newsletter. Browse the archive
of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout,
as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in,
anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- Workplace Politics Is Not a Game
- We often think about "playing the game" — either with relish or repugnance. Whatever your level of skill or interest, you'll do better if you see workplace politics as it is. It is not a game.
- Using Indirectness at Work
- Although many of us value directness, indirectness does have its place. At times, conveying information indirectly can be a safe way — sometimes the only safe way — to preserve or restore well-being and comity within the organization.
- How to Create Distrust
- A trusting environment is critical to high performance. That's why it's important to recognize behaviors that erode trust in others. Here's a little catalog of methods people use — intentionally or not — to create distrust.
- Kinds of Organizational Authority: the Formal
- A clear understanding of Power, Authority, and Influence depends on familiarity with the kinds of authority found in organizations. Here's Part I of a little catalog of authority classes.
- On Snitching at Work: Part II
- Reporting violations of laws, policies, regulations, or ethics to authorities at work can expose you to the risk of retribution. That's why the reporting decision must consider the need for safety.
See also Workplace Politics and Ethics at Work for more related articles.
Forthcoming issues of Point Lookout
- Coming May 4: Just-In-Time Hoop-Jumping
- Securing approvals for projects, proposals, or other efforts is often called "jumping through hoops." Hoop-jumping can be time-consuming and frustrating. Here are some suggestions for jumping through hoops efficiently. Available here and by RSS on May 4.
- And on May 11: Characterization Risk
- To characterize is to offer a description of a person, event, or concept. Characterizations are usually judgmental, and usually serve one side of a debate. And they often make trouble. Available here and by RSS on May 11.
I offer email and telephone coaching at both corporate and individual rates.
Contact Rick for details at rbrenRrAfLFzEzrCOZtsCner@ChacZOyLZyeKQDbcMnxnoCanyon.com
or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
Reprinting this article
Are you a writer, editor or publisher on deadline?
Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- Managing in Fluid Environments
- Most people now work in environments that can best be characterized as fluid, because they're subject to continual change. We never know whats coming next. In such environments, managing — teams, projects, groups, departments, or the enterprise — often entails moving from surprise to surprise while somehow staying almost on track. It's a nerve-wracking existence. This program provides numerous tools that help managers who work in fluid environments. Read more about this program. Here's an upcoming date for this program:
- Sudoku Solutions, INK: A Simulation of a Project-Oriented Organization
- In this workshop, we simulate a company that solves Sudoku puzzles for its customers. Each puzzle is a project, solved by a project team led by a project manager. Team members hail from different parts of the organization, such as QA or the Department of Threes. Puzzles have different values, and the company must strive to meet revenue goals. The metaphor is uncanny. Lessons abound. Read more about this program. Here's an upcoming date for this program: