
8th Layer Insights
87 episodes — Page 1 of 2

Cognitive Heists series #7: The Trojan Gift
Hey folks! It's been a few weeks, but now the gift is here. :) It's the 7th installment of the "Cognitive Heists" series. This one is titled, "The Trojan Gift." 🎁 Not all traps look like traps. Some arrive with a bow on top. The Trojan Horse is the oldest example. But today, the gift often looks like a free service. No charge, no strings… except the ones you don’t see. Because the real price isn’t money. It’s privacy. -- It’s data. -- It’s you. In this issue of Cognitive Heists, we explore: 🔹 How “free” has always been one of the most effective disguises in the con artist’s playbook 🔹 Folklore warnings about cursed gifts that crumble into ash 🔹 Why reciprocity, curiosity, and flattery make us drag danger through our own gates 🔹 And how modern Trojan Gifts hide in inboxes, QR codes, cloud apps, and “free” platforms The cost of convenience is rarely written on the tag. Enjoy! Next up: The Double Agent—where the betrayal sits across the table, smiling like a friend. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cognitive Heist series #6: The Shill
Some cons don’t succeed because of the smooth-talking seller. Instead, they succeed because of the crowd. Enter The Shill -- a hidden accomplice pretending to be just another customer, audience member, or lucky passerby. They're in the crowd, acting as a 'normal' audience member... all with the goal of bringing validation to the con-artist's claims. They clap first, they nod enthusiastically. They “buy” the tonic. They shout “this stuff really works!” And we believe them… because we think they’re one of us. That’s the power of the shill: weaponized trust and manufactured consensus. Next time: The Trojan Gift - when the real danger is hidden inside the prize. ===== In other news: ===== The FAIK Files: It's a Personality Problem: Audio version: https://pod.link/1771521321/episode/ZWVmYWYxMDgtZGU4ZC0xMWVmLWIwNGQtMmY0YjJkNzQ3YzEx YouTube version: https://youtu.be/RNw1T4CSIU8?si=99tQN5tcPwIaAlV6 Interesting Thing of the Week: The Washington Post has a great article titled, "Making cash off ‘AI slop’: The surreal video business taking over the web." The article covers the -- as the title states -- AI Slop: the internet's latest hustle. Get the book, FAIK! Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com. P.P.S -- Did you know that we have an text version of this newsletter? Check it out on LinkedIn or my Website. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cognitive Heist series #5: The Long Con
Welcome to Deceptive Minds - An audio newsletter about how we are fooled, how we fool ourselves, and what we can do about it. This one is all about "The Long Con." When the lie moves in next door. Not every con kicks down the door. Some knock politely, charm their way inside, and stay for dinner. In this issue , we explore the anatomy of the long con... a psychological slow-burn that trades urgency for intimacy. Think of these as more than just scams. They’re stories that unfold like relationships... until the final betrayal. In other news: New FAIK Files episode (Video Killed the ...) Audio version: https://pod.link/1771521321/episode/012b4c787fc35a8cd9df3d8f99fcd569 YouTube version: https://youtu.be/mYFwURVoPE8 Interesting Thing of the Week: Hany Farid's TED Talk, How to spot fake AI photos: https://www.ted.com/talks/hany_farid_how_to_spot_fake_ai_photos Until next week... stay safe out there! Perry P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com. P.P.S -- Did you know that we have a text version of this newsletter? Check it out on LinkedIn or at The Deception Project website. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cognitive Heist series #4: The Ghost - Panic, Urgency, and the Speed of Deception
👻 New Deceptive Minds issue: Cognitive Heist series issue #4 -- The Ghost The ghost doesn’t break in. It doesn’t even exist. It just panics you into acting-- fast, unthinking, exposed. This issue explores one of the most dangerous tools in a scammer’s toolkit: urgency. We unpack: 🧠 The psychology of panic and why urgency shuts down critical thinking 📞 Real-world scams that weaponize fake emergencies 🕯️ A chilling tie-in to folklore: the crying child at the door 🐙 And yes, there are tentacles. Always tentacles. The Ghost's superpower is tricking you into moving before you think. --- Check out the most recent FAIK Files podcast: Dark Knowledge & Hidden Agendas Audio version: https://pod.link/1771521321/episode/ae2224ed846ac80ad3c8e2fbc0185087 YouTube version: https://youtu.be/U7447dpffao Interesting research of the week: Sweet-talk the bots: New research shows how LLMs respond to human persuasion tricks Geekwire article: https://www.geekwire.com/2025/sweet-talk-the-bots-new-research-shows-how-llms-respond-to-human-persuasion-tricks/ Wharton School blog post: https://gail.wharton.upenn.edu/research-and-insights/call-me-a-jerk-persuading-ai/ Until next week... stay safe out there! Perry P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com. P.P.S -- Did you know that we have a text version of this newsletter? Check it out on LinkedIn or at The Deception Project website. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cognitive Heists series #3: The Call Is Coming from Inside Your Mind
📞 The Call Is Coming from Inside Your Mind Welcome to #3 of the "Cognitive Heists" series. The Voice in Your Head -- Authority, Audio Deepfakes, and the Power of a Familiar Voice In 2019, a UK energy firm received a call. The voice on the other end sounded exactly like the CEO of their German parent company. The request? Transfer €220,000 immediately to a trusted vendor. It wasn’t the CEO. It was a deepfake. This was the first confirmed deepfake voice fraud used to commit corporate theft—and it’s only the beginning. This issue dives into: 🎧 Why voice is one of the most powerful trust signals—and why that’s dangerous now 😨 How vishing, voice cloning, and audio deepfakes hijack your certainty 👻 A classic urban legend (yep—the babysitter and the call from inside the house) 🧠 The psychology of obedience, panic, and auditory illusion 🧯 And how to train your brain to pause the response before the wire transfer In a world where your boss’s voice can be faked, what part of your brain do you not listen to? A couple relevant sources related to AI based voice scams: [PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing: (this is my story about having an AI voice bot participate in DEFCON's Social Engineering Community Capture the Flag competition). https://blog.knowbe4.com/proved-unsuspecting-call-recipients-are-super-vulnerable-to-ai-vishing Seeing (and Hearing) Isn’t Believing: My SEC Presentation on AI-Driven Scams: https://blog.knowbe4.com/seeing-and-hearing-isnt-believing-my-sec-presentation-on-ai-driven-scams The FAIK Files: AI Oopsies! Audio version: https://pod.link/1771521321/episode/af214a2812ad672b675870a9fb56f4cb YouTube version: https://www.youtube.com/watch?v=NY31aE5-PxA TechCrunch story: Google’s Gemini panicked when playing Pokémon: https://techcrunch.com/2025/06/17/googles-gemini-panicked-when-playing-pokemon/ P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cognitive Heist series #2: The Bait Man
Welcome to part 2 of the Cognitive Heist miniseries: The Bait Man 🗝️ He doesn’t pick the lock. 🚪 He doesn’t sneak in the back. 🪝 He just leaves something shiny on the ground and waits for you to pick it up. Enter "The Bait Man": the scammer who lets your own curiosity or greed do all the work. Part 2 of Cognitive Heist explores: 👉 Why bait-based scams (phishing, “found” USBs, QR traps, honeytexts) work so well 👉 The irresistible psychology of forbidden knowledge and too-good-to-miss offers 👉 A chilling parallel with the Nazi gold train legend—possibly the most expensive “nothing” in history 👉 The ancient myth of Pandora’s Box... and what it says about modern clickbait 👉 And as always: tentacles, noir, and cognitive traps. In other news: 👉 The FAIK Files: Climbing Through the Context Window Audio version: https://pod.link/1771521321/episode/3ec38fa7cd599b26e3c7fde25651a3f0 YouTube version: https://www.youtube.com/watch?v=3ntZlQ4Lbkw 👉 Research Paper of the Week: Project Vend-- Can Claude run a small shop? (And why does that matter?) Anthropic's page discussing the experiment Business Insider P.S. -- Just a quick reminder that I've got a great book out that's all about deepfakes, disinformation, and deception. Be sure to check it out if you haven't already: https://ThisBookIsFAIK.com. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cognitive Heists series #1: The Insider -- Trust by Proximity, not Proof
🕵️♂️ New Deceptive Minds mini-series: Behind the Scams (Cognitive Heists) 🕵️♂️ They didn’t pick the lock. They didn’t sneak in through the vents. You held the door open for them. This week’s issue kicks off a new 10-part series: Cognitive Heist—a deep dive into the psychological exploits behind the world’s most effective social engineering attacks.T his week is all about "The Insider": Trust by proximity. Why do we let people in—not because they’re verified, but because they seem like they belong? We unpack: ⚡ The psychology of in-group bias and “trust theater” ⚡ Real-world infiltration tactics (think BEC, fake IT staff, Slack scams) ⚡ Urban legends and conspiracies that make insiders feel mythic ⚡ How your mind, not your firewall, is the real attack surface You’ll never look at the new guy in the group chat the same way again.Oh... and there are a couple other fun bits in there as well. Enjoy! Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (audio version): https://thecyberwire.com/podcasts/the-faik-files/41/notes Cognitive Inoculation: Winn Schwartau and the Metawar -- FAIK Files Podcast (YouTube version): https://www.youtube.com/watch?v=3ntZlQ4Lbkw Learn more about your ad choices. Visit megaphone.fm/adchoices

Narrative Armor: Why Some Stories Become Immune to the Truth
When it comes to deception, everything is about story. And the stories people cling hardest to are ones that aren't solely about information... they are about self-protection. They explain the world. They spark emotion. They reinforce identity. And once we believe them, we don’t just share them…We defend them. In this issue of Deceptive Minds, I explore why some narratives become immune to fact-checking, critique, or correction — and how we end up reinforcing falsehoods just by wanting them to be true. 🛡️ Why emotionally charged stories resist disproof 🧠 How narratives come preloaded with defenses (mockery, morality, tribalism) 📜 Real-world & historical examples of story-based immunity 🧩 And how to tell when you're dealing with a belief that's been bulletproofed Because when deception takes the form of a story you want to believe… truth never even gets a chance. Deceptive Minds: newsletter about how we are fooled, how we fool ourselves, and what we can do about it. Check out the print newsletter on LinkedIn or on my website. Learn more about your ad choices. Visit megaphone.fm/adchoices

Repeat Until Real
Hey Friends! This is one of the most important issues so far -- please share! Ever find yourself believing something… just because you’ve heard it enough? That’s the Illusory Truth Effect at work. "Illusory Truth" is the cognitive glitch that makes repetition feel like credibility. In this issue of Deceptive Minds, we explore: 🧠 Why familiar lies feel more believable than unfamiliar truths 📢 How repetition is used in marketing, politics, scams, and propagan 🛡️ And how to defend your mind against one of the most powerful tools in deception If it’s been said often enough, we stop asking whether it’s true. We just… feel like it is. 🧩 How This Connects to Previous Deceptive Minds Issues Narrative sets the stage. Attention brings focus. Plausibility helps the lie land. Fluency makes it feel smooth. Emotion gives it velocity. Credibility theater dresses it in trust signals. Repetition cements it. Repetition is the glue that binds these elements together. It gives them staying power. It builds the illusion of consensus — even when there is none. Want to see my Bigfoot Security Tips video? Here are links to the video on YouTube, LinkedIn, and TikTok. Till next time! Perry Check out the print newsletter on LinkedIn or on my website. Learn more about your ad choices. Visit megaphone.fm/adchoices

Truth Hurts. So We Lie.
Ok. This one's pretty uncomfortable. It's about the lies we tell ourselves and why we believe them. We all like to think we’re rational. But the truth is, our minds are masters of defense... not just against deception, but against discomfort. In this issue, I explore the mental machinery behind "motivated reasoning" and "cognitive dissonance." These are mechanisms we use to try to protect ourselves from inconvenient facts. 🔍 Why we reject information that threatens identity 🛡️ How our beliefs start defending themselves 🎭 Why feeling right often beats being right This theme hits at the core of the Deceptive Minds mission: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. Want to check out the print version? You can get here as a LinkedIn newsletter. Or you can subscribe to the email version on my website: https://TheDeceptionProject.com Anything you'd like me to cover in a future edition? Stay sharp, — Perry hello [at] 8thLayerMedia [dot] com Other references for this issue: https://en.wikipedia.org/wiki/Modern_flat_Earth_beliefs https://en.wikipedia.org/wiki/Repressed_memory https://www.cdc.gov/tuskegee/about/index.html Jessica Barker's newsletter: Human Nature of Cyber Security: https://www.linkedin.com/newsletters/7312575416190255104/ Jessica Barker's LinkedIn profile: https://www.linkedin.com/in/jessica-barker/ The FAIK FILES Audio version here: https://thecyberwire.com/podcasts/the-faik-files/38/notes FAIK FILES YouTube version: https://youtu.be/Sy67tVZ_OVk Apple's controversial research paper: https://ml-site.cdn-apple.com/papers/the-illusion-of-thinking.pdf Nate Jones' thoughts on the Apple paper: https://www.youtube.com/watch?v=I9tYAvjkOQk Learn more about your ad choices. Visit megaphone.fm/adchoices

The Costume of Truth: Why We Trust the Logo, the Lab Coat, and the Lanyard
Not all deception hides in the shadows. Some of it walks right in — wearing a badge, a clipboard, or a lab coat. In the latest issue of Deceptive Minds, I explore one of the most powerful tools in the scammer’s playbook: credibility theater — the subtle art of looking legitimate enough to bypass your skepticism. Inside this issue: 🎭 Why we trust uniforms, logos, and titles more than facts 🧠 The psychology behind “surface-level trust” 📜 Historical scams that used nothing but confidence and costumes 🔍 How social engineers, phishers, and marketers use the same tricks today 🛡️ And how to train your brain (and your team) to see through the performance Because sometimes, the most dangerous deception doesn’t sneak past you — it gets waved through the front door. 🧠 Join 4,000+ others exploring how deception works — and what to do about it. Want to check out the print version? You can get here as a LinkedIn newsletter. Or you can subscribe to the email version on my website: https://TheDeceptionProject.com Anything you'd like me to cover in a future edition? Stay sharp, — Perry hello [at] 8thLayerMedia [dot] com Check out The FAIK Files, episode 27: Prove Yourself!! Audio version of the podcast: https://thecyberwire.com/podcasts/the-faik-files/37/notes YouTube Version: https://youtu.be/m4TYB40oThg?si=AqzkaqHqD3QBXLLu Link to my Google VEO 3 experiment, "The Sandwich Incident: https://youtu.be/DvsFm1XII6U Learn more about your ad choices. Visit megaphone.fm/adchoices

Feel First, Think Never: Your Emotions Are the Exploit
If it made you panic, rage, or rush… it probably bypassed your cognitive defenses. In the latest issue of Deceptive Minds, I dig into the dark cognitive malware of emotional hijacking: how scammers, manipulators, and even well-meaning voices use fear, urgency, outrage, and hope to short-circuit your critical thinking. Inside: 🧠 Why your emotions beat your rational mind to the punch 📞 How scam messages and panic phishing bypass logic 📣 What viral rage-bait and fear-mongering have in common 🔥 Plus: how a single fire reshaped a nation — and how the “lie that felt true” still outperforms facts today The stronger the feeling, the weaker the scrutiny. Want the print version? It's available on LinkedIn or my website. References: The Great Moon Hoax: https://blogs.loc.gov/folklife/2014/08/the-great-moon-hoax/ Moon Shot: Race, a Hoax, and the Birth of Fake News: https://www.newyorker.com/books/page-turner/moon-shot-race-a-hoax-and-the-birth-of-fake-news The True Story of the Reichstag Fire and the Nazi Rise to Power: https://www.smithsonianmag.com/history/true-story-reichstag-fire-and-nazis-rise-power-180962240/ The Missile Gap: https://en.wikipedia.org/wiki/Missile_gap Episode 26 of The FAIK Files: Listen here: https://thecyberwire.com/podcasts/the-faik-files/36/notes Watch here: https://youtu.be/2slM09Czy_s?si=D3ZotFEef3zdGbZA Anthropic's Claude 4 Attempts to Blackmail a Researcher: Claude 4 System Card: https://www-cdn.anthropic.com/6be99a52cb68eb70eb9572b4cafad13df32ed995.pdf Something Wild Happens If AI Looks Through Your Emails and Discovers You're Having an Affair: https://futurism.com/ai-email-affair Learn more about your ad choices. Visit megaphone.fm/adchoices

Too Easy to Be True: The Fluency Trap and the Lie That Slides Right Past You
Some lies try hard to fool you. Others just make it easy for you to believe them. That’s the danger of cognitive fluency: the simpler something feels, the more likely we are to think it’s true. In the latest issue of Deceptive Minds, I explore: Why fake documents with grainy photos often seem more real than verified ones How anti-intellectualism and slogan-based disinfo campaigns thrive on fluency bias And what makes even seasoned professionals fall for staged “leaks,” forged letters, and photo ops 💡 The truth can feel complex and overwhelming. But, the best deceptions...are frictionless. Want to check out the print version? You can get here as a LinkedIn newsletter. Or you can subscribe to the email version on my website: https://TheDeceptionProject.com Anything you'd like me to cover in a future edition? Stay sharp, — Perry hello [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

The Plausibility Effect
Hey friends, Let’s start with a weird truth: People don’t fall for things because they’re true. They fall for things because they’re plausible. That’s the dark magic of deception — it doesn’t need to be airtight, or flawless, or even particularly clever. It just needs to feel true enough. Something your brain can accept without asking too many questions. Welcome to the Plausibility Effect — the sneaky cognitive glitch that powers scams, fuels misinformation, and makes even the dumbest conspiracies stubbornly sticky. Want to check out the print version? You can get here as a LinkedIn newsletter. Or you can subscribe to the email version on my website: https://TheDeceptionProject.com Anything you'd like me to cover in a future edition? Stay sharp, — Perry hello [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

👁️ Look Here: Why Every Great Deception Starts with Stolen Attention
Welcome to issue #3 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. In this week's episode: 🚨 Your attention is under attack! 🚨 From WWII rubber tanks to 2023’s phantom Paris bedbugs, the first strike of any scam is the same: steal your gaze, shape your reality. This issue of Deceptive Minds is all about “attention theft”—how con-artists, phishers, and AI-powered tricksters hijack that split-second between stimulus and thought…and what to do about it. 🕵️♂️🗞️I NSIDE: Operation Fortitude’s audacious distraction playbook The modern attention-hijack toolkit (urgency, authority, AI personalization) Fast-action defenses to keep your cognitive perimeter intact ... and a few other fun items from the past week! Listen now: turn the tables on the impostors, and guard the one resource every attacker wants first: your focus. Want to check out the print version? You can get here as a LinkedIn newsletter. Or you can subscribe to the email version on my website: https://TheDeceptionProject.com Anything you'd like me to cover in a future edition? Stay sharp, — Perry hello [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

Artifacts of Deception (Deceptive Minds - issue #2)
Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥 Huge thanks to everyone who's jumped in early! This week, I'm diving into what I call the “artifacts of deception,” and why the flashy stuff (deepfakes, fake emails, cloned voices) isn’t the real trick you need to watch for. Hope you enjoy this exploration into the hidden mechanics of how deception *really* works. Here we go… — Perry The Deception Project Learn more about your ad choices. Visit megaphone.fm/adchoices

Deceptive Minds (the audio experience): Issue #1
Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do about it. In other words, it's the exact right newsletter for the 8th Layer Insights audience. So for the next little bit at least, I'm going to post these audio newsletters into the 8Li feed -- exactly where you are right now. We'll see if it grows into something else or if it fades into oblivion. But regardless, I hope you enjoy it while it's here. So with that, let's get to episode one... or I guess I should call it issue number one of Deceptive Minds, the audio newsletter, If you're interested in the print version, it's a LinkedIn newsletter and you can also subscribe on my new website, The Deception Project, at https://thedeceptionproject.com. So, regardless of your format of choice, unless you want to see my face reading this on video, you can get the audio version right here or you can read the print version on LinkedIn or in an email that will make its way to your inbox and hopefully not to your spam filter. With that, let's go ahead and get to issue number one. Thanks! Perry Learn more about your ad choices. Visit megaphone.fm/adchoices

The FAIK Files | Holiday Special: AI Safety Update
bonusNote: We're posting Perry's new show, "The FAIK Files", to this feed through the end of 2024. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. In our holiday episode, Mason opens a rather unique Christmas present from Perry, we invite a special guest to help explain the infamous "Paperclip Maximizer" thought experiment, and we discuss an interesting (and somewhat disturbing) new AI Safety paper from Apollo Research. Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK You can also join our Discord server here: https://discord.gg/cThqEnMhJz *** NOTES AND REFERENCES *** An interesting cluster of new AI safety research papers: Apollo research: Frontier Models are Capable of In-context Scheming (Dec 5, 2024) YouTube Video: Apollo Research - AI Models Are Capable Of In Context Scheming Dec 2024 YouTube Video: Cognitive Revolution - Emergency Pod: o1 Schemes Against Users, with Alexander Meinke from Apollo Research OpenAI o1 System Card (Dec 5, 2024) Anthropic: Alignment Faking in Large Language Models (Dec 18, 2024) Anthropic: Sycophancy to subterfuge: Investigating reward tampering in language models (June 17, 2024) Fudan University: Frontier AI systems have surpassed the self-replicating red line (Dec 9, 2024) Other Interesting Bits: The Paperclip Maximizer thought experiment explanation Theory of Instrumental Convergence iPhone Game: Universal Paperclips VoxEU: AI and the paperclip problem Real Paperclips! 500 Pack Paper Clips (assorted sizes) OpenAI Announces New o3 Reasoning Model: OpenAI's "12 Days of Ship-mas" announcement page YouTube video: OpenAI's announcement of their o3 Model TechCrunch: OpenAI announces new o3 models Wired: OpenAI Upgrades Its Smartest AI Model With Improved Reasoning Skills TechCrunch: OpenAI trained o1 and o3 to ‘think’ about its safety policy Matthew Berman YouTube video: OpenAI Unveils o3! AGI ACHIEVED! NewScientist: OpenAI's o3 model aced a test of AI reasoning – but it's still not AGI Yahoo Finance: OpenAI considers AGI clause removal for Microsoft investment *** THE BOILERPLATE *** About The FAIK Files: The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions (Amazon Associates link) Check out the website for more info: https://thisbookisfaik.com Check out Perry & Mason's other show, the Digital Folklore Podcast: Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458 Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA Other: https://digitalfolklore.fm Want to connect with us? Here's how: Connect with Perry: Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter Perry on X: https://x.com/perrycarpenter Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social Connect with Mason: Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/ Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com Learn more about your ad choices. Visit megaphone.fm/adchoices

The FAIK Files | The Butcher Will Scam You Now
bonusNote: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. Warning: today's episode gets a bit dark as we chat with seasoned prosecutor and founder of Operation Shamrock, Erin West, about a devastating combination of attacks known as "Pig Butchering" scams. We go deep into how they work and what we can do about them. Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK You can also join our Discord server here: https://discord.gg/cThqEnMhJz *** NOTES AND REFERENCES *** Learn more about Erin West Erin's LinkedIn Profile Operation Shamrock Pig Butchering Scams: CNN Story featuring Erin West: Killed by a scam: A father took his life after losing his savings to international criminal gangs. He’s not the only one CNN Story: Hear how this man lost $1M in a 'pig butchering' crypto scam CNN Story: Myanmar-based gangs force trafficking victims to scam Americans online YouTube video: John Oliver episode FBI Internet Crime Complaint Center (IC3) Ok, doomer! Let's talk P(doom): NY Times article: Silicon Valley Confronts a Grim New A.I. Metric FastCompany article: P(doom) is AI's latest apocalypse metric. Here's how to calculate your score Wikipedia Entry PauseAI P(doom) records *** THE BOILERPLATE *** About The FAIK Files: The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions (Amazon Associates link) Check out the website for more info: https://thisbookisfaik.com Check out Perry & Mason's other show, the Digital Folklore Podcast: Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458 Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA Other: https://digitalfolklore.fm Want to connect with us? Here's how: Connect with Perry: Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter Perry on X: https://x.com/perrycarpenter Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social Connect with Mason: Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/ Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com Learn more about your ad choices. Visit megaphone.fm/adchoices

The FAIK Files | AI Gone Wild: Worrisome Leaks, Misguided Conspiracies, and More
Note: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. Welcome back to The FAIK Files--- the show about artificial intelligence and natural nonsense! In this week's episode: Mason shares how ChatGPT became an unexpected hero in solving his home networking and studio challenges Perry dives into the mysterious case of "David Mayer" and how a simple ChatGPT privacy patch sparked widespread conspiracy theories We explore Tencent's bold entry into AI video generation with their open-source HunyuanVideo model And in our AI Dumpster Fire of the Week, we unpack the drama surrounding leaks of multiple models from OpenAI Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK You can also join our Discord server here: https://discord.gg/cThqEnMhJz *** NOTES AND REFERENCES *** The ChatGPT Privacy Patch Conspiracy: TechCrunch: Why does the name 'David Mayer' crash ChatGPT? OpenAI says privacy tool went rogue FastCompany: The Internet is Freaking Out Because ChatGPT Won't Say the Name "David Mayer" USA Today: Why won't ChatGPT acknowledge the name David Mayer? Internet users uncover mystery YouTube: Solved: Why ChatGPT Will Not Say "David Mayer" The Decoder: New York Times writer exposes how AI models can be fooled by invisible text on websites NYT: How Do You Change a Chatbot's Mind? Tencent's HunyuanVideo Release: The Decoder: Tencent introduces open source video generator HunyuanVideo and challenges Sora TechNode: Tencent launches and open-sources Hunyuan video-generation model YouTube: New AI Video Model Storms Onto The Scene! HuggingFace: HunyuanVideo Official Model Page Research paper about text based sound generation for videos. SonicVisionLM: Playing Sound with Vision Language Models AI Dumpster Fire of the Week (The Sora Leak): TechCrunch: OpenAI's Sora video generator appears to have leaked Washington Post: OpenAI hits pause on video model Sora after artists leak access in protest Tom's Guide: OpenAI's o1 model leaked on Friday and it is wild — here's what happened Leopold Aschenbrenner: SITUATIONAL AWARENESS: The Decade Ahead Additional Sora leak from internal preview *** THE BOILERPLATE *** About The FAIK Files: The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions (Amazon Associates link) Check out the website for more info: https://thisbookisfaik.com Check out Perry & Mason's other show, the Digital Folklore Podcast: Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458 Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA Other: https://digitalfolklore.fm Want to connect with us? Here's how: Connect with Perry: Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter Perry on X: https://x.com/perrycarpenter Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social Connect with Mason: Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/ Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com Learn more about your ad choices. Visit megaphone.fm/adchoices

The FAIK Files | A Hunch about Hutch
bonusNote: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. Welcome back to The FAIK Files— the show about artificial intelligence and natural nonsense! In this week’s episode: Mason has an update on last week's shocking story of Google Gemini’s alleged threats against a user. Is this a glitch, a hack, or something more sinister? We sit down with cybersecurity expert Justin “Hutch” Hutchins (author of The Language of Deception) to dive into his experience weaponizing large language models and what it means for the future of AI. And finally, we lighten things up with some fun AI music experiments, showing that Perry & Mason may have too much time on their hands, Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK You can also join our Discord server here: https://discord.gg/cThqEnMhJz *** NOTES AND REFERENCES *** Hutch's stuff: Justin's Book: The Language of Deception: Weaponizing Next Generation AI AI podcast: The Frontier Today (Apple Podcasts) (Spotify) Justin and Len Noe’s podcast: Cyber Cognition (Apple Podcasts) (Spotify) RSA Conference talk: Autonomous Hacking Systems - Future Risk or FUD Houston Security Conference talk: This is how we lose control - Focused on the catastrophic/societal risks - P(Doom) Mason's update on theories about Google Gemini threatening people: AI Didn’t Threaten Humanity—The Media Did: Breaking Down the Gemini Incident LLM Context Windows Lost in the Middle: How Language Models Use Long Contexts Attention Sorting Combats Recency Bias in Long Context Large Language Models Cognitive Overload Attack: Prompt Injection for Long Context Suno and Generative AI Music Generation: Suno Udio Whispers in the Static (full song generated on Suno) Experimental outro from today's episode (Suno) Wired: US Record Labels Sue AI Music Generators Suno and Udio for Copyright Infringement Soundiiz Blog: The music industry is at war against AI: Suno and Udio’s case *** THE BOILERPLATE *** About The FAIK Files: The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions (Amazon Associates link) Check out the website for more info: https://thisbookisfaik.com Check out Perry & Mason's other show, the Digital Folklore Podcast: Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458 Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA Other: https://digitalfolklore.fm Want to connect with us? Here's how: Connect with Perry: Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter Perry on X: https://x.com/perrycarpenter Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social Connect with Mason: Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/ Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com Learn more about your ad choices. Visit megaphone.fm/adchoices

The FAIK Files | Consciousness, Scams, & Death Threats
bonusNote: We're posting Perry's new show, "The FAIK Files", to this feed through the end of the year. This will give you a chance to get a feel for the new show and subscribe to the new feed if you want to keep following in 2025. Happy FAIKs-giving everyone! Welcome to the newly renovated and relaunched FAIK Files podcast. On this week's episode, Perry & Mason cover Anthropic's recent hiring of an employee focused on AI well-being, an AI grandmother from hell (for scammers), and Google's Gemini chatbot allegedly tells a user what it really thinks of them. Welcome back to the show that keeps you informed on all things artificial intelligence and natural nonsense. Want to leave us a voicemail? Here's the magic link to do just that: https://sayhi.chat/FAIK You can also join our Discord server here: https://discord.gg/cThqEnMhJz *** NOTES AND REFERENCES *** AI Wellbeing: Anthropic has hired an 'AI welfare' researcher:https://www.transformernews.ai/p/anthropic-ai-welfare-researcher It’s time to take AI welfare seriously: https://www.transformernews.ai/p/ai-welfare-paper Taking AI Welfare Seriously: https://arxiv.org/pdf/2411.00986 The problem of sycophancy in AI: Suckup software: How sycophancy threatens the future of AI: https://www.freethink.com/robots-ai/ai-sycophancy Towards Understanding Sycophancy in Language Models:https://arxiv.org/pdf/2310.13548 AI Interpretability: Mapping the Mind of a Large Language Model: https://www.anthropic.com/news/mapping-mind-language-model Lex Fridman podcast interview with Dario Amodei, Amanda Askell, & Chris Olah: https://youtu.be/ugvHCXCOmm4 Deceptive and self-serving tendencies in AI systems: Sycophancy to subterfuge: Investigating reward tampering in language models: https://www.anthropic.com/research/reward-tampering OpenAI o1 System Card: https://openai.com/index/openai-o1-system-card/ Announcing our updated Responsible Scaling Policy: https://www.anthropic.com/news/announcing-our-updated-responsible-scaling-policy AI Grandmother from Hell (for scammers): Phone network employs AI "grandmother" to waste scammers' time with meandering conversations: https://www.techspot.com/news/105571-phone-network-employs-ai-grandmother-waste-scammers-time.html YouTube video of Daisy: https://www.youtube.com/watch?v=RV_SdCfZ-0s AI Dumpster Fire of the Week (Gemini tells an end user what it really thinks about him): Article: https://people.com/ai-chatbot-alarms-user-with-unsettling-message-human-please-die-8746112 Gemini interaction: https://gemini.google.com/share/6d141b742a13 *** THE BOILERPLATE *** About The FAIK Files: The FAIK Files is an offshoot project from Perry Carpenter's most recent book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Get the Book: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions (Amazon Associates link) Check out the website for more info: https://thisbookisfaik.com Check out Perry & Mason's other show, the Digital Folklore Podcast: Apple Podcasts: https://podcasts.apple.com/us/podcast/digital-folklore/id1657374458 Spotify: https://open.spotify.com/show/2v1BelkrbSRSkHEP4cYffj?si=u4XTTY4pR4qEqh5zMNSVQA Other: https://digitalfolklore.fm Want to connect with us? Here's how: Connect with Perry: Perry on LinkedIn: https://www.linkedin.com/in/perrycarpenter Perry on X: https://x.com/perrycarpenter Perry on BlueSky: https://bsky.app/profile/perrycarpenter.bsky.social Connect with Mason: Mason on LinkedIn: https://www.linkedin.com/in/mason-amadeus-a853a7242/ Mason on BlueSky: https://bsky.app/profile/pregnantsonic.com Learn more about your ad choices. Visit megaphone.fm/adchoices

FAIK Miniseries (sneak peek) | Chapter 3: The Mindset and Tools of a Digital Manipulator
bonusThis is Part Three of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Check out the website for more info: https://thisbookisfaik.com Voice credits for the opening "Whispers from the Static": Kayla Temshiv This is the last episode we are publishing in this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes. Links to the show: Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321 Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ All others: https://www.buzzsprout.com/2409237 Learn more about your ad choices. Visit megaphone.fm/adchoices

FAIK Miniseries (sneak peek) | Chapter 2: New Frontiers of Deception: AI and Synthetic Media
bonusThis is Part Two of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Check out the website for more info: https://thisbookisfaik.com We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes. Links to the show: Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321 Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ All others: https://www.buzzsprout.com/2409237 Learn more about your ad choices. Visit megaphone.fm/adchoices

FAIK Miniseries (sneak peek) | Chapter 1: The Eternal Battle for the Mind
bonusThis is Part One of a ten-part miniseries exploring Perry Carpenter's latest book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Each episode kicks off with a dramatized reading of the "Whispers from the Static" vignette that opens the chapter, followed by an in-depth conversation with Perry Carpenter and Mason Amadeus, where they unpack the chapter's themes and real-world implications. Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Check out the website for more info: https://thisbookisfaik.com We'll be posting episodes 1 through 3 on this feed. If you enjoy The FAIK Files, be sure to follow the show's feed so you don't miss out on future episodes. Links to the show: Apple Podcasts: https://podcasts.apple.com/us/podcast/the-faik-files-decoding-ai-deception/id1771521321 Spotify: https://open.spotify.com/show/7CGEktxUQAbgwQaWB922Ip?si=9-NazIazRgKCDXudoGwAdQ All others: https://www.buzzsprout.com/2409237 Learn more about your ad choices. Visit megaphone.fm/adchoices

S5 Ep 10Digital Mindhunters
In this conversation, Perry sits down with Dr. Bilyana Lilly to discuss her new book Digital Mindhunters (Coming Oct 30) and the intersection of cybersecurity, disinformation, and AI. She describes the narrative structure of her book, navigating a world of cyber threats and influence operations, and the evolving landscape of disinformation with AI amplifying threats. Dr. Lilly emphasizes the importance of awareness and education in combating misinformation and highlights the global threats posed by countries like Russia and China. Guests: Dr. Bilyana Lilly (LinkedIn) (Twitter) References: Digital Mindhunters, by Dr. Bilyana Lilly (Amazon Associates Link) EU vs. Disinfo website International Fact-Checking Network (IFCN) Code of Principles Quote Origin: A Lie Can Travel Halfway Around the World While the Truth Is Putting On Its Shoes SE Community John Henry competition (where Perry's AI bot was able to compete!) [PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing Perry's LinkedIn post talking about the competition results Perry's Books (Amazon Associate Links) NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Book website: https://thisbookisfaik.com Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

S5 Ep 9Let's talk Social Engineering
In this episode, Perry catches-up with Stephanie (Snow) & JC Carruthers. They talk about social engineering, the DEFCON Social Engineering Community / Village, and share their favorite (and most embarrassing) social engineering stories. Perry also gives a quick update on his recent exploits entering an AI chatbot into the Social Engineering Village CTF, speaking at the DEFCON AI Village, and the release of his new book, FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions. Guests: Stephanie (Snow) Carruthers: (LinkedIn) (Twitter) JC Carruthers: (LinkedIn) (Twitter) References: Social Engineering Community website SE Community twitter page SE Community John Henry competition (where Perry's AI bot was able to compete!) [PROVED] Unsuspecting Call Recipients Are Super Vulnerable to AI Vishing Perry's LinkedIn post talking about the competition results Perry's Books (Amazon Associate Links) NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Book website: https://thisbookisfaik.com Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

S5 Ep 8What About Ethics?
On this episode, Perry gets to sit down with Ed Skoudis to discuss the simplicity and complexities of cybersecurity ethics. Ed's new book is The Code of Honor: Embracing Ethics in Cybersecurity. Guest: Ed Skoudis (LinkedIn) (Twitter) (Website) Books and References: The Code of Honor: Embracing Ethics in Cybersecurity, by Paul J. Maurer and Ed Skoudis The Mysterious Case of Rudolf Diesel: Genius, Power, and Deception on the Eve of World War I, by Douglas Brunt The Cybersecurity Code (downloadable): https://www.montreat.edu/cybersecurity-code/ The Code of Honor book page YouTube Video: Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 2023 Perry's Books (Amazon Associate Links) NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Book website: https://thisbookisfaik.com Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

S5 Ep 7Can You Really Tell if Something is Written by an AI?
On this episode, Perry gets to sit down with Jon Gillham. Jon is the founder and CEO of Originality.ai -- an AI content detection platform designed to help website owners, content marketers, writers and publishers hit 'publish' with integrity in the world of generative AI. In this interview, we get the lowdown on how AI content detection works, what it is good at, and where some of the current limits are. Guest: Jon Gillham (LinkedIn) (Twitter) (Website) Books and References: AI Content Detector Accuracy Review + Open Source Dataset and Research Tool, Originality.ai blog post Is Using AI Tools the Same as Plagiarizing? A Legal Perspective, Originality.ai blog post Empirical Study of AI-Generated Text Detection — Results as per An Empirical Study of AI-Generated Text Detection Tools, Originality.ai blog post A Survey on LLM-Generated Text Detection: Necessity, Methods, and Future Directions LLM-as-a-Coauthor: The Challenges of Detecting LLM-Human Mixcase Perry's Books (Amazon Associate Links) NEW BOOK (Oct 1, 2024): FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

S5 Ep 6Money Laundering 101: a chat with Investigative Journalist Geoff White
On this episode, Perry gets to sit down with investigative journalist, author, and podcaster, Geoff White. They discuss Geoff's new book, "Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks", the state of global cybercrime, and (everybody's favorite topic) artificial intelligence. Guest: Geoff White (LinkedIn) (Twitter) Books and References: Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks, by Geoff White RinsedGPT -- Generative AI questions/answers from the book, Rinsed The Lazarus Heist: Based on the hit podcast, by Geoff White Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global, by Geoff White The Lazarus Heist podcast (BBC) YouTube video: Three Key Types of Cybercriminals, by Geoff White Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

S5 Ep 5Communicating Complex Topics with Creativity and Passion
In this episode, Perry sits down with award winning cybersecurity author, George Finney to discuss his recent book, Project Zero Trust. This is a broad discussion that hits on the concepts of Zero Trust, George's approach to writing the book, his passion for storytelling, and much more. Guest: George Finney (LinkedIn) (Website) Books and References: Project Zero Trust: A Story about a Strategy for Aligning Security and the Business, by George Finney Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future, by George Finney The history and evolution of zero-trust security, TechTarget Wikipedia: Zero Trust Security Model Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices

S5 Ep 4How Rachel Tobac Hacked Me
In this episode Perry Carpenter sits down with Rachel Tobac to debrief after her recent KB4-CON session, "How I'd Hack You Live" where she... well... hacked Perry live. Perry and Rachel explore how age-old deception techniques are being revamped for the digital age. The discussion spans the future of social engineering, the increasing role of AI in security, and a few other fun bits. Guest: Rachel Tobac (LinkedIn) (Twitter / X) (Website) Books and References (Books are Amazon Associate Links and help support the show): KB4-CON 2024 Main Stage Sessions (Registration required) Deepfake scammer walks off with $25 million in first-of-its-kind AI heist, Ars Technica The Social Engineer's Playbook: A Practical Guide to Pretexting, by Jeremiah Talamantes The Art of Deception: Controlling the Human Element of Security, by Kevin Mitnick YouTube video: 60 minutes Here’s how I used AI to clone a 60 Minutes correspondent’s voice to trick a colleague YouTube video: It Was Easy to Hack a Billionaire YouTube video: Inside the Mind of an Ethical Hacker Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S5 Ep 3How AI Can Deceive and be Deceived
On this episode Perry sits down with Dr. Matthew Canham to explore ways in which AI can be weaponized against us, and how age old social engineering tactics can be used to trick large language models. Guest: Dr. Matthew Canham (LinkedIn) (Website) Books and References (Books are Amazon Associate Links and help support the show): Cognitive Security Institute YouTube Channel Cognitive Security Institute website YouTube video: BlackHat Presentation -- Me and My Evil Digital Twin: The Psychology of Human Exploitation by AI Assistants YouTube video: NEW AI Jailbreak Method SHATTERS GPT4, Claude, Gemini, LLaMA Not with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them, by Ram Shankar Siva Kumar & Hyrum Anderson Six Thinking Hats, the de Bono Group Six Thinking Hats: Looking at Decision in Different Ways, MindTools AI + Six Thinking Hats, LifeArchitect.ai 8Li Season 4, episode 10: Artificial Intelligence Insights & Oddities Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S5 Ep 2Frame the Future: The Art of Becoming a Futurist
On this episode Perry sits down with Jeremy Treadwell, a people-first technologist and futurist, to get the lowdown on how a futurist approaches the world. Guest: Jeremy Treadwell (LinkedIn) (Twitter) Books and References (Books are Amazon Associate Links and help support the show): YouTube Video: What UX/UI Taught Me about Improving Security Awareness [SANS Security Awareness Summit 2022], Jeremy Treadwell YouTube Video: Reimagine the Future of Data, Privacy + Security with Technologist Jeremy Treadwell The Institute for the Future website Four Questions to Turn Everyone in Your Company Into a Futurist, FastCompany article How Does a Futurist See the Future, LinkedIn Article by Jacob Morgan The Black Swan: Second Edition: The Impact of the Highly Improbable: With a new section: "On Robustness and Fragility", by Nassim Nicholas Taleb The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore, by Michele Wucker William Gibson’s Future Is Now, Pagan Kennedy, the New York Times 8Li Season 1, episode 8: The Risk Episode: Black Swans, Grey Rhinos, Angels & Demons Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S5 Ep 1How to Scam a Romance Scammer
Welcome to season 5 of 8th Layer Insights! To celebrate Valentine's Day, Perry sits down with Emmy winning reporter Kerry Tomlinson to talk about the time she turned the tables on a romance scammer. Guest: Kerry Tomlinson (LinkedIn) (Website) (YouTube) Books and References: YouTube video: Inside a romance scam: how to make a catfisher sing YouTube video: Scammers are stealing people's faces for live video calls National Cybersecurity Alliance : Online Romance and Dating Scams National Cybersecurity Alliance : Romance Scams Resource Kit Federal Trade Commission: Romance scammers’ favorite lies exposed Know Your Meme: On the Internet, Nobody Knows You're A Dog ‘NOBODY KNOWS YOU’RE A DOG’: As iconic Internet cartoon turns 20, creator Peter Steiner knows the joke rings as relevant as ever Wikipedia: On the Internet, nobody knows you're a dog Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 10Artificial Intelligence: Insights & Oddities
On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief. Guests: Brandon Karpf, Vice President at N2K Networks (LinkedIn) (Website) Dr. Lynne S. McNeill, Associate Professor at Utah State University (LinkedIn) (Twitter) Dr. John Laudun, Professor at University of Louisiana at Lafayette (LinkedIn) (Twitter) (Website) Lev Gorelov, Research Director at Handshake Consulting (LinkedIn) (Twitter) (Website) Resources Interview with the AI, part one, by the Brandon Karpf / the CyberWire 'Hard Fork': An Interview With Sam Altman, by The New York Times The Exciting, Perilous Journey Toward AGI, Ilya Sutskever TED Talk Ilya: the AI scientist shaping the world, by The Guardian Meet Loab, the AI Art Woman Haunting the Internet: Is she a demon? A Cryptid? Or nothing at all..., the Guardian In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation The bot learned language from people on Twitter—but it also learned values, IEEE Spectrum Perry's Digital Folklore episode about AI Handshake's Generative AI Masterclass on Maven Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news. Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
Technology and the Law of Unintended Consequences (Encore)
bonusLet's face it. Most of us have a love/hate relationship with technology and technological advances. We dream about the new thing... but when it arrives, we are usually a little disappointed. Many of us also lament the constant erosion of privacy, the changes in social norms, and more. And, little-by-little, we allow those aspects of new technology to make us numb. We accept the cognitive dissonance of not totally being happy with the trade-offs; yet we still make the trade. In this episode, we explore a few of the positives and some of the unintended consequences associated with recent technological advancements. We'll hear from Dr. Lydia, Kostopoulos, Dr. Charles Chaffin, Andra Zaharia, and Aaron Barr. Guests: Dr. Lydia Kostopoulos (LinkedIn) (Website) Dr. Charles Chaffin (LinkedIn) (Website) Andra Zaharia (LinkedIn) (Website) Aaron Barr (LinkedIn) (Website) Books and Resources: IEEE Article: Decoupling Human Characteristics from Algorithmic Capabilities by Dr. Lydia Kostopoulos Numb: How the Information Age Dulls Our Senses and How We Can Get them Back by Dr. Charles Chaffin (Amazon Associate Links) The Numb Podcast by Dr. Charles Chaffin The Cyber Empathy Podcast by Andra Zaharia Reminder: Your 'smart AI' often involves a low-paid contractor surveilling you How creepy is your smart speaker? Newton's Laws of Motion Unintended Consequences Elon Musk's warning regarding AI Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter (Amazon Associate Link) Everything is Alive podcast by PRX and Radiotopia Production Credits: Additional voice talent provided by Kristina Leigh. Additional research by Nyla Gennaoui. Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: hello [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 9Cybersecurity First Principles w/Rick Howard
On today's show, Perry sits down with Rick Howard to discuss Rick's new book and the concept of "First Principles" as they apply in the domain of cybersecurity. Rick Howard is the CSO of N2K and the Chief Analyst, and Senior Fellow at the N2K Cyber, formerly CyberWire. His past lives include CSO at Palo Alto Networks, CISO at TASC, the GM at Verisign/iDefense, the Counterpane SOC Director, and the Commander of the Army's Computer Emergency Response Team (CERT). Rick served 25 years in the Army, taught computer science at West Point, and recently published , "Cybersecurity First Principles: A Reboot of Strategy and Tactics." Guest: Rick Howard (LinkedIn) Rick's book, podcasts, and other stuff Cybersecurity First Principles: A Reboot of Strategy and Tactics (Amazon Associate link) Promo video for Rick's Cybersecurity First Principles video course CSO Perspectives Podcast Word Notes Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news. Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 8OSINT, Curiosity, Creativity, & Career Pivots: A Conversation with Rae Baker
If you’ve been listening to this show for a while, you’ll know that we’ve touched on the topic of Open Source Intelligence (otherwise known as OSINT) several times. It is an area of information security that penetration testing that’s been getting quite a bit of attention over the past several years. When you think about the digital world we live in, where we have a proliferation of personal, organizational, and governmental data on the internet...and the simple fact that data likes to leak…we can safely predict that OSINT investigation techniques will continue to be in demand. On this episode, Perry sits down with Rae Baker. Rae is the author of the book Deep Dive: Exploring the Real-world Value of Open Source Intelligence, which was released in April of this year from Wiley publishing. In this discussion with Rae, you’ll hear a bit about her career pivot to OSINT specialist from being a graphic designer, how creativity fuels her job, advice for aspiring cybersecurity and OSINT professionals, and a lot more. Guest: Rae Baker (LinkedIn) (Twitter) (Website) Books and References: Deep Dive: Exploring the Real-world Value of Open Source Intelligence, by Rae Baker (Amazon Associate link) Kase Scenarios: https://kasescenarios.com/ The OSINT Curious project TraceLabs YouTube Playlist from the 2022 SANS OSINT Summit YouTube video by The Cyber Mentor: Learn OSINT in 4.5 Hours Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 7Conversational Security Awareness: Putting Humanity into Your Human Risk Management Program
Listen in as Perry Carpenter & Dr. Jessica Barker present their joint session, "Conversational Security Awareness" at the SANS Managing Human Risk Summit. ... and stay tuned after the presentation for a quick conversation between Perry, Jessica, and Lance Spitzner (SANS) as they discuss themes from this year's event. Guests: Dr. Jessica Barker (LinkedIn) (Twitter) Jeremy Treadwell (LinkedIn) (Twitter) Lance Spitzner (LinkedIn) (Twitter) Additional Resources: Jessica Barker's great blog post summarizing this session Jessica Barker's 2020 RSA Keynote Related 8Li Episodes: 8Li S1 E9: Security ABCs Part 1: Make Awareness Transformational 8Li S1 E10: Security ABCs Part 2: 8th Layer Insights and the Quest for Security Culture 8Li S2 E10: The Next Evolution of Security Awareness 8Li S4 E3: Carrots, Sticks, and Culture: The Art and Science of Social Signaling 8Li S4 E5: We are the Champions 8Li S4 E6: Blending Awareness, Social Engineering, and Physical Penetration Testing -- A Conversation with Jayson E. Street Relevant Books (Amazon Associate Links) Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career, by Jessica Barker Cybersecurity ABCs: Delivering awareness, behaviours and culture change by Jessica Barker, Adrian Davis, Bruce Hallas, & Ciarán Mc Mahon Mixed Signals: How Incentives Really Work, by Uri Gneezy Security Awareness Program Builder: Practical guidelines for building your Information Security Awareness Program & prep guide for the Security Awareness and Culture Professional (SACP)™ by Mark Majewski Perry's Books (Amazon Associate Links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: hello [at] 8thLayerInsights [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 6Blending Awareness, Social Engineering, and Physical Penetration Testing -- A Conversation with Jayson E. Street
On today's show, Perry sits down with Jayson E. Street to discuss his unique blend of social engineering, physical penetration testing, and security awareness. Jayson refers to this as being trained by a simulated adversary. At the heart of Jayson's method is intense boldness in his approach to social engineering and penetration testing coupled with an equally intense passion for helping his clients and their employees improve their overall security posture and mindsets. It's about education rather than exploitation. Guest: Jayson E. Street (LinkedIn) (Twitter) (Website) YouTube videos of Jayson 2022 Saintcon: Hacker Striptease Tomorrow Unlocked: Penetration tester Jayson E. Street helps banks by hacking them Risks & Reels: Who's a Hacker? Jasyon's book (Amazon Associate link) Dissecting the Hack: The V3rb0t3n Network Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news. Season 2 starts September 4, 2023. Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
How to Fool the White House (Encore)
bonusHey all! I'm at BlackHat and Defcon this week. If you're there, track me down. I'd love to meet you! This week's episode is an encore of one of my favorites. My interview with James Linton (a.k.a. The Email Prankster). In 2017, James went on a virtual joyride exploiting the ways that people interact with emails. One of the most interesting things about James' story is that his exploits didn't rely on any type of highly technical method(s); they were simple display name deceptions. But that didn't stop him from fooling CEOs from some of the worlds largest banks, celebrities, and high ranking staff members in the White House. James' success using these simple methods serves as a warning for us all. We don't fall for scams because they are technically sophisticated or because we are stupid. We fall for scams because we are human. Guest: James Linton (LinkedIn) (Website) Books and Resources: Anatomy Of An Email Impersonation Spree: Who Got Pranked And Why An email prankster is hitting the CEOs of the world's biggest banks How to Prank the Rich and Powerful Without Really Trying Morgan Stanley CEO James Gorman falls for email prank This Man Pranked Eric Trump And Harvey Weinstein — Now He Just Wants A Job Media Coverage YouTube Playlist James Linton -- Wikipedia Entry The Journal of Best Practices: A Memoir of Marriage, Asperger Syndrome, and One Man's Quest to Be a Better Husband by David Finch Perry -- Interview on Springbrook's Converge Autism Radio Perry -- Security Weekly Interview Perry Carpenter - The Aspies Guide to Social Engineering - DEF CON 27 Social Engineering Village Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, & Storyblocks. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: hello [at] 8thLayerInsights [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 5We are the Champions
There has been a lot of buzz for the past few years about the benefits and importance of establishing security champions programs. These are groups of people in your organization who become vital, responsible, and proactive contributing evangelists to the security culture of your organization. I often refer to them as "culture carriers." And, while there is general agreement that these are good programs to have, establishing them is currently a bit of a dark art. On today's show, Perry sits down with Sarah Janes of Layer 8 security to discuss the importance of champion programs and tease out a few best practices. Guest: Sarah Janes (LinkedIn) (Twitter) (Website) Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 4Something Wicked This Way Comes: PenTesting Your Environment w/Chad Peterson of NetSPI
On this episode, Perry sits down with Chad Peterson, Managing Director at NetSPI, to discuss the importance of penetration testing. We touch on aspects of social engineering, discussing complex security issues with Boards of Directors, the prevalence of Ransomware, and some of the unique challenges facing the healthcare industry. Guest: Chad Peterson (LinkedIn) (Twitter) Books & References (Books are Amazon Associate links) CISO Desk Reference Guide: A Practical Guide for CISOs by Bill Bonney, Gary Hayslip, & Matt Stamper Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray Ransomware Protection Playbook by Roger Grimes The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinosa Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Perry's new show, Digital Folklore kicked-off Jan 16, 2023. It's all about the oddities and importance of online culture. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 3Carrots, Sticks, and Culture: The Art and Science of Social Signaling
On this episode, what cybersecurity professionals need to understand about how social signaling and incentives really work. Today's episode features a conversation with Uri Gneezy. In the field of cybersecurity, we are very interested in identifying proactive and positive ways to encourage the behavior we want. That's where Uri comes in. Uri is a well-known behavioral economist and professor of economics and strategy in the Rady School of Management at the University of California at San Diego. Most of us recognize that many of our behaviors, beliefs, and values are caught rather than taught. So, if you are interested in developing a positive security culture in your workplace, then it’s important to understand the dynamics of how people both receive and signal their security-related beliefs and values so that associated behaviors become a natural result. Listen in as Perry sits down with Uri to discuss key findings from Uri's new book, Mixed Signals: How Incentives Really Work. This is a fascinating deep dive into Uri’s research that has immediate applicability for anyone needing to design programs that work with, rather than against, human nature. Guest: Uri Gneezy (LinkedIn) (Twitter) (Website) Books & References (Books are Amazon Associate links) Mixed Signals: How Incentives Really Work, by Uri Gneezy The Why Axis: Hidden Motives and the Undiscovered Economics of Everyday Life by Uri Gneezy & John List Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Perry's new show, Digital Folklore kicked-off Jan 16, 2023. It's all about the oddities and importance of online culture. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
Hacking the Paranormal -- a conversation with Banachek
bonusIn this episode, Perry Carpenter sits down with renowned mentalist and skeptic, Banachek. Banachek (Steve Shaw) grew up with a fascination in magic and a frustration with psychic frauds. As a teenager, he contacted magician and skeptic, James “The Amazing” Randi and ended up working with Randi on a special initiative known as Project Alpha, which set out to expose a general lack of objectivity in parapsychology research. Banachek served as the director for the James Randi Educational Foundation’s “One Million Dollar Paranormal Challenge” for 15 years and is now the President of the James Randi Educational Foundation. Perry and Banachek discuss Project Alpha, the ways of fake psychics and fraudulent faith healers, and issues associated with confirmation bias and framing effects. They also discuss Banachek’s new live mentalism show in Las Vegas, which incorporates theatrical mindreading and other mentalism effects along with a storyline that explores Banachek’s life, antics, and passion for critical thinking. Guest: Banachek (Website) (twitter): Mentalist (Performing in Las Vegas add 'social' for 30% off tickets), Skeptic, President of the James Randi Educational Foundation This episode also featured a quick comment from: George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security Books and References (Book links are 'Amazon Associate' links which help support the show): Brian Brushwood's podcast, World's Greatest Con Banachek Wikipedia entry Project Alpha Wikipedia entry James Randi Wikipedia entry Article about Houdini's efforts to debunk fake mediums The Discoverie of Witchcraft Wikipedia entry The Psychology of the Ouija Barnum Effect Wikipedia entry James Randi & Project Alpha Video Project Alpha lookback -- James Randi and Michael Edwards Psychological Subtleties vol 1, by Banachek Behind the Scenes with the Mediums, by David Abbott The Discoverie of Witchcraft Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter Music and Sound Effects by Blue Dot Sessions & Storyblocks. Artwork by Chris Machowski. Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 2What Cybersecurity Pros can Learn from Star Wars
This week's episode is a late Star Wars ("May the 4th Be With You") celebration. We check out a couple interesting articles about security-related lessons embedded in the Star Wars movies, and Perry sits down with Adam Shostack, author of the new book, Threats: What Every Engineer Should Learn From Star Wars to discuss threat modeling principles using Star Wars related examples. Guest: Adam Shostack (LinkedIn) (Twitter) (Website) Books & References (Books are Amazon Associate links) Threats: What Every Engineer Should Learn From Star Wars, by Adam Shostack Threat Modeling: Designing for Security, by Adam Shostack Threat modeling videos from Adam Threat modeling and security-related games by Adam Adam's whitepapers BlackPoint: Learn Their Lesson, They Did Not Gary Hibbard LinkedIn post Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Perry's new show, Digital Folklore kicked-off Jan 16, 2023. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news Voice Acting for this episode: Darth Vader voice over artist: https://business.fiverr.com/freelancers/mistercorley Darth Vader breathing sound: https://www.youtube.com/watch?v=MBi01iy2db8&ab_channel=chefhawk Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S4 Ep 1Postcards from the Intersection of Cybersecurity and Folklore
Welcome to season 4, episode 1 of 8th Layer Insights! On this episode, Perry speaks with Josiah Dykstra (Senior Fellow, Office of Innovation at the National Security Agency) about the new book he co-authored with Eugene Spafford and Leigh Metcalf. The book is titled Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, This topic coincides well with Perry's recent studies into folklore and urban legends for his other podcast, Digital Folklore. Guests: Josiah Dykstra (LinkedIn) (Twitter) (Website) Chelsey Weber-Smith (LinkedIn) (Twitter) (Website) Mason Amadeus (LinkedIn) (Twitter) (Website) Books & References (Books are Amazon Associate links) American Hysteria Podcast episode, Urban Legends in the Internet Wilderness with the Digital Folklore Podcast Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, by Eugene Spafford, Leigh Metcalf, and Josiah Dykstra Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems, by Josiah Dykstra Folklore 101: An Accessible Introduction to Folklore Studies, by Jeana Jorgensen Folklore Rules: A Fun, Quick, and Useful Introduction to the Field of Academic Folklore Studies, by Lynne S. McNeill Perry's Books (Amazon Associate links) Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Perry's new show, Digital Folklore kicked-off Jan 16, 2023. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. 8Li cover art by Chris Machowski @ https://www.RansomWear.net/. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
S3 Ep 10Season 3 finale: What's the deal with Authentication, MFA, and Password Managers?
For the last episode of season 3, I thought we'd talk about something that's been in the news quite a lot recently: Authentication and Password Managers. As security professionals, we've decried the password for decades. Multifactor authentication (MFA) has started to gain popularity... but not without its own issues. Security leaders and tech teams may have once again hoped for a silver bullet, only to be disappointed to find out that crafty attackers can easily bypass MFA. We've also been touting the benefits of Password Managers for quite a while. After all, in a world where most of us have to manage upwards of 200 passwords in a year, who can keep up? No human can have great password hygiene across all those accounts. But password managers also face their own problems as illustrated by a recent high-profile incident. Our guest today is Roger Grimes. He has a multi-decade cybersecurity career and is the author of 13 cybersecurity books, countless articles, and is a highly sought-after industry luminary. ... Oh -- and he has opinions. Listen in as Roger and I discuss the current state of authentication, MFA, password managers, and more. Guests: Roger Grimes (LinkedIn) (Twitter) Want to submit a question to have answered in a future episode? If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at https://www.speakpipe.com/8Li. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at [email protected]. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind. Books & References: Password Managers Can Be Hacked Lots of Ways and Yes, You Should Still Use One, by Roger Grimes Roger's Password Masterclass Roger's Hacking MFA presentation Hacking Multifactor Authentication, by Roger Grimes Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto, by Roger Grimes Ransomware Protection Playbook, by Roger Grimes A Data-Driven Computer Defense: A Way to Improve Any Computer Defense, by Roger Grimes Hacking the Hacker: Learn from the Experts Who Take Down Hackers, by Roger Grimes LastPass Security Incident, December 22, 2022 LinkedIn 2FA Hacking demo by Kevin Mitnick The Humane Interface: New Directions for Designing Interactive Systems, by Jef Raskin Wired Magazine Article -- The Best Password Managers to Secure Your Digital Life Perry's new show, Digital Folklore kicked-off Jan 16. Check out the website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, check out our merch, Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news Perry's Books Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer Production Credits: Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, & EpidemicSound. Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com. 8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/ Want to get in touch with Perry? Here's how: LinkedIn Twitter Instagram Email: perry [at] 8thLayerMedia [dot] com Learn more about your ad choices. Visit megaphone.fm/adchoices
Quick announcement and sneak peek of my new show: Digital Folklore
bonusHey all! An announcement and something special! First, the announcement: Here's your chance to participate in the final episode of 8Li season 3. If you’ve got a question or comment that you’d like me to try to answer or respond to, leave a voice message at https://www.speakpipe.com/8Li. Frankly, that would make it more engaging than if I just read your questions. But, if you aren’t able to record a message or don’t want your voice on the show, then you can email me your questions at [email protected]. I’d love to hear from you and answer any questions you have about my thoughts on security topics, creativity, online culture, podcasting… or anything else you have on your mind. Now for something special: Here's a quick 10 minute sneak peek from episode 1 of my new show, Digital Folklore. Season 1 kicks off Jan 16. This episode introduces us to two "monsters" who were birthed on the internet, but couldn't be contained there. Their names are Slenderman and Momo, and they are great examples of a few key folkloric concepts. So join us as we take a look at Slenderman and Momo and learn about ostension, monster theory, moral panics, and the defining traits that make something folklore as opposed to just a simple online expression of creativity. Guests appearing on the full episode include: Dr. Vivian Asimos, author of Digital Monsters and Digital Mythology and the Internet's Monster: The Slender Man Ben Brock Johnson, Amory Sivertson, and Quincy Walters from WBUR's podcast, Endless Thread Chelsey Weber-Smith, host of American Hysteria Kathleen Hale, author of Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Season 1 begins Jan 16, 2023. Subscribe or follow so you don't miss out! You can sign-up for our newsletter and learn more about the show at https://digitalfolklore.fm. Support the Digital Folklore Podcast on Patreon: https://patreon.com/digitalfolklore Find us on the socials: Twitter: @digiFolklorePod Facebook: DigitalFolklorePod Instagram: DigitalFolklorePod TikTok: digitalfolklore Thanks so much! Learn more about your ad choices. Visit megaphone.fm/adchoices