
Easy Prey
323 episodes — Page 5 of 7
Ep 123Attack Techniques Scammers Are Using with Joel Hollenbeck
Reusing passwords makes it easier for threat actors to gain access to your accounts. They may not actually be using it to take money. They may be impersonating you to scam others in your network. Today's guest is Joel Hollenbeck. Joel is a cyber security executive with over 25 years experience in multiple disciplines. He is the CTO at Check Point Software Technologies and leads a global team of cyber security experts dedicated to understanding the challenges that customers face and helping them stay ahead of the ever-evolving threat curve. Show Notes: [1:01] - Joel shares his background and his current role. [2:38] - Joel has teenagers at home and describes the challenges of communicating threats including one that wound up being an attack. [5:06] - His credit card company alerted him of fraud and he looked further into it. [6:29] - Threat actors have to constantly change up their tactics. [7:53] - The latest report shows that the number one brand that scammers are using is LinkedIn. They are trying to harvest accounts to get in under the radar. [9:06] - Brands themselves need to also be aware to keep their customers safe. [10:36] - Every major holiday, shopping event, or global event creates new opportunities for phishing attempts. [12:09] - Joel shares some of the information threat actors gather. [14:33] - A great many people don't trust SMS messages. [16:30] - The reuse of passwords has been proven to be a huge mistake. [18:37] - Chris shares an experience with a password reset issue. [20:28] - Social media companies do not have a public facing customer service line. [22:46] - On the other end of the spectrum, there is the issue of being overwhelmed by multi-factor authentication. [24:18] - Product links on social media are also something to be wary of. [25:37] - Think of it as a risk assessment and know that sometimes it will feel very cynical. [26:59] - You don't know if the person on the other end of a message is from the person you actually trust. [28:48] - Threat actors strive to gain access to high value accounts. [30:42] - Some LinkedIn or other social media account hacks, they will be used for simple phishing attacks. But some will be used for something very sophisticated. [33:06] - Awareness of these issues is critically important to try to stay ahead of scammers. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Joel Hollenbeck on LinkedIn Check Point Security Website
Ep 122Security Challenges and Risks with Robert Siciliano
All security is personal. It's important for each individual to understand the risk of predators so we can protect ourselves, our data, and our finances. Today's guest is Robert Siciliano. Robert is a security expert and private investigator, number 1 Amazon best-selling author of five books, and an architect of the CSI Protection Certification, a cyber-social identity and personal protection security awareness training program. He is a frequent speaker and media commentator and the CEO of Safr.me. Robert has been featured on CNN, Fox News, and in The Wall Street Journal. Show Notes: [1:02] - Robert shares his background and career, beginning with self-defense training in the 90's. [2:40] - At the start, Robert operated his business through a catalog and through live training. Once he offered credit card payments, he was hacked. [3:58] - There will always be a criminal element out there looking for a target. [5:01] - All security is personal, including both physical and virtual. [5:55] - Chris shares an experience of owning an online bookstore. [7:32] - Regardless of the value, there are people who are motivated to steal anything. [9:27] - Some people have the mentality that they don't have anything valuable to steal. Humans are born with the innate ability to trust. [11:31] - It is also human nature to lie. [12:52] - It is getting easier and easier for people to make fake social media profiles that are very believable. [14:52] - Every time someone reaches out to you, be suspicious. It's not paranoia. [16:55] - There are signs in communicating with others that may indicate that they are trying to do you harm. [18:20] - Most people are not doing even the basics of security. [19:30] - Some people believe that taking precaution is living in fear. [21:47] - Robert describes denial and why people live that way. [24:17] - Robert's career is built on selling the concept of security. [25:32] - There is no such thing as a safe neighborhood. [26:52] - Once we get the basics down, we can make advances in security. [28:35] - Most cyber security awareness training only includes content about phishing. This is to meet compliance but doesn't solve many problems. [30:18] - Security awareness makes it important to individuals. [32:12] - For many organizations and security companies, they treat security as business. [34:40] - Teaching security through fear is not effective. [36:00] - It is important to have uncomfortable conversations regarding security with your family from time to time. [37:16] - Robert explains the future impact of the Equifax data breach if security strategies have not changed for an individual. [40:25] - Robert has frozen his credit since 2008. [42:53] - The "Grandma Test" is asking yourself if something is manageable by everyone. [45:36] - Robert uses the example of wearing a seatbelt as decades long to make it the norm. [47:12] - CSI Protection is a 6 hour course that Robert offers that includes interaction with experts. [49:03] - These courses are geared towards those in the service industry. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Safr.me Protect Now LLC Website
Ep 121The Constantly Evolving Subject of Cyber Security with Stephen Cobb
There's always risk when using technology, but your perception of the exposure will determine how active you are at minimizing the danger. Today's guest is Stephen Cobb. Stephen is a best-selling author and award winning technologist with over 30 years experience in digital security and data privacy. He has authored more than a dozen textbooks on PC and LAN security as well as software usage. As a CISSP since 1996, he co-founded two successful security startups and earned a Master's in security and risk management. Stephen now researches harm caused by the abuse of digital technology. Show Notes: [1:02] - Stephen shares his background and how he wound up in the world of cyber security. [3:17] - In the earlier days of his career, he learned the niche of the risks of technology. [6:13] - Privacy violations were becoming a HIPPA category. [9:14] - Stephen shares more about the companies he worked for and his experience in cyber security. [10:44] - Stephen continues researching risk perception. [12:01] - Understanding the limits of technology and human behavior have helped guide his research. [13:02] - Covid was a very eye opening experience in that it revealed who was willing to exploit and who was willing to come together. [14:26] - The new ideas of solving problems are coming out of smaller companies. [15:41] - Growth of security is evolving but is it keeping up with the use and diversity of technology? [17:23] - Different countries have a different approach to tracking cyber crime. [19:05] - The data isn't accurate as much cyber crime goes unreported. [20:23] - Stephen believes the amount of monetary loss from cyber crime can be doubled in individual wellbeing. [21:41] - The effect of being targeted has led to health problems. [24:30] - Some countries are doing a better job cracking down on cyber crime, but many kinds of scams, particularly romance scams, continue to go unreported. [25:50] - Crypto currency has been abused since it's onset. [26:51] - Tech support scams are also going strong. [27:25] - Crypto scams are cumulative. They don't replace a scam, they add to existing ones. [31:48] - People aren't thinking about what a mess that malware will create in upcoming technology. [34:08] - Cyber crime is now organized crime. [37:04] - Stephen describes his experience showing NPR the industry of the Dark Web. [38:52] - People continue to be shocked and amazed by how organized the industry of cyber crime is. [40:10] - There has been a drop in enthusiasm and trust in technology companies from the general public. [44:10] - When we push technology on people who do not have a lot of experience with it, security becomes complicated and it becomes an ethical dilemma. [46:39] - Nothing has been done to make these ethical issues become morally reprimanded. [48:10] - Cyber crime is a huge challenge that is a relatively recent phenomenon. [50:40] - Although foreign scammers cannot be arrested in your country, Stephen still thinks they should be sought after. [52:08] - We need growing economies and full employment in all countries. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Stephen Cobb's Website Stephen Cobb's Twitter
Ep 120Corporate Spying with Robert Kerbeck
Corporate spies are regularly hired by competitors to help poach employees with the best ideas. Listen on to know if it is happening at your company and how to prevent it. Robert Kerbeck is the founder of Malibu Writers Circle and his essays have been featured in numerous magazines and newspapers including Los Angeles Times, San Francisco Chronicle, and Los Angeles Times Magazine with one story adapted in the award winning film Reconnected. His newest memoir Ruse: Lying the American Dream From Hollywood to Wall Street is a look at the world of corporate espionage and his career as a corporate spy. Show Notes: [1:08] - Robert never thought he would become an infamous corporate spy. He shares his background and what led him there. [3:42] - He was hired and realized it was not the ordinary marketing job he thought it would be. [4:46] - The job was determined to be in a "gray area" legally. [6:00] - A lot of Robert's job was over the phone trying to get information out of employees. [7:04] - Eventually, Robert would imitate major executives over the phone. [8:48] - A lot of the information gathered at the time was employment information. [10:07] - Some employees are not listed as team members to avoid being poached. [11:11] - Although so much data is available publicly online now, there are still pieces of valuable information that corporate spies can use. [12:49] - Corporate plans are valuable to competitors. [13:58] - In Robert's case, blackmail wasn't utilized, but rather poaching talent. [15:54] - Robert describes some of the information that he was gathering. He viewed himself as an actor. [17:38] - Sometimes the more outlandish something seems, in a strange way, it becomes more believable. [19:24] - In order to target the right person and use the right strategies, Robert had to do a lot of research on the companies he was contacting. [20:53] - There are certain areas in a firm where people aren't following company protocol. [22:17] - In the corporate world, there are qualities that create a toxic culture. [24:53] - There should be training in place to ensure that employees do not reveal information if they do not know the person. [26:18] - Once someone has access to an organizational chart, not only employee names are available. [29:02] - The more time spent trying to break a company for the information desired, a corporate spy is gathering small pieces of data. [31:23] - There are scams that are designed to target people who have previously been a victim of a scam. [32:04] - Robert explains that he never used these skills in his personal life. [33:12] - In 2008, jobs were harder to find and Robert left his career as a corporate spy. [35:41] - Robert describes his experience in Corporate America. [37:27] - Through his experiences, Robert says it was very nerve wracking to attend corporate events as somebody else. [38:46] - Find Robert's new book on his website. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Robert Kerbeck's Website Robert Kerbeck on Instagram Robert Kerbeck on Twitter
Ep 119Risk Review Helps Discover Weakness with Ralph Russo
If you are addressing the blindspots in your online security, you cannot prevent the costly impact of lost or hacked data. Today's guest is Ralph Russo. Ralph retired from the New York Police Department after over 20 years and served as the commanding officer of an organized crime control task force of local, state, and federal law enforcement. He is currently the Director of Tulane University's School of Professional Advanced Information Technology where he has taught in both homeland security and information technology programs. Ralph holds a bachelor's of Business Administration and a master's degree in Information Technology. As an entrepreneur he has co-owned two startup technology firms. Show Notes: [1:01] - Ralph shares his current role at Tulane University and shares his interest in information technology. [2:15] - As more people become dependent on online systems, the more valuable it becomes. [3:50] - As an educator, Ralph engages students in the growing field of cybersecurity. [4:42] - Ralph describes qualities of great cybersecurity students. [6:32] - Cybersecurity can be compared to traditional security. [8:48] - Using traditional security as an example, Ralph says that a single door just isn't enough. [9:41] - "It is so much harder to secure something when you have to retrofit it rather than designing it for security." [12:02] - In some ways it is harder to bring older companies that work more traditionally on board with updated cybersecurity. [13:12] - Ralph believes there is a misunderstanding that small and medium sized businesses may not believe they are a target. [14:22] - Sometimes the target is not money, it's data. [15:53] - Now, there is cybersecurity insurance offered which Ralph believes is a good thing. [17:01] - In the near future, Ralph believes that if you do not have the most updated software, you will be denied access. [18:40] - At Tulane University, the program is designed to have graduates provide value to cybersecurity immediately. [20:44] - The separation of tech and cybersecurity from a company's team is over. [22:35] - From a leader's perspective, a data breach is also a loss of money. [23:31] - If you lose your company's server, can you afford to be down for a week? Likely not. [25:08] - In the cloud does not always mean secure. [27:40] - Hacking is now being done by massive criminal organizations. [29:21] - Malware is coming from every direction. [32:27] - Responsible disclosure is extremely important. [34:05] - Your backup should not be in the same place as your primary location for stored data. [35:45] - Ralph shares his ideas on what cybersecurity governance will look like in the future. [37:33] - There are daily news stories of cyberattacks. Ralph shares an example. [39:33] - Phishing is still a huge problem, but awareness is being raised constantly to help. [41:06] - Cybercrime undermines a lot of the good that technology does. It reduces trust and introduces fear and confusion. [43:40] - Courses and resources are available no matter where you are. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Tulane University Information Technology Program
Ep 118Forensic Accounting with Leah Wietholter
Data entry may seem boring, but you never know the story behind the information being entered and the patterns that emerge. Some data has distinctive characteristics that point towards fraudulent activities. Today's guest is Leah Wietholter. Leah is the CEO and founder of Workman Forensics as well as the host of the Investigation Game Podcast. After working for the FBI, she has served as the Senior Certified Fraud Examiner in Tulsa and she currently volunteers as a treasurer for the Tulsa Crime Stoppers. With over 15 years of experience and more than 100 cases worked, Leah has honed her industry expertise to create the Data Sleuth Process, a scalable data-first approach to forensic accounting engagement and fraud investigations. Show Notes: [1:03] - Welcome to the show, Leah! Leah shares her background and current role as founder of Workman Forensics. [2:08] - What sets Workman Forensics apart is their creative team and Investigation Games. [4:26] - Forensics accounting started becoming more common, but Leah shares how she became a part of the FBI accounting team. [6:13] - While in the FBI, she was heavily involved in data entry and also testified for grandy jury after Hurricane Katrina. [7:58] - Many times, fraud is determined simply by entering data and seeing patterns. [9:25] - Leah explains a tool developed by Workman Forensics to see anomalies within data that indicate fraud. [11:41] - By building up from this information, categories for fraud risk can easily be seen. [13:18] - Business owners need to know what money enters the business, what form of payment, who touches the money, and what money leaves the business. [14:29] - Pay close attention to your payroll reports. [16:04] - You need to also know what is normal for your business, then always look for things that look off. [17:31] - Chris shares an unusual statement he received and why it looked odd. [19:08] - People committing embezzlement typically pay themselves in even dollar amounts. [20:57] - Indicators allow investigators a more defined set of data to look at more closely. [22:46] - If the person in charge of your bookkeeping isn't reconciling, you have a problem. Leah explains what reconciling is. [24:57] - You don't always know how much money you have if you aren't reconciling. [25:56] - Most scams have a lifespan of 18 months, but in these types of financial fraud cases, Leah says they last several years. [26:58] - When it comes to financial fraud, Leah says it can't always be prevented but it is important to detect it quickly. [28:21] - When money comes into your business, a certain amount is already called for. The money stolen is the profit. [30:11] - You can limit access to accounts through your bank. [32:14] - Leah shares the story of the craziest case she worked on. [36:12] - In this case, someone was using their own legitimate business to launder money through fake vendors. [37:25] - Many people think that if a large sum is stolen that the money can be found somewhere, but in most cases, it has been spent. [40:18] - In Tulsa, where Leah is located, there are a lot of casinos but the majority of the embezzlement cases she has worked on are by people with shopping addictions. [42:31] - One of the suspicious behaviors for high risk is being loved by management but not by others. [44:24] - The feeling of betrayal is the most emotionally charged in these events. [45:13] - As the owner, make it a process to check things every month. [46:50] - A red flag could be if bookkeepers or accountants are defensive when you want to check things. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Workman Forensics Website The Investigation Game Podcast The Investigation Game
Ep 117The Top 5 Scams of Last Year with Melissa Trumpower
In 2020 and 2021, the scam that impacted the largest number of people was done through online purchases. Either you or someone you know may very well have been scammed. Today's guest is Melissa Trumpower. Melissa Trumpower is the Executive Director of the BBB Institute for Marketplace Trust, the Educational Foundation of the Better Business Bureau. Melissa is the co-author of several research reports, including the BBB Scam Tracker Risk Report, the BBB Online Purchase and Employment and Small Business Scam Reports. She has more than 30 years of leadership experience working with not-for-profit, has a bachelor's degree from Cornell University and a master's from John Hopkins University. Show Notes: [1:01] - Welcome to the show, Melissa! Melissa shares her current role with BBB and the mission of the organization. [2:05] - Scam trackers from the BBB were created in 2015 to be really intentional and specific to track data on threats. [3:30] - Melissa explains why she was drawn to this position with BBB. [5:09] - Due to Covid, more people were online in 2020 and 2021 and online purchasing scams were the riskiest. [6:25] - The BBB utilizes a risk index that looks at more than just the most prevalent of scams. [7:23] - Online purchase scams don't involve a lot of money per individual target, but they are riskiest because of how many of them are extremely believable. [8:37] - Online purchase scams are simple. You purchase an item from a website or an ad and you never receive the item. [9:45] - Be aware that you can come across fake websites in your web searches as well. [10:46] - Melissa shares things to look for in sites that you have never purchased from before. [11:56] - Don't do anything rash especially if you feel like something is off. [13:03] - The method of payment can be a red flag. [14:21] - Crypto is also increasingly used in online purchase scams. [16:43] - Be very careful even when sending crypto to someone you know and be certain you are sending it to the right person. [17:04] - Employment scams are another top scam for the third year in a row. [19:24] - Employment scams average a loss of over $900 per target. [20:38] - Some job listings, especially on Craigslist, tend to be very vague and promising. [22:55] - The other two top scams are home improvement scams and investment scams. [24:24] - If you are investing money, do the research before making decisions. Melissa gives examples of what you can do to ensure safety. [27:25] - Scammers do sometimes also pose as legitimate companies. [28:02] - Don't believe everything you see or read. Be cautious. [29:28] - Another element BBB is looking at is the non-financial impact of scams. [30:42] - The highest scam for susceptibility is the moving scam. [32:29] - Consumers often read reviews and it is nearly impossible to tell the difference between a real or fake review. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest BBB Scam Tracker BBB Marketplace Trust
Ep 116Minimizing Damage From Cyberattacks with Stuart Madnick
Many use the internet considering it more like a walk in the park rather than realizing it is more like a trip down a dark alley. Today's guest is Stuart Madnick. Professor Madnick has been a faculty member at MIT since 1972. He has served as the head of MIT's IT group for more than 20 years. During that time, the group has been consistently rated number 1 in the nation among schools for information technology programs. Dr. Madnick is a prolific writer and author or co-author of over 380 books, articles, or technical reports and textbooks. He has a degree in Electronic Engineering, Management, and Computer Science from MIT. He has been a visiting professor at Harvard University and six additional countries. Show Notes: [1:10] - Dr. Madnick shares his background and current role at MIT. [2:53] - There were examples of cybersecurity attacks predating the internet through floppy disks. [4:02] - In the late 90s and early 2000s, the internet experienced a boom of users. [5:50] - In other industries, safety is a priority. [6:53] - Everything, even toothbrushes, have computers in them. [8:30] - Most know of the common scams, but there are people who still fall victim to them. [9:18] - Some of the really poorly written scam emails are intentionally created this way to find the most gullible. [10:15] - Dr. Madnick describes spear phishing and the rise in these cases. [11:30] - In some cases, only a couple hundred dollars could be enough for a scammer and they add up quickly. [13:03] - Don't feel bad if you are hit by a believable scam. [14:11] - Most people do not consider what to do to minimize damage. [16:56] - If something bad happens to your computer and/or your data, what is your plan? [18:54] - Dr. Madnick shares some corporate examples of cyberattacks. [20:23] - We constantly have several subconscious decisions that we don't consider the consequences of. [22:16] - Maintaining certificates and security is a tedious and manual task. [23:51] - Data is tracked by how attacks were successful rather than how many were unsuccessful. [26:10] - Larger companies are starting to give more attention to cybersecurity but the progress is very slow. [28:31] - Cybersecurity can be considered a catastrophe. [29:30] - What does a cyber catastrophe look like? [31:40] - Outages and malfunctions are possible and in catastrophes, a solution can take weeks or more. [33:22] - It may not be likely that a catastrophe will happen, but it is possible, and we are unprepared. [36:12] - You can't avoid all risks, but you can minimize the damage done. [39:31] - Cybersecurity tends to be a low priority. [41:17] - What is a "zero-click vulnerability?" [43:12] - Cybersecurity education is outdated in most schools. [44:43] - You can put a better lock on your front door, but if you put your key under the mat, are you any more secure? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cybersecurity at MIT
Ep 115Hackers Don't Wear Hoodies with Lisa Plaggemier
Everyone is at risk when they're online. But there are simple security measures that you can implement that will make it more difficult to be hacked. Today's guest is Lisa Plaggemier. Lisa is the Interim Executive Director for the National Cybersecurity Alliance. She has held executive roles with Ford Motor Company, InfoSec, and Media Pro. She is also a frequent speaker at major events and is a thought leader for innovative security trainings and awareness programs. Show Notes: [1:05] - The National Cybersecurity Alliance has a mission to enable a more secure interconnected world. [1:45] - Lisa was working in sales and marketing with Ford Motor Company, but shares an experience that changed her career trajectory. [4:27] - Lisa created a series of videos that became popular with viewers. [5:58] - Security professionals are well intentioned, but when educating people who are not technologists, you want to give just enough to stay interested. [7:21] - People use technology to enhance their lives. The internet was never built to be secure. [9:30] - Doing things securely doesn't always mean that the user should be frustrated. [11:04] - With keeping track of passwords, Lisa reveals the common misconception of password management sites. [12:28] - Another problem is with business accounts and corporations where employees think the company handles security. [14:23] - Unfortunately, there are some sites that don't make using a password manager easy. [15:31] - It really isn't necessary to change your password every 90 days as was previously important to do. [16:46] - It is important for people to research a company and their possible security breaches before doing business. [17:57] - Part of many sites are requiring two factor authentication as a part of the setup process. [19:27] - What if everyone did two factor authentication? [21:46] - Lisa shares some stereotypes of hackers and phishing emails. But they aren't like that anymore. Hacking has become very sophisticated. [24:42] - Advertising and stock images feed this stereotype. [26:24] - Organized crime is structured just like a professional organization. [28:40] - People involved with organized crime look at what they are doing as just their job. [30:04] - Lisa's prediction in cybersecurity will get worse before it gets better. [31:54] - In the security world, security professionals are improving their ability to educate the populace. [33:52] - If we don't report things, trends will not be noticed. [35:31] - Always keep your software and apps updated. Updates are usually security driven. [36:47] - The language barrier between employees of a company and the IT department is something that needs to be bridged. [39:31] - There are a lot of free resources available on the National Cybersecurity Alliance's website. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Lisa Plaggemier on LinkedIn National Cybersecurity Alliance Website
Ep 114The Impact of Cyberbullying with Tina Meier
It is easy for people to create fake online profiles and say or do whatever they want as a cyberbully. They often don't think through the possible consequences of their actions. Today's guest is Tina Meier. Tina is the Executive Director of The Megan Meier Foundation. Her life was forever changed on October 16, 2006 when Tina's 13 year old daughter Megan Taylor Meier took her own life after being cyberbullied by an adult neighbor posing as a fictitious boy named Josh Evans. Her belief is that if there is even just one child that struggles with bullying, cyberbullying, or self-harm, that is one too many and we must be there to help and support them. Show Notes: [1:08] - Megan struggled with self-worth and self-esteem. Tina shares Megan's story of meeting a boy on MySpace. [3:50] - The things that were being said online were not true and Megan began defending herself. She felt like her mother was not on her side. [4:52] - Megan took her own life. [5:45] - After Megan's passing, the boy's MySpace account was deleted. It turned out that it was a fake account created by the neighbor. [7:03] - It is hard to fathom that an adult was behind this, however Tina does not believe that Megan would take her own life. [8:27] - The FBI investigated and determined who was behind the fake account. [9:50] - The court case was a first of its kind and Tina explains the process and results. [11:15] - Tina took her focus to beginning the Megan Meier Foundation to help other kids. [13:34] - In the early 2000s, there were really no restrictions or laws in place to help protect people. [16:02] - When your child is young, talk to them about the rules and make sure they understand. [17:32] - For adolescents, share stories like Megan's story. [19:20] - Who will your child feel comfortable coming to in a time of crisis? [20:15] - Be aware of behavior changes. [21:21] - Check in with teachers and school staff to see if behavior changes take place at school, too. [23:24] - Listen to your child and validate their feelings. [24:45] - There's the concern of the other party knowing you've taken a screenshot. Tina advises getting another device and blocking them. [26:12] - Kids are smart and don't want to see their parents upset so they pretend to be okay. [27:18] - If your child has expressed thoughts of self-harm, stay calm. [29:17] - When they're young, parents tend to want to fix everything for them and protect them. [31:40] - Technology has made things easier for kids to create fake accounts. Schools can only do so much. [33:31] - Bullying and cyberbullying are so complex because there are no quick fixes. [35:30] - Learn social media platforms to see how kids are interacting on them. Tina shares several helpful links. [37:31] - Some parents feel like they need to hack into their child's social media account, but Tina explains that all you are doing is panicking. [39:31] - As a parent, you will make mistakes. [40:57] - The Megan Meier Foundation has tons of resources and their support does not cost anything. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Megan Meier Foundation Megan Meier Foundation Facebook Megan Meier Foundation Instagram Tina Meier on LinkedIn
Ep 113Can You Protect Intellectual Property? with David Cooper
