DiscoverEasy Prey
Easy Prey
Claim Ownership

Easy Prey

Author: Chris Parker

Subscribed: 40Played: 943
Share

Description

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss.

Our goal is to educate and equip you, so you learn how to spot the warnings signs of trouble, take quick action, and lower the risk of becoming a victim.
94 Episodes
Reverse
Transparency in a family builds trust, but sharing information while gaming online can set you up for unnecessary risks. Your children may be sharing details that can impact not just them, but you. Today’s guest is Eric Jones. Eric is an experienced product manager and developer with over 20 years experience and more than 9 years in Agile Software Development. He is the founder and creator of All Knowing Parent focused on educating people on all avenues of technology and hardware. Show Notes: [0:50] - Eric shares what he does as a career and about his startup. [2:27] - As a father of two young girls, Eric is adamant about monitoring technology use. [3:50] - Eric is a big believer in transparency. [5:40] - Gaming is not just a casual hobby anymore. [7:01] - On all gaming consoles there is some sort of communication with other players online available both as text and voice. [9:10] - On some platforms, you have to be “friends” with someone to play together. Some games do a better job than others on safety. [10:15] - Eric talks daily to his children about safety in gaming. These conversations started before they were even playing it. [12:03] - Setting rules ahead of time is important to avoid cleaning up a mess. [13:23] - Kids tend to give out so much information easily. [14:48] - What are the pieces of information that you should make sure are kept private? Eric says everything. [17:01] - Even giving out gamer handles from other consoles shouldn’t be shared. [18:28] - Consoles protect your IP address better but gaming on servers do not. [20:25] - Almost everything these days is connected to the internet. Unfortunately, a lot of pressure is put on the user. [22:18] - When you’re playing online, you don’t see the type of people you play with through a username. Eric explains what swatting is. [23:20] - People can also raid a streamer’s channel with obscenities and can piece together information through social engineering. [25:03] - Don’t assume someone doesn’t want your information. They may hack you simply as a launching off point to something else. [26:41] - Referring to a previous episode, everything connected to the internet can slowly give away pieces of information. [28:16] - Social engineering is not as hard as you might think in online gaming just by watching how you play. [30:57] - Children trust first and as adults, we’ve learned to trust second.  [31:54] - A gaming company’s priority is not user safety. [33:16] - If playing with people you don’t know, be extremely kind and avoid topics like politics and religion. [35:21] - DDoS attacks are less common these days but can still happen. [39:11] - Unfortunately, if a kid really wants something, they will be motivated to get around things you have in place to keep them safe. [39:45] - Eric describes how and why he founded All Knowing Parent. [41:14] - Eric’s goal is to educate and be a support for people to better understand the technology in their life. [43:12] - There are no cookie-cutter answers. Eric helps people with each question as they arise and gives an example of a recent customer question. [44:10] - All Knowing Parent is offering discounts for Easy Prey listeners! Check that out at AllKnowingParent.com/EasyPrey Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest All Knowing Parent Website All Knowing Parent - Easy Prey Special Discounts All Knowing Parent on Facebook All Knowing Parent on Twitter All Knowing Parent on Instagram
We all have limited resources when it comes to time, money, and energy so in a world where people can create fake personas online, how can you be a part of a community that weeds out imposters?  Today’s guest is Ken Rutkowski. Ken is a business talk radio personality, innovative strategist, international speaker, and the founder of Metal International. Ken has done government consultation for thirteen different countries and collaborations with Google, Yahoo, Microsoft, Surf Air, Motorola, AT&T, and numerous others. He’s been featured on Good Morning America, Oprah, The New York Times, The Wall Street Journal, Bloomberg, The Chicago Tribune, Miami-Herald, Forbes and many other networks and publications around the world. Show Notes: [1:00] - Welcome to the show, Ken! Ken shares his background and why he was led to his career in radio. [2:01] - Ken is one of the early developers of podcasts. [3:17] - When he moved to Los Angeles, he realized that many people he met were imposters. [4:48] - Ken shares that his image has been used to catfish women online. [5:59] - Most people are on Facebook and some sort of photo platform like Instagram. Ken explains why he has a LinkedIn. [6:43] - It’s advised to search an image to find the history of it and Ken shares a useful AI tool. [8:01] - Chris predominantly uses video to chat with people and explains why. [10:03] - Go beyond the conversation of business. [11:31] - Ken demonstrates the pyramid of friendship and how you can determine a stable relationship. [13:05] - When talking to others online, Ken looks for specific types of people. [15:08] - How can you tell the difference between a $30,000 millionaire from a legitimate millionaire? [16:10] - Remove time-sensitivity. [18:12] - The pyramid of friends and relationships is important to keep in mind when determining the legitimacy of someone’s online persona. [20:23] - There are specific types of relationships that determine your circle of trust. [21:14] - Because many people spend so much time on Facebook, people are spending time in the “friend and acquaintance zones.” [23:28] - To keep up with your circle of trust in a digital world, Ken recommends WhatsApp groups. [25:01] - In virtual events, Ken has two banned topics: religion and politics. [26:43] - Genuine community protects you. [29:11] - Everyone should create their own social circle and then fire those who are complicating things. [30:41] - Ken describes a trust token program he is working on. [32:14] - Ken and Chris have a mutual friend and he demonstrates how he used social engineering to vet the legitimacy of Chris’s relationship with him. [34:01] - Ken’s online community began as an in-person community. He curates who his members are. [36:49] - What are the rules of Ken’s community? [38:40] - It is not just your money that is vulnerable to scammers, but your time and energy. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Metal International Web Page Ken Rutkowski on Twitter Ken Rutkowski on Instagram Ken Rutkowski on LinkedIn Ken Rutkowski on Facebook Ken Rutkowski Home Page
Some organizations may use misleading language or pressure you as they solicit for a donation and this can cause distrust. Research is needed to make sure your money is going to the charity of choice and not a predator preying on your emotions. Today’s guest is Laurie Styron. Laurie was appointed the Executive Director of CharityWatch, American Institute of Philanthropy in 2020. She served as CharityWatch’s Senior Analyst for 16 years and thereafter as a Program Consultant through her nonprofit accounting and consulting practice. Laurie has been quoted in The New York Times, Los Angeles Times, The Wall Street Journal, NBC Nightly News, and by many other media outlets. She has also vetted charities for Good Morning America and has worked with 60 Minutes and many other news organizations on charity related investigations. Show Notes: [1:53] - Laurie shares how she started with CharityWatch and why she was drawn to working in a nonprofit. [3:31] - The founder of CharityWatch realized people were not making fact based decisions around donating to charities. [5:04] - There has been some effort to regulate and enforce how donations are used. [6:14] - Niche and very specific causes are harder to raise money for. [8:14] - The funding for regulators is insufficient for them to adequately oversee. [9:40] - Laurie explains how to vet a charity on CharityWatch and gives an example of how organizations are ranked on the site. [11:50] - Sometimes organizations will use donations as their funds to continue marketing for more donations which causes an ineffective cycle. [14:06] - A lot of donors get really focused on the salaries of charity executives. [15:05] - It is actually a red flag if board officers are not paid enough. [18:17] - There are not enough people in the United States with a masters degree that could work for a low salary. [20:46] - Going into the season of giving, avoid high pressure tactics. [22:12] - A lot of fundraisers have expert scripts that are designed to pressure you. Laurie gives tips on how to say no. [25:01] - Laurie gives advice on how to use your emotions to choose a charity for a cause you are passionate about. [26:33] - Laurie tells the story of a crowdfunding scam that was well intentioned but the money raised was not done by someone who could execute the result. [28:41] - She shares another story of fake campaigns on GoFundMe as copycats. [30:22] - You have the ability to check filings, tax information, and registrations for organizations. Crowdfunding sites do not vet their account holders. [32:36] - Cut out the middleman. Donate directly. [34:02] - It is advised to only donate on crowdfunding sites to those you know. [35:04] - It is not logical for a charity to use 100% of all donations on the cause. [37:24] - Laurie describes how charities are rated on a grade scale on CharityWatch’s website. [38:35] - There are other sites that rate and rank charities but not all are reliable. [40:57] - When you are doing your research, ask yourself what the site’s process is. [43:00] - Sometimes, third party platforms will hold on to the money for longer than necessary and Laurie says to donate directly. [45:47] - If you send small donations across multiple charities, your donations will be much smaller due to fees. [49:42] - Make that little bit of research you do before you donate part of your giving. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest CharityWatch.org
With the sense of anonymity, people often post false claims, lies, and private information that can impact a person’s livelihood. Illegal content such as copyright infringement, invasion of privacy, and defamation are on the rise on the internet. But there is something to be done about it.  Today’s guest is Kenton Hutcherson. Kenton is an attorney and owner of Hutcherson Law. He and his team focus on a very specific niche of law: helping people, professionals, and businesses who have been attacked on the internet.  Show Notes: [1:11] - Kenton explains the three types of cases he works with - internet defamation, copyright infringement, and invasion of privacy. [2:20] - Kenton shares his background and journey as an educator and lawyer. [4:15] - The pandemic in particular caused a lot of interesting problems that Kenton has worked to solve. [5:36] - Defamation encompasses libel and slander. Kenton explains the difference. [7:00] - Written posts on the internet can harm people many years later. [8:27] - When does it make sense to see a lawyer for internet defamation? [9:50] - Is the damage being caused worth the cost of a lawyer? Kenton describes the clients that usually merit hiring a lawyer. [11:57] - Sometimes a bad situation is to cut your losses and move on. [13:20] - You want a better life, not a better lawsuit. Be a kind and respectful person. [14:46] - Extortion by defamation is unfortunately common by consumers. [15:43] - Not all reviews are true and accurate. [16:56] - The Communications Decency Act has created safety for review sites themselves because it is user generated content. [18:53] - Google has stepped in and will remove some sites and reviews from searches when review sites refuse to take down a false review. [20:50] - Kenton has worked with Yelp previously. He shares Yelp’s policy for defamation. [23:01] - Sometimes people will use throw away accounts that they can’t access again in order to change their review or post. [24:01] - You can also hire a reputation manager who can help bury negative false claims. [25:01] - Kenton shares an example of a case and client he has had. [29:03] - The case Kenton shares demonstrates how people can truly destroy a business. [31:12] - In this case, the convict broke out of prison. He did not stop pursuing Kenton’s client. [32:55] - Kenton’s team contacts Google, Yahoo, Bing, and other search engines to take down posts and reviews for their clients. [34:09] - Simply express your opinion. Do not post false assertions of facts. [35:50] - For both sides, a lawsuit can damage their lives. [36:32] - If you are sued, you cannot discharge this with bankruptcy. [39:05] - Defamation is approached a bit differently if it is a competitor. [40:08] - Kenton describes how an internet lawyer unmasks defamation. [41:56] - You need to have enough materials and content to analyze. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Hutcherson Law Website
Safety in public spaces can be complex. There are things that you can do to be prepared and alert in all situations. Techniques can be used to distract someone long enough to escape, no matter the size of the attacker.  Today’s guest is Lieutenant Jessa Russell. Lieutenant Russell serves as the Community Relations Officer for Highland Park Department of Public Safety. In this role, she assists with crime prevention, safety education presentations, crime watch, community welfare concerns, and is the liaison to the Highland Park ISD. Lieutenant Russell began her career with Highland Park DPS in August 2008 and has served as a field training officer, defense tactics instructor, and operations supervisor.  Show Notes: [1:01] - Welcome to the podcast, Lieutenant Russell! Jessa explains how she got into law enforcement. [3:40] - Every department has different norms. Jessa describes the more common problems her department responds to. [5:10] - What is jugging? Jessa describes this crime and what to do to avoid it. [7:06] - There are more fire stations than police stations and if you are being followed, pulling into a fire station could cause them to stop. [9:01] - Always be skeptical. The world is a good place but there are bad people in it. [11:12] - Restaurants and bars are places to have a heightened situational awareness. [13:14] - If you are on a walk or run, only use one earbud. [14:51] - You have to be assertive. Political correctness will hamper you when safety is a concern. [16:30] - Park close to lights and the closer to the store the better. You can also request security officers or employees to escort you to the car. [17:49] - There are different mindsets regarding an attack. [19:12] - RAD is a program that Jessa educates through. It stands for Rape Aggression Defense. She explains the program and the training involved. [20:58] - Some women are taught to be so submissive that they don’t realize they have power, which can simply be your voice. [21:54] - Training does not mean you are a fighter. The techniques are designed to escape. [24:20] - Most attackers are known to the victims, but random attacks can happen as well. [25:28] - Assertively yelling “stay away” instead of screaming for help will catch someone’s attention more. [26:33] - Chris shares a story to demonstrate how bystanders may not know if the situation is serious. [28:47] - Jessa gives tips on how to help someone in danger. [29:50] - Noticing clothes is great, but noticing shoes is even better. [31:00] - Jessa explains what is important to note in describing an attacker. [34:18] - Remembering the first few characters of a license plate is often enough to help. Remembering all is very challenging. [36:50] - You need to know what to do if you are ever pulled over. [39:43] - If someone is trying to rape you and you are not fighting back, you are not at fault at all.  [41:24] - Every department has a victim liaison. [43:18] - Don’t be afraid to report something and work with the police. [44:40] - Always lock doors and keep valuables in the house. [47:41] - Jessa discusses carrying a gun and the importance of knowing how to properly use it if you want to have it. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest RAD Systems Website
For most people, figuring out how our credit score is calculated is a black box. Learning what impacts your credit score gives you flexibility to change it. Here are twenty ways you are ruining your credit.  Today’s guest is Steve Snyder. Steve is an author, speaker, and one of the top personal finance commentators in the country trained by the Fair Isaac Corporation, the firm that created the score that credit reporting agencies use to calculate a consumer’s credit worthiness. FICO Score is widely recognized as the industry standard for lenders. Steve has been quoted in the US News World Report, The Wall Street Journal, Newsweek, The Washington Post, and many others.  Show Notes: [1:03] - Welcome to the podcast, Steve! Steve describes what he does in his career and what got him interested. [2:43] - Steve recovered from bankruptcy in less than eight months and realized that most people have no idea how to manage their credit. [3:34] - The biggest mistake is not knowing that you have three credit scores. [4:50] - The three scoring companies from Equifax, Experian, and TransUnion. [5:41] - Not all lenders report to your credit reports which is why scores can be different. [8:05] - There’s a system in place to correct things that are wrong with the large scoring companies. [9:01] - Most people purchase the wrong scores. Most of the scores you are bombarded with online are fake. [10:43] - Steve explains why the vantage score was created and why your FICO score is more important. [12:01] - Debts going to collections, late payments, judgments, liens, bankruptcies, high utilization, negatively impact your credit. [13:51] - Steve explains how shopping for cars and mortgages shows up as multiple inquiries on your credit. [15:50] - Most people don’t realize that they have a utilization sweet spot. [17:05] - No utilization can be bad for your credit score as well. You can have too much or too little. [19:01] - Having a credit card is the first step. Using it is the second. [21:45] - Your credit history goes back longer than just recent months and years. [23:35] - You never want to randomly close credit accounts even if it is an unused card that you’ve had for a long time. [24:40] - Never fight about your credit on your credit reports. If you have an issue, take it to small claims court. [27:41] - Most people do not understand how credit works because we are not prepared early in life. [29:21] - Steve is not going to ever risk his perfect credit scores by co-signing anything even with his own children. [32:00] - Co-signing student loans can be detrimental. [34:11] - It is wise to freeze your children’s credit until they are ready to use it. [35:26] - Steve explains the meaning of “thickening a thin credit file.” [37:46] - People think that because they make a lot of money that money will take care of everything else. [39:25] - Allowing collections to show on your credit is a huge mistake but is easily rectified. [40:51] - Steve explains the difference between a charge off and a settlement. [42:00] - Too many credit inquiries lowers your score but will also “spook lenders.” [43:16] - You could be paying off the wrong things. Your credit score is heavily weighted on your personal credit balance. [45:01] - Business and personal finances should be separate. [46:55] - No interest business credit cards are a great way to get started, but you have to be disciplined with a real business idea. [49:25] - The best time to apply for credit is when you don’t need it. Don’t wait for the emergency. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest After Bankruptcy Website Credit After Bankruptcy by Steve Snyder
There are methods used to influence us to either buy or do something. We may even be persuaded to participate and only later on wonder how they got us to join. It is beneficial to know these seven principles that compel us to react.  Today’s guest is Dr. Robert Cialdini. Dr. Cialdini is an author and keynote speaker as a leading expert on influence and persuasion. His books are published in 44 different languages and have sold over 7 million copies. He’s a New York Times, Wall Street Journal, and USA Today best-selling author. He’s also been elected to membership in the National Academy of Sciences.  Show Notes: [1:10] - Dr. Cialdini got into this field because he was easily persuaded in the past. [3:05] - Incognito, Dr. Cialdini answered as many ads and training programs he could get into to see how advertisers convinced people to buy. [4:40] - In his research, he found that there are seven principles to persuasion. [5:44] - The first principle is the principle of reciprocation. This is present in every culture. [6:57] - First someone gives you something and then you feel obligated to give back. [9:03] - Chris shares an experience at a restaurant to receive something for free that actually required him to do something first. [11:37] - Is something genuinely giving you something or trapping you into compliance? [12:19] - The second principle is the principle of “liking.” You will be influenced more by those who you like. [13:48] - One way to get people to like us is to give them something which ties right into the principle of reciprocity. [16:12] - Step back from the situation and separate the salesperson from what he or she is offering. [17:18] - The next principle is the principle of social proof. If a lot of people are choosing or favoring something, it seems like something you should do, too. [18:28] - We recognize when there are fake reviews. 5 star reviews generally make us skeptical. [21:04] - Dr. Cialdini describes a study done in McDonald’s that boosted sales of one menu item by 40%. [24:48] - The next principle is similar to social proof and decreases someone’s uncertainty. It is the principle of authority. [25:58] - The problem with assuming someone is an expert is the appearance of actors and influencers being paid to promote. [27:34] - Ask yourself, “Is this person an authority on the topic at hand?” [28:32] - Also ask if the person is being unbiased in their testimonial. [30:19] - The next principle is the principle of consistency.  [32:01] - Dr. Cialdini shares why he no longer signs petitions. The pressure to be consistent can motivate us to do things we don’t want to do. [35:28] - Sometimes sales sites will list an item or booking that there are only two left at this price and list a number of people also looking at the listing. [37:38] - We don’t know all the time if something is legit. [39:55] - Dr. Cialdini added a seventh principle to his book called the principle of community. [41:17] - Dr. Cialdini demonstrates how this works with a personal example. [43:11] - Be wary of promotions within your “tribe.” [44:12] - Some companies will ask for collaboration to create unity and produce customer loyalty. [47:09] - Dr. Cialdini shares a story about letting people into one’s house. [50:55] - Check out Dr. Cialdini’s website for a Harvard article to help prevent digital attacks on your organization or business. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Influence at Work Website Influence, New and Expanded: The Psychology of Persuasion by Dr. Robert Cialdini
Criminals feel safe to hide behind the internet. They hire people and train them to be effective salespeople with the goal of taking your money. Let’s look at a few ways to do our due diligence to be sure that who you are working with online are who they say they are.  Today’s guest is Ken Gamble. Ken is a professional investigator, corporate security specialist, and cybercrime expert with 33 years of experience working for individuals and multinational corporations. He is the co-founder and executive chairman of IFW Global that conducts fraud investigations, asset tracking, fraud recovery, disruption and  prevention of global cybercrime, monitoring enforcement actions to protect and recover assets for worldwide clients. He is the current Australian chairman of the International Association of Cybercrime Prevention, a non-profit association founded in Paris in 2006. Ken is an accomplished surveillance specialist and former surveillance advisor contractor to a commonwealth government agency in Australia and a consultant to numerous law enforcement agencies in the US, Asia, and Europe as well as several foreign governments. Show Notes: [1:23] - Ken shares his background and international experience. [2:41] - In his career, Ken has worked in all sectors of investigation. [3:50] - What inspired Ken to get into this field? The internet. [6:00] - International crimes are very complicated to pursue which has made crime on the internet so impactful. [8:01] - Although challenging, it is possible to track people down by following a digital footprint and mistakes.  [9:39] - The type of work Ken does is very high-end. [10:47] - Ken has worked for foreign governments and government officials for many high-end cases. [11:37] - Following the money doesn’t lead to the scammer. Ken describes other methods to track the location of criminals. [13:05] - A lot of success comes from informants and whistle-blowers. [13:55] - Sometimes people work in a call center not knowing that they are working for a scam organization. [15:02] - This is a male-dominated industry, specifically young men. [17:06] - Although these criminals are ruthless, they are well spoken, polished speakers and are generally very charming. [18:03] - Craigslist is often used to attract job applicants. [19:37] - Criminal organizations are extremely manipulative to those who come to realize that the operations are wrong. [22:38] - A big red flag is talking to someone and not ever seeing them either in person or on a video chat. [24:25] - Do your due diligence and research who you’re talking to.  [26:54] - Criminal organizations train employees through very well rehearsed scripts. [29:23] - The number one red flag is that criminal organizations are not regulated firms. [30:52] - Cryptocurrency is a big trend in scams currently. [33:18] - There are a lot of new challenges with cryptocurrency fraud. [35:22] - Cybercrime organizations are extremely sophisticated. [36:55] - Many organizations have mastered moving funds to other countries that won’t cooperate with law enforcement. [38:29] - Being able to reveal who the criminals are leads to a better chance at asset recovery. [40:02] - If Ken can identify a criminal and freeze accounts, it worries them. Paying back a client is how they can get out of their predicament. [41:18] - Some countries are more favorable to the victim and others are not. [42:37] - Ken now takes the media along to busts to expose criminals and educate the public. [44:09] - Financial crime is devastating to the victim. [46:50] - Criminals sometimes feel extreme guilt but they justify their actions. [51:15] - If you want to invest in something, ask for second opinions and do your due diligence and research. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest IFW Global Website Ken Gamble on LinkedIn
Surveillance cameras and other student monitoring tools are becoming more and more common in schools today. Laptops are distributed to the students and software is installed on them for their own protection, but it is important to know what is being done with the data collected outside of classroom use and if your students or your own privacy is being invaded.  Today’s guest is Jason Kelley. Jason is the Associate Director of Digital Strategy at the Electronic Frontier Foundation, focusing on how privacy and surveillance impact digital liberties. Before joining EFF, Jason managed marketing strategy and content for a software company that helps non-programmers learn to code, and advertising and marketing analytics for a student loan startup. Show Notes: [0:53] - Jason describes his current role at Electronic Frontier Foundation. [2:32] - Big tech companies who offer devices to schools collect data from them. [4:17] - Physical surveillance has increased due to the continuous problem of school shootings. [6:01] - Surveillance cameras can be accessed directly by local police. Jason explains how this can be controversial. [8:34] - Jason and Chris discuss the reason for using school-issued devices only for education purposes. [9:53] - Surveillance cameras do have blind spots. Facial recognition also has some issues. [11:03] - When devices are provided, parents, young people, and even administrators don’t always know the capabilities. [12:22] - Jason shares an example of one of the pitfalls of student monitoring apps that are on school issued devices. [14:07] - Schools can take screen captures from issued devices which isn’t done out of malice but does raise questions about privacy. [15:12] - We have to choose which is more important: safety or privacy. [16:37] - Students and parents need to know that school issued devices have features that will impact privacy. [17:32] - Jason describes some of the differences between the types of alerts school administrators receive. [19:12] - Sometimes software blocks things that are safe and doesn’t block things that could potentially be inappropriate. [20:50] - Teachers cannot have their eyes on every student’s computer at all times and often rely on software to help. [22:04] - Teachers shouldn’t be expected to know how surveillance software works. [23:01] - Jason describes a recent problem at Dartmouth with Canvas logs. [26:27] - This issue at Dartmouth was very serious and could have impacted the students’ careers drastically. [28:21] - There is an epidemic of misunderstandings of technology. [29:24] - EFF offers guides for students on what to do and expect with school-issued devices. [30:42] - There have been a lot of successful petitions in recent years about data tracking in universities. Parents have some leverage here as well. [33:00] - Sometimes, there’s not anything you can do about student surveillance. [34:20] - The Covid-19 pandemic made things very challenging as students needed access to education remotely very quickly. [36:50] - Jason describes some of the features of remote proctoring programs. [38:33] - This vastly impacted thousands of students who took the BAR exam. [40:36] - EFF has been pushing back on proctoring and Jason explains a recent win. [42:18] - Jason is hopeful that the pandemic has made it more clear where technology fails us. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Electronic Frontier Foundation Website Jason Kelley on LinkedIn Jason Kelley on Twitter EFF on Twitter EFF on Facebook EFF on Instagram EFF on YouTube
The term “gaslighting” is becoming more commonly used as people come to understand the psychological impact. It is important to identify the techniques used by someone to maintain an unhealthy relationship so you can avoid it or change it.  Today’s guest is Dr. Deborah Vinall. Dr. Vinall is not only a licensed marriage and family therapist, but also a doctor of psychology. She is a certified trauma therapist that uses EMDR and brain spotting. Dr. Vinall is the author of Gaslighting: A Step by Step Recovery Guide to Heal From Emotional Abuse and Building Healthy Relationships.  Show Notes: [1:18] - Dr. Vinall explains why she wrote her recent book as gaslighting is something a lot of people experience but don’t understand. [2:42] - What is gaslighting? Dr. Vinall gives an example. [3:18] - Gaslighting can happen anywhere and with anyone. [4:06] - There are different types of gaslighting that range from fully calculated to more defensive in nature. [5:01] - Many people exhibit gaslighting at some point in their lives, but patterns are when things get problematic. [6:19] - Insecurity is one reason many people tend to gaslight. [7:29] - What are some signs for pattern gaslighters? [8:22] - Pattern gaslighters are often very charming in public but are much different behind closed doors. [10:00] - What is “normal” and what is problematic? Look inside and see how you feel around this person. [11:03] - Dr. Vinall gives tips on how to manage situations where it is a co-worker that you can’t make a break from. [12:53] - When confronted, pattern gaslighters may dismiss accusations or could “fly off the handle.” [13:49] - In relationships, gaslighters tend to move very fast. [15:22] - In cases where relationships are deeply connected, Dr. Vinall suggests reaching out to a lawyer. She also discusses the impact of violence escalation. [18:02] - There is a distinction between occasional gaslighting and chronic pathological gaslighting. [19:39] - Try some different strategies in the workplace and think of an exit plan in case a change is needed. [21:12] - Journaling is an excellent tool to help you release and sort through your thoughts and can also be used later to confirm to yourself that you are not crazy. [22:58] - A red flag of gaslighting is someone trying to pull you away from your support system and external relationships. [24:11] - It’s important to grieve the loss of a relationship and all the things that go with it. [25:26] - Notice your self-talk. You can start internalizing the negative talk that you hear from someone who gaslights you. [27:19] - Being a gaslighter may be difficult to overcome as there’s something deeper going on and you must want to heal. [28:07] - Take your time in a relationship and listen to your intuition. [29:49] - Figuring out your boundaries for those in your life who you don’t want to cut out. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Gaslighting: A Step by Step Recovery Guide to Heal From Emotional Abuse and Building Healthy Relationships by Dr. Deborah Vinall Counseling Services with Dr. Deborah Vinall Dr. Deborah Vinall on LinkedIn
Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you’ll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to a much wider compromise. Many of us don’t even know how many devices are on our connected networks, so we better listen up. Today’s guest is Amanda Fennell. Amanda is the Chief Security Officer and Chief Information Officer at Relativity. In her role, she is responsible for championing and directing their tech and security strategies including risk management and compliance practices. She has a Master’s degree in Forensic Science and over 15 years of experience in Forensics and Cyber Security.  Show Notes: [1:12] - Amanda explains Relativity, her roles in the company, and how she was drawn to this field. [3:35] - Many people assume Amanda has all the new and greatest technology but knowing the risks of exploitation, she is selective. [4:25] - There are a multitude of devices that people don’t even realize they connect to their network. [5:23] - Because of the sheer volume of devices, hackers can do a sweep and use the information gathered. [6:32] - The number one security problem is keeping things up to date. [8:16] - Amanda walks through the simple steps of hacking smart devices. [9:40] - Amanda demonstrates how hacking something seemingly inconsequential can lead to accessing more. [11:23] - You need to know what’s connected to your network. You have more than you think. [12:41] - Surprisingly, there are connected lightbulbs that people sacrifice security for ease of access. [14:02] - When guests come over and you share your password, did you take their access back? [15:15] - Amanda is a big fan of segregating your network. She describes what this means. [16:29] - How can you segregate your network? [18:08] - Amanda suggests using WireShark. [19:39] - Many people hang on and use old routers because they still function, but most are not supported with updates after just a few years. [21:18] - It is also common practice to use identifying information as passwords and device names. [22:33] - Even Direct TV can be hacked. How can this be used against you? [23:30] - Amanda shares an investigation and how she used a printer spool file. [25:06] - Medical devices, printers, and copiers can be hacked. [27:29] - Amanda describes the differences between two security companies and what she advises doing to stay secure. [31:40] - How can you implement ongoing monitoring and detection in your home network? [33:52] - Implement updating devices into your monthly or weekly routine. [36:03] - You can do a scan on your network and even ask a friend for help. [37:28] - Smart coffee and smart fridges seem simple but can be used for targeting phishing and even when you are leaving the house. [39:33] - Just making yourself a little less accessible could deter a hacker because others will be easier. [41:43] - Amanda shares how false donations were used in fraud. [43:25] - We all deserve to have our information private and secure but it also needs to be personally accessible. That’s the risk. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Relativity Website Security Sandbox Podcast Amanda Fennell on Twitter Relativity on Twitter
Fear can cause people to hoard. Blockchain would allow transparency that could alleviate those fears. Understanding the trivergance of AI, IoT, and Blockchain can transform your thinking even for those resistant to change.  Today’s guest is Don Tapscott. Don is one of the world’s leading authorities on the impact of technology on business and society having authored 16 widely read books, including the global bestseller Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World, now translated into 20 different languages. He is currently Co-Founder & Executive Chairman of the Blockchain Research Institute, an Adjunct Professor at INSEAD, recently a two-term Chancellor of Trent University in Ontario and Member of The Order of Canada. Show Notes: [1:22] - Don shares his professional background, career, and work as an author. [2:55] - The Blockchain Research Institute researches how industries are affected by blockchain technology. [4:41] - Don and Chris think back to the earlier days of the internet. [7:02] - This new generation of technology represents a new paradigm. [8:04] - What is happening in Congress at the moment that could change everything about the industry? [11:35] - New paradigms create a crisis in leadership. Don’s life work has been to find leaders who embrace the shift. [13:12] - We view this current time as the second era of the internet. What is different from the previous era? [14:23] - We are moving from an internet of information to an internet of value. [15:21] - People hoard out of fear and this impacts supply chains. [17:09] - Blockchain can be a solution for health records. Many people consider it a problem due to lack of understanding. [18:25] - Blockchain gives people the control to manage their transparency. [20:29] - It takes time for us as a society to figure things out. What is the future of blockchain? [22:19] - Don is speaking at an event about the vision of how industries will be changed by blockchain. [24:43] - Don references years past when CEOs didn’t type because that was a secretary’s job. It took time to change and it will take time to make these changes as well. [26:06] - There are industries that will be very resistant to change. [26:51] - On the Blockchain Research Institute’s website, there are reports on various industries. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Don Tapscott Web Page Men In Suits Music Web Page Blockchain Research Institute Web Page Don Tapscott on Facebook Don Tapscott on Twitter Don Tapscott on Instagram Don Tapschott on LinkedIn Books by Don Tapscott
At some point in our life we will encounter a cyber intrusion, either through somewhere we have done business or because we are targeted as an individual. It is important to know how to prevent identity theft as well as how to respond if you’ve already been compromised.  Today’s guest is Adam Levin. As a graduate of Stanford University and the University of Michigan School of Law, Adam Levin is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance. He is an author and the former director of the New Jersey Division of Consumer Affairs. Levin is the chairman and founder of Cyber Scout and co-founded Credit.com. He has been featured in the New York TImes, Associated Press, Wall Street Journal, The Los Angeles Times, USA Today, and The Chicago Tribune. In addition to that, he has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC, MSN, and many others. Show Notes: [1:14] - Adam shares his background and education in law and politics. [2:29] - In 2003, Adam created an Identity Theft company that later became a global business called Cyber Scout. [4:49] - Adam believes that security breaches are a certainty of life these days. [6:35] - While hacking has been around for a long time, Adam shares how he got into the business of identity theft protection. [8:36] - Over time, insurance companies have come to be support in identity theft. [10:01] - Chris shares a scenario of a friend that had their identity stolen. [12:23] - Many victims feel like they were in the wrong when in reality they may not have done anything wrong at all. [13:56] - In recent years, the IRS has been a lot more proactive. [16:02] - What is Adam’s definition of identity theft? [19:01] - Adam explains why you should be vetting your vendor as well. [21:13] - There are four kinds of threat actors - state sponsored, for-profit, cause-related, and “because I can.” [23:29] - Social engineering is the most successful method of identity theft. [25:42] - Adam wrote the book Swiped and explains that there needs to be a new framework around mitigating the threat of identity theft. [26:32] - How do we minimize your risk of exposure? This is very difficult. [27:46] - Two factor authorization is extremely helpful in protection. [28:41] - Always verify that the person you’re speaking to is who you think they are. [30:12] - How can you monitor everything on your accounts and reports? [31:37] - One of the ways credit card numbers are sold on the dark web is by zip code which causes many banks to miss fraudulent use. [32:51] - The third “M” is to manage the damage. What can you do after an incident? [34:05] - Identity theft protection programs are relatively inexpensive. [37:01] - You can set the threshold for when you are notified. But you should choose to be notified of any purchase, even the really small ones. [38:50] - How do banks know when there’s a fraudulent charge? [40:38] - There are features where you can lock the use of your card before having to change account numbers. [42:33] - The best protector of your portfolios, including your identity, is you the consumer. [44:37] - Adam describes his new podcast called What the Hack. [50:23] - Remember that many people are not who they claim to be. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Adam Levin Web Page What the Hack Podcast with Adam Levin Adam Levin on Twitter Cyber Scout Web Page Cyber Scout on Twitter
We can sabotage ourselves by the way we prioritize our day by not differentiating between the urgency of emails and getting distracted or manipulated by the media. Today’s guest is David Kadavy. David is the author of the books Mind Management, Not Time Management, The Heart to Start, Design for Hackers, and multiple short reads. David is a self-published coach and the host of the podcast Love Your Work. David has spoken in multiple countries and has been featured in The Overserver, The Huffington Post, Upworthy, and Life Hacker.  Show Notes: [1:02] - Welcome to the show, David! David explains what he does in the writing field. [2:50] - Chris admits he is a master procrastinator and tends to spend his time doing tasks that are not as important as others. [3:45] - David explains how he divides things up by mental state. [5:57] - A way to avoid emails that don’t need attention right away, David uses a program called Boomerang. [7:38] - David demonstrates how open loops apply to click-bait. [8:56] - The looming possibility of urgent emails can waste energy. [10:10] - David keeps his phone on do not disturb and uses the favorites feature. [12:22] - The news and media can be a huge distraction.  [13:10] - If the media captures your attention, it is not a mistake. We are attracted to negativity. [15:47] - You don’t need to know everything that is going on every single moment of every single day. But it is hard not to get sucked in. [18:10] - The immediate availability to communication creates urgency that hijacks your attention. [19:30] - The first person that should get your attention is yourself. [21:00] - As you start prioritizing different things, people may stop demanding your attention immediately. [22:23] - David lives in Columbia and the cultural values are much different there than in the United States. [25:19] - People in different countries may look at time differently as well. [28:33] - People also tend to change how they think about time. [30:03] - If there is a specific set of steps to complete a task, AI can do it. But human creativity is missing. [32:27] - David describes a typical writing day for him and how he manages his mind. [35:01] - David explains the science behind why morning grogginess is actually a prime state to be in for creativity. [38:29] - While resting, free association gets a chance to manifest. [41:15] - Arguing viewpoints on social media has become a priority for a lot of people. [44:50] - There’s so much fighting for our attention. [45:55] - David shares the titles and brief description of his books linked below. [48:01] - kdv.co is shared as an opportunity to download a free writing toolkit. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest David Kadavy Web Page David Kadavy on Twitter 100-Word Writing Habit Books by Author David Kadavy Love Your Work Podcast David Kadavy’s Writing Tools
Gifted pick-pocketers can use social engineering skills to choose their victims. Many times as we travel, we may not realize that our body language makes us an easy target.  Today’s guest is Chris Kirsch. Chris is the CRO and co-founder of Rumble. With a background in product marketing and technical mindset, he has helped formulate go-to marketing strategies at PGP, Rapid7, and Veracode. In 2017, he earned the black badge for winning the social engineering capture the flag competition at DEFCON. He has a passion for InfoSec, OSINT, and is a volunteer advisor for the National Child Protection Task Force. Show Notes: [1:05] - Welcome Chris! Chris shares his background. [2:20] - Chris co-founded Rumble, an asset discovery company to help clients secure their network. [3:48] - Pick-pocketers are masters of misdirection. [6:34] - Chris explains why he got into the social engineering side of DEFCON. [8:18] - When in Paris, Chris’s father was pick-pocketed which prompted him to start researching. [11:18] - After meeting a magician at a convention, Chris then became interested in open-source intelligence (OSINT). [11:51] - Chris defines the difference between the two schools of thought on pick-pocketing. [13:29] - Some pick-pocketers can steal without interacting with people while others utilize social interactions. [15:31] - Chris shares in more detail the story of his father being pick-pocketed. [17:38] - This experience showed Chris and his family a way that teams of people can work together to fool a target. [20:03] - There are some unusual laws that limit consequences for theft. [21:50] - Chris shares tips on where to place your wallet when traveling and demonstrates a scenario. [25:18] - Escalators are areas where pick-pocketing teams can be very successful. [28:17] - Placing your hand in your pocket to intentionally keep your belongings safe might actually make you a target. [30:31] - When something else is on your mind, you are an easy target. It is hard to always be aware. [33:19] - Chris uses an example of a phishing scam that demonstrates social engineers move you from rational thinking to emotional. [36:20] - Many people take these scams personally when in reality, scammers have no idea who you are. [38:27] - Chris references a documentary from the point of view of a social engineering target. [40:51] - Darren Brown on YouTube and Netflix has several videos and shows that demonstrate the psychology of many scams and manipulation. [43:59] - The sample you are seeing is what the person wants you to see. [45:12] - Chris gives actionable steps to take when feeling suspicious. [47:09] - Chris describes a time when he was able to use social engineering strategies that would have been shot down if the target had done something simple. [49:21] - For the “long con” scammers, Chris has advice about trust. [51:42] - Search for Kirsch Identity Fraud and you find free resources on identity theft. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chris Kirsch on LinkedIn Chris Kirsch on Twitter Rumble Network Discovery Web Page Rumble Discovery on Twitter
You cannot separate community and school safety from each other. They simply go hand in hand. We’ve seen adults displaying lack of impulse control on airplanes and as kids go back to school, we cannot underestimate the challenges that may arise. It’s important to be prepared to know how to respond.  Today’s guest is Jason Stoddard. Jason is the Director of School Safety and Security for the Charles County Public Schools. He is responsible for sustaining a safe learning and work environment for over 27,000 students and nearly 4,000 staff members. He is a retired police commander with over 24 years in law enforcement.  Show Notes: [0:51] - Jason describes his job and what he is responsible for. [1:40] - Because of everyone’s experience in school, everyone has their own opinion of what things should be like even though things have changed. [3:00] - In recent years, ransomware and hacking has been a threat to schools. [4:41] - School issues have not been seen as what they really are: community issues. [5:50] - Jason shares ways he builds relationships within the community for school safety. [7:10] - Handle With Care is a program that is implemented in Jason’s county. [8:52] - Instead of asking what’s wrong, ask the kid what has happened. [11:14] - We can never over communicate what is going on. Honest conversations are necessary. [12:53] - What could be the ramifications of early experiences with the criminal justice system? [14:40] - When the police arrest a child that could affect their safety, Jason shares that in his county, they are required to report it to him and his team. [16:01] - Jason’s county is also committed to working with law enforcement regarding gangs. [18:24] - There are some services that provide social media monitoring but there are some problems with using this. [20:48] - Kids need to feel comfortable bringing information forward. [21:17] - Jason believes that this school year is set up for tragedy. [23:22] - Any school system is built on layers. It can never be just one plan. [24:58] - How do we get kids to the services they need to help them with impulse control? [26:08] - School safety programs cannot force kids into mediation programs. [28:10] - When students are suspended, they are missing out on their education and sometimes can’t get caught up. This creates a cycle for more misbehavior. [31:15] - School systems see all the same problems everyone else sees but with the added kid component. [33:19] - Malware and ransomware are huge problems right now with the increase in virtual learning. [35:54] - Valuable information can be sold on the dark web. [37:27] - Swatting is where someone will call into 911 to get law enforcement to respond. [40:11] - Sometimes kids also hack to change their grades but are usually easily fixed. [41:00] - Teachers will also sometimes write their passwords on a post-it for students to see. [42:01] - Covid-19 continues to be incredibly challenging. [44:57] - Stay connected with what is going on locally, nationally, and from the CDC. [45:56] - The fact that this situation has been so polarizing has made policy very difficult to enforce. [49:53] - Jason explains some of the issues that arose through virtual learning last year. [50:55] - There are so many layers to security and a positive school climate is the key. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jason Stoddard on LinkedIn Charles County Public Schools Safety and Security Web Page
When seconds count and freezing isn’t an option and lives are at stake, how do you prepare to know what to do? Even our bodies have natural reactions. But what can you do to stay calm, level your breathing, and be alert? Today’s guest is Robert Montgomery. Robert was an operations officer in the CIA for 34 years and served in some of the most dangerous places in the world. He is also a former Marine and the founder of Guardwell Defense. Robert is an author and teaches training courses such as Combat for Women, Improvised Weapons, and Street Smarts for Students and Businesspeople designed to help anyone mitigate and deal with unexpected violence. Show Notes: [0:53] - Robert shares his background, experience, and how he shifted into training civilians for personal defense. [3:46] - Using security cameras that he can access on his phone, Robert shares the story of seeing people on his property while he was in Afghanistan. [7:29] - Through this experience, Robert realized why his wife was able to stay calm in the moment. [10:13] - Referencing Chris’s website and podcast, Robert explains the common scams that he has seen come up. [11:26] - “If you find yourself in a fair fight, you didn’t plan properly.”  [12:27] - There is a correlation between your heart rate and ability to control fine motor skills. [14:12] - Controlling your breathing is the key to lowering your heart rate. [16:37] - Practicing breathing in non-stressful situations can help you in the moment. [18:18] - Chris shares a story that connects to the discussion on adrenaline and fear. [19:51] - You cannot be alert all the time. Being hyper alert can lead to PTSD and often does in members of the military. [23:23] - With situational awareness, you have to stay level headed and make decisions quickly. [24:51] - It is okay to “be rude” if you feel uncomfortable. [27:10] - There are many signals you may notice if approached by a predator. [28:13] - A common situation many people find themselves in is walking or jogging outside with headphones on. This affects their awareness. [31:46] - Situational awareness will mitigate many problems. [32:47] - Robert gives some tips on what to do when beginning to travel again, especially overseas. [35:21] - Maintaining a lower profile to lessen your chances to be targeted for crimes as a tourist can be challenging, but Robert gives advice. [36:28] - Edson Tiger offers an excellent online course for training for travel. [38:27] - Paper copies of things are important in case things are lost. [39:54] - Every citizen should learn the basics of first aid. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Seconds to Live or Die: Life-Saving Lessons from a Former CIA Officer by Robert Montgomery Guard Well Defense Home Page Edson Tiger Training for Travel Course
There are many ways your network can be accessed, not just remotely but physically. How equipped are you and your coworkers to prevent intrusions? Today’s guest is Jayson E. Street. Jayson is the author of Dissecting the Hack: The F0rb1dd3n Network Series. He is the DEFCON Groups Global Ambassador and the VP of InfoSec for SphereNY. He has also spoken at DEFCON, DerbyCon, GRRCon, and at several other cons and colleges on a variety of Information Security topics. Jayson was also featured in The National Geographic series Breakthrough Cyber Terror. Show Notes: [1:00] - Jayson explains how he hacks to help. [1:59] - People want to see how Jayson can get into their facility and rob them. [3:39] - Jayson shares how “being the bad guy” can get the information needed to educate users and clients on preventing more. [4:51] - Jayson has been known to rob banks and shares the story about how he robbed the wrong bank because he had to go to the bathroom. [7:24] - The devices Jayson uses emulate keyboards and code.  [9:03] - Some employees for big companies like Microsoft have posted their badge on social media from which Jayson prints and uses as his own. [10:08] - How did Jayson get caught in robbing the wrong bank? [13:21] - He found out later that the bank he robbed by mistake wound up wiping their machines which cost them a lot of money even though Jayson’s procedure was harmless. [16:01] - Jayson has a 100% success rate which shows how employees trust anyone who looks official. [17:13] - What is the yellow method and why does Jayson use it? [18:18] - Jayson describes the facility that took the longest amount of time to get into in Jamaica. [20:17] - In one instance, Jayson did not go back to talk to the client after conducting the pen test for a charity. [22:30] - When these tests happen, it isn’t about winning and losing. Jayson makes sure he is caught so he can provide education and training. [25:08] - “The biggest thing that people can do to protect themselves is to listen to the voice in the back of your head saying that something is odd or unusual. Realize when you’re at work, part of your job and responsibility is to think that something bad may happen.” [26:25] - Companies need to give a proper avenue for employees to feel comfortable in reporting something strange. [28:39] - Jayson shares some of the techniques he uses that have a 100% success rate in penetrating the company’s network. [30:06] - At events, oftentimes there are company USB drives loaded with giveaway items. These could be dangerous to use. [31:39] - There is no way to completely eliminate threats. The important piece is how you respond to a threat. [33:10] - Network security is great, but physical security of a network is just as important. [35:01] - Jayson explains that the users of the programs in a network are the people that need to have the proper education. [37:45] - Jayson has a program where he gamifies security education. [39:50] - Many people don’t realize how easy it is for an official looking badge to be recreated. [41:41] - Jayson describes his most boring and simple robbery he completed in 15 seconds. [42:29] - What was Jayson’s most successful interaction? [43:51] - After obliterating a company one year, management took the lessons to heart, educated their team, and had him come back the next year. [46:19] - If pen testers are not rooting for the client, they are in the wrong business. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jayson E. Street Home Page Jayson E. Street on Darknet Diaries Podcast Jayson E. Street on Twitter Jayson E. Street on LinkedIn Dissecting the Hack: The F0rb1dd3n Network by Jayson E. Street
Children go missing, exploited, and trafficked everyday. It takes investigators, prosecutors, and private sector technology specialists to help them. Misinformation and TV portrayals can impact our resources that are directed to help. Today’s guest is Kevin Metcalf. Kevin is a former federal agent turned prosecutor and the founder of The National Child Protection Task Force which brings together recognized experts in the field such as strategic legal applications, open source intelligence, cellular mapping analysis, dark web investigations, and cryptocurrency to help law enforcement agencies everywhere. He has undergone training provided by the National Computer Forensics Institute, the National White Collar Crime Center, and the FBI Cellular Analysis Survey Team, among others. Kevin developed a system for working with cell phone related data in criminal cases that developed into a mobile device foundational course that focuses on the integration of legally-derived information with open source information. Kevin has also published a series of instructional books available on Amazon. Show Notes: [1:26] - Kevin shares his background and how starting the National Child Protection Task Force was not something he initially thought he’d do. [2:20] - As a single parent, Kevin left his job in law enforcement, went back to school, and became a prosecutor. [3:58] - As he was led into working in social media and cell phones, Kevin realized how often he was working on cases that had to do with children. [5:11] - Kevin describes the case that got him national attention and how it led to him working with experts that wanted to come together to help more kids. [7:01] - Chris notes the gap between law enforcement and the technology that is available. Kevin is trying to bridge that gap. [8:00] - How does Kevin deal with the “CSI Effect”? [9:57] - There is a lot of misinformation regarding human trafficking.  [10:52] - It is very challenging to convict someone for human trafficking due to little information and the victim not being forthcoming with details out of fear. [12:19] - Most of the time they are able to convict for something else, like drugs or gun charges, which does at least get the person in jail without putting the victim through testifying again. [13:34] - There are a lot of psychological factors involved for victims even years afterwards. [14:55] - Kevin’s organization works with missing, exploited, and trafficked children. He explains the difference between exploitation and trafficking. [16:49] - Children who are missing and runaways are at higher risk of being exploited and trafficked.  [17:51] - There is a huge problem with missing children investigation or lack thereof. Predators are aware of this and take advantage. [21:21] - There are so many problems with statistics that Kevin doesn’t know what questions to ask. [23:18] - Kevin feels that there are two categories for children, missing or not. [24:04] - Kevin lists some of the things that put children at risk, including parents trying to control everything. [27:35] - During the grooming process, predators are looking for the weaknesses in a parent-child relationship. Mental health issues also add another level of vulnerability. [31:10] - The NCPTF is composed of active duty law enforcement. Kevin explains following the rules of the jurisdiction they’re working in. [32:51] - Although there are some controversial tools used to investigate these cases, Kevin describes how to prevent breaches in privacy. [35:04] - “You have to understand the limitations of technology. If you don’t, you’re going to misuse it, screw up an investigation, and arrest the wrong person.” [36:19] - Kevin explains the algorithms used for facial recognition, especially using the face of a child. [38:43] - An investigator needs to follow up on every hit used with facial recognition. [39:59] - Kevin describes how the NCPTF hones their technology skills. [41:38] - Predators are using information willingly posted on social media to harm others. [42:51] - It is difficult to make politicians and policy makers understand how bad the situation is and what is needed to prosecute a predator. [45:00] - Newer privacy laws make it difficult to use technology to identify a human trafficker. [46:51] - Using these technological resources for minor infractions is a waste of time and money. They should be used for the major things. [49:27] - It is important to not tip predators off with what they are using to identify them. Sometimes photos and videos will allow investigators to determine their location. [51:14] - A lot of people don’t realize how easy it is to find their information. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Erica Stanford on LinkedIn National Child Protection Task Force Kevin Metcalf NCPTF Twitter NCPTF Twitter NCPTF Facebook
Transferring money through a third party can add substantial fees and using cryptocurrency bypasses those. However, does the emerging technology invite additional risks? Today’s guest is Erica Stanford. Erica is founder of the Crypto Curry Club, UK’s number one rated networking educational event for blockchain, digital currency, crypto payments AI, and tech for sustainability. She is the author of Crypto Wars: Faked Deaths, Missing Billions, and Industry Disruption. Erica is a public speaker, crypto currier, and conducts blockchain industry reviews.  Show Notes: [1:02] - Erica shares what began her interest in cryptocurrency. [2:11] - After being mugged while overseas, Erica explains how she could only access money from a Western Union with high fees. [4:25] - This experience opened Erica’s eyes to how many people in the world live without access to money and she learned about cryptocurrency. [5:06] - The Crypto Curry Club started off as a way for Erica to meet other people in the industry through events. [7:17] - Cryptocurrency is digital currency; money that is secured by encryption and blockchain. [9:05] - Prior to crypto, going through a third party was the only way to make a digital exchange. Erica explains what could happen if the third party disappears. [10:50] - Erica explains how blockchain works. [11:56] - The best part of transferring money through cryptocurrency, it is usually free of charge with absolutely no fee. [12:59] - Some businesses would have a minimum transaction amount due to the price they pay in fees. Crypto bypasses that. [14:40] - It is digital money and very volatile. People have started taking advantage of this. [16:02] - There’s a lot of hype around cryptocurrency which means it can also get a lot of scammers creating their own currency. [18:22] - Even in cases where the cryptocurrency business is terrible, they still brought in millions of dollars because of the hype. [20:17] - There have been scams where celebrities have been hacked or a fake profile has been created stating to send them money and they’ll double it for you. [21:05] - Erica describes recent Ponzi Schemes, networking marketing, and multi-level marketing using cryptocurrency. [22:22] - Cryptocurrency is created through a process called mining. [24:31] - In a recent Ponzi Scheme, good people invested everything they had and lost it. Some people knew it was happening but many were victims. [26:09] - A cryptocurrency business recently shut down. Erica discusses red flags. [27:51] - Erica explains “staking.” [28:46] - Some red flags are claims of working with huge companies as customers and partnerships. Scammers can be very brazen. [30:00] - If you see one single thing that is fake or dishonest, you have to assume that there are more things that are untrue. [30:40] - Erica explains why she decided to write the book Crypto Wars. [31:53] - A huge scam that is still shockingly going on inspired Erica to get more information and start her research. [34:23] - That one event and the fact that Erica already had an audience and community, she was asked to write the book. [35:14] - Erica shares a discount code for the book when it is released this month. [36:11] - There have even been faked deaths and Erica tells the story of the scammer behind Quadriga. [38:40] - Some of these shocking stories are really happening and possible with cryptocurrency. [40:16] - There could be ways to track everything, but if someone has been planning a scam, Erica explains how they can get around that. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Erica Stanford on LinkedIn Crypto Wars: Faked Deaths, Missing Billions, and Industry Disruption by Erica Stanford Crypto Curry Club Home Page Crypto Curry Club on Facebook Crypto Curry Club on Instagram Crypto Curry Club on Twitter
loading
Comments (1)

zIDi alOnE

Easy Prey

Jul 9th
Reply
Download from Google Play
Download from App Store