When buying from Amazon, you might think that all products come directly from the manufacturer to Amazon warehouses. But that is not always the case. Learn how to spot potential counterfeit products and protect yourself and your brand on Amazon. Today's guest is David Cooper. David is the CEO and founder of IPSecure, which is an innovative new way to protect your intellectual property on Amazon, control your sales channel, and ensure every purchase of your product on Amazon is a positive and reputable shopping experience. He has spent 20 years building and deploying brand protection solutions for hundreds of global brands such as the NFL, J&J, Apple, and Rolex. Show Notes: [1:00] - David shares his background and information on his company IPSecure. [3:02] - eCommerce is huge, but is still only a fraction of the size of total retail. [4:42] - Solutions in this space are almost always legal. [6:35] - Finding counterfeiters has no impact but companies tend to measure how many are found. IPSecure measures everyone. [9:28] - You can't quantify how much risk was avoided. [11:01] - When a counterfeiter is taken down, more pop up. [12:30] - Brand protection is something David advises to add for customers. [14:12] - There are some universal signs of counterfeit products, but there are also some signs that are specific to Amazon. [15:43] - Amazon has a specific algorithm that chooses who sees what products. Check the store's profile. [17:32] - It is easy to be deceived on a marketplace site. David illustrates this with a Samsung camera purchase that was a parallel import. [19:42] - There is nothing wrong with buying and reselling something, but there is a gray market problem. [21:21] - These legal solutions are very expensive. [23:02] - Amazon is proactive in some areas, but generally speaking, they do not monitor products belonging to specific brands. [24:16] - For most brands, selling on Amazon is necessary. [25:19] - Even if a brand pulls out of Amazon, their products are likely still being sold on Amazon and that could be a liability. [28:49] - Instead of focusing on taking down other profiles and sellers, IPSecure focuses on building your own brand to be a successful one. [30:45] - While challenging, Amazon does more than any other company to help brands with this concern. [32:32] - People are much more aware of these concerns as Amazon has grown. [34:18] - Congress is taking a look at how Amazon runs, but there have been many distractions from these issues with the current world climate. [34:19] - It is very complex with a lot of moving parts. IPSecure integrates well with a lot of different platforms. [37:52] - Smaller businesses cannot afford to lose a sale to a counterfeiter and likely cannot hire a lawyer. [40:41] - David shares the story of a client whose business exploded after their product was on a reality show. Counterfeiters popped up very quickly. [43:33] - As a trademark owner, you are responsible for monitoring. [46:12] - Brand protection can actually increase revenue. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest IPSecure Website David Cooper on LinkedIn
Ep 1127 Ways to Reduce Anxiety with Dr. Michele Borba
The CDC states that since the Covid-19 pandemic began, one in every three children has been diagnosed with a mental health disorder such as anxiety or ADHD. It is more important than ever to learn how and to teach techniques to help reduce stress and anxiety. Today's guest is Dr. Michele Borba. Dr. Borba is an internationally renowned educator and award-winning author of 24 books. She is a motivational speaker having spoken in 19 countries on 5 continents and has served as a consultant to hundreds of schools and corporations like Sesame Street, Harvard, The US Air Force Academy, and the Royal Crown Prince of Abu Dhabi. Dr. Borba is an NBC contributor who has been on countless shows including Today, Dateline, Dr. Oz, Anderson Cooper, CNN, and more. Her work is featured in Time, Washington Post, Newsweek, Boston Globe, US News and World Report, and many others. Show Notes: [1:30] - Dr. Borba started her career as a special education teacher and has learned how resilient kids truly are. [4:03] - We can't point the finger at one specific cause. We need to focus on what to do about it. [5:07] - Dr. Borba describes a study done over the course of 40 years. [6:25] - What are the things we need to teach to help manage anxiety or prevent it? [8:35] - Connect with teachers. Kids act differently at school than they do at home. [9:33] - Teachers see trends in behaviors in their class. [10:16] - A major change in society is that getting mental health services is more acceptable. [11:23] - Give kids a range of ideas to help your children. [13:12] - When you suggest a hobby, it isn't a sport or activity that you have to add to the agenda. It is something they choose to do. [14:37] - Hobbies, pets, music, etc. can be tools that work for some kids. [15:29] - Everyone has a different stress sign. [16:18] - Dr. Borba shares a breathing technique great for both kids and adults. [18:21] - By learning these strategies, kids can build muscle memory. [20:21] - Thrivers have the tools to pull from to deal with stress. [21:44] - Your voice and family mantra can become your child's inner voice. [23:00] - Volunteering helps build hope and empathy. [25:03] - There are many ways to build empathy but be intentional. [26:34] - Teach emotional literacy. [27:50] - Many social skills are in dormant mode right now. [29:03] - Kids can also feed off the stress of their parents. [30:18] - Our society tends to focus on performance which can add levels of stress. [33:32] - Kids are becoming ruder and civility needs to be retaught. [36:10] - Empathy is a super power and is the glue that holds society together. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest MicheleBorba.com Books by Dr. Michele Borba Michele Borba on Instagram Dr. Michele Borba on LinkedIn
Ep 111Don't Miss Opportunities Created by AI with Howard Getson
We are living in a world where AI can do many of the things people have been doing, thus creating an opportunity for us to create and do something new. Not understanding this transition can leave us unnecessarily exposed to risk. Today's guest is Howard Getson. Howard is the President and CEO at Capitalogix. He runs an algorithm hedge fund and the data science company that powers it. Capitalogix created a revolutionary financial technology platform that uses adaptive AI to maximize performance with real time insights. His prior company, Intelligent Control which he founded in 1991, was an Inc. 500 company and won an IBM award for Best Business Application. Howard is currently on the advisory counsel over a bio ethics and research institute. Show Notes: [1:16] - Welcome to the show, Howard! He shares his background and what he does currently with Capitalogix. [3:00] - People are interested in things like AI and automation because they want to amplify intelligence. [4:26] - This technology gives entrepreneurs amazing opportunities to provide value. [5:20] - How did AOL change the technology landscape? People are good at knowing something is about to change. [6:40] - Think about 3 pieces of technology that already exist that you know are going to change the landscape in the next few years. [7:57] - It's not a question about something being created but rather what implications it has. [9:43] - Even though we knew the internet would be big, we didn't think about the consequences or the role they themselves would play. [11:05] - You don't have to be the person to create the technology, but how can you find opportunities in the future? [12:14] - What happens when AI gets smarter than us? Howard says it already is. [14:04] - Howard shares a personal story that demonstrates how technology has gotten so good so fast that scams are moving quickly. [16:44] - As we get these technologies, it frees people up to do more. [18:40] - What impact do these technologies have on false information? [19:24] - Technology is going to learn how to lie as a strategy. [21:04] - Data is the biggest problem AI sees right now. [22:47] - You want AI to create new opportunities not to relieve you of things you do so you can do nothing. [23:46] - Howard doesn't try to predict technology, but rather human behavior. [25:22] - It's not about what it does, but rather what it makes possible. [27:20] - Current technology then becomes a prototype for something new. [28:35] - With AI, the result is exponential results. There are 3 key drivers to make that happen. [30:36] - Data science is about finding a profound truth hidden by noise. Discover is an important verb. [32:49] - Build, scale, and refine. [34:25] - Knowing something worked is different from knowing it is currently working. [36:33] - Text "AI" to 972-992-1100 for a presentation on the methodology. [37:50] - Howard believes that everyone will be able to leverage AI in the next 25 years. [39:18] - We live in a world that gets faster and better everyday. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Capitalogix Website Howard Getson on LinkedIn Howard Getson on Twitter
Ep 110When Violence is the Answer with Tim Larkin
Too often people seek training after they've had an encounter or violent situation. Criminals look to exploit us for one thing that we all possess. Listen on to find out what that is. Today's guest is Tim Larkin. Tim is the founder and creator of Target Focus Training and is well known for self-defense and close combat training. During the last 20 years, he has trained not only law enforcement, the US Navy Seals, Army Special Forces, and the US Border Patrol, but also corporate clientele from around the world. He is an author and a public speaker in over 40 countries. Show Notes: [0:52] - Tim describes his background and how he found himself passionate about combat and combat training. [2:43] - Initially, Tim's goal was to become a Navy Seal. [3:39] - Tim's eardrum was busted during a dive with the Navy Seals, and he lost control of his body. This injury changed his career trajectory. [6:02] - Because of his extensive training in hand-to-hand combat, Tim became involved in a different program. [7:50] - At the time of 9/11, Tim began working with civilians. [9:02] - You should always be proactive. [10:58] - Mentally, the injury was devastating for Tim. [13:29] - None of the experiences he has had would have happened if he had the traditional Seal career he planned on. [16:26] - Once someone experiences something challenging, they then become proactive to make it not happen again. [17:49] - The biggest threat is the smartphone. [19:18] - To demonstrate this danger, Tim shares the story of a bus robbery. You can watch the video here. [21:49] - Behavior with your phone becomes second nature. [23:04] - We spend our downtime on the smartphone, but Tim always keeps one ear out. [26:03] - There are tons of positives about smartphone technology, but in public, it can be used against you. [27:46] - Tim shows how to detect a possible predator with a personal anecdote. [30:41] - We can't pick out predators. It is impossible to tell as they blend in. [32:15] - Tim interacts with everyone assuming they are violent to ensure safety. [33:26] - As a society, we can get away with a lot of different types of social interactions, but anything you do or say can trigger someone else. [35:33] - If you understand the predator's role, everything is backed up by the possibility of violence. [38:10] - Highly recommended is Robert Green's book Law of Human Nature. [39:59] - Study human behavior and you'll learn about others and yourself. [42:00] - When is it okay to use the tool of violence? When you are devoid of choice. [43:15] - Women tend to me more in tuned to non-verbal cues than men. [44:36] - The more you learn about human nature, you have these tools you can reference. [46:10] - Tim gives some examples of when violence is the answer. [48:29] - When your life's on the line, you need to have tools at the ready. [50:03] - There are parts of the body that you simply cannot protect. The goal is to take the brain out of the equation. [52:00] - For criminals, violence is their currency. [53:51] - Tim explains what cause state is. [56:12] - Your brain is incredible and if you give it permission, it will solve problems. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Tim Larkin on YouTube Tim Larkin's Website Target Focus Training Tim Larkin on Instagram
Ep 109Hostage Taking with Rachel Briggs OBE
Money is not the only reason somebody can be taken hostage. It's important to know the other motives for how and why targets are selected. Today's guest is Rachel Briggs. Rachel has spent the last two decades as a writer, analyst, and strategist working with corporations, governments, and international NGOs developing security. She was the first director of Hostage International and the founding executive director of Hostage US. Rachel co-chairs the European commission's group that is working on tackling online extremism. The report she wrote, "The Business of Resilience," has become the blueprint for corporate security management. Show Notes: [1:03] - Rachel shares her background and how a personal experience of a family member being taken hostage impacted her future. [2:50] - One type of hostage situation is political hostage taking. [3:49] - Economical hostage cases are what happens most often. [4:30] - Hostage diplomacy is a third type that creates negotiation pressure. [5:19] - Latin America is more of a hotspot for kidnapping and Rachel points out Colombia and Mexico as predominant locations. [6:26] - Political kidnapping is most common in Middle Eastern and African countries. [7:24] - Common targets are those who are the ones who run towards danger such as journalists. [8:50] - Rachel describes another type of target that applied to her family member who was taken in the 90s. [11:27] - People on vacation being picked up as a hostage are not as common, but it isn't unheard of. [13:01] - The experience of being held against your will is never a pleasant experience, but the way you are treated varies. [15:00] - Hostage takers operate as a business in some situations. [18:07] - The statistics of hostage taking are very underreported. [20:33] - These crimes prey on the desperation to get a person home. [22:21] - Stopping the payment of ransoms is not the answer to stopping kidnappings. [24:05] - There are many different ways to make an exchange of money for ransom. [25:33] - It is rare and dangerous, but sometimes a hostage escapes their situation or is rescued by military operations. [27:21] - There are resources that list dangerous locations. [28:45] - Insurance for kidnapping and hostage is available. [30:59] - After the events in Syria in 2014, groups have been created to provide this insurance to freelance journalists. [32:33] - Every situation is different, but Rachel describes the commonalities in how families cope. [35:37] - There are issues that families experience that we don't think about being a problem. [37:42] - There are now strategies being implemented in large corporations. [39:18] - What is virtual kidnapping? [42:27] - The psychological impact can be long lasting and significant. [43:22] - While underreported, kidnapping and hostage taking are more common than we think. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest ClarityFactory Website Rachel Briggs on Twitter
Ep 108Online Security: Just Hope for the Best with Steve Gibson
When the internet began, trust was implied. But today, how can you know who or what to trust on the web? Today's guest is Steve Gibson. Steve has participated in the PC industry since its inception. He authored InfoWorld's top rated Tech Talk column for eight years and he produces the TWiT Network's weekly Security Now podcast in its 17th year. He developed a working replacement for the username and password site known as QRL and is best known for his 35 year old SpinRite mass storage and data recovery and maintenance utility which he continues to develop. Show Notes: [1:14] - Steve shares his background starting in the 70s. [2:41] - A personal experience inspired Steve to create SpinRite. [5:03] - When the internet was created, Microsoft wasn't on board. They rushed the solution when they realized it was necessary. [6:06] - Because there was no firewall, people could see anyone's C drive. [7:49] - In the beginning of internet use, there was implicit trust. [10:01] - Internet security has very complicated problems. [12:37] - We've created a complicated and constantly changing system. [14:03] - Steve's podcast is geared towards those who implement security solutions for consumers. [15:40] - In many ways, the internet is "consumer hostile." [18:43] - The system is so fundamentally prone to abuse that end users hope for the best. [21:10] - Steve and Chris continue to print authentication and recovery codes. [23:35] - The reason we've gotten into this mess is because in the beginning, the internet wasn't very useful. [24:43] - The most commonly used password is still 123456. [26:39] - Password requirements make things even more complicated because everything constantly changes and every site is different. [29:01] - Steve shares what he thinks can help the industry, starting with certifications. [31:21] - Things are improving in some areas, including the federal government stepping in to regulate some things. [33:18] - Steve discusses regulation pros and cons. [35:12] - The internet has revolutionized efficiency and potential. [38:54] - There should be courses on how to search the internet for things. [40:26] - It is important to continue improving this powerful tool. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Home of Gibson Research Corporation Website Steve Gibson on Twitter Security Now Podcast
Ep 107Get Rich Quick Schemes Vs. Investments with Justin Donald
Many people have lost money trying to grow their wealth, but how do you know when an investment is too good to be true? Today's guest is Justin Donald. Justin is the host of the Lifestyle Investor Podcast and author of the bestselling book Lifestyle Investor: The Ten Commandments of Cash Flow Investing for Passive Income and Financial Freedom. He consults and advises entrepreneurs, executives, and successful media personalities on lifestyle living. Justin has also appeared on nearly 100 podcasts including Entrepreneurs on Fire, The Mike Dillard Show, Making Bank, The Accelerated Investor, and Unbecoming. Show Notes: [1:02] - Through his company Lifestyle Investor, Justin teaches others how to create a lifestyle that is compelling and purposeful. [3:31] - Justin's mission is to help people buy their time back. [4:34] - In many cases, people have lost millions of dollars in poor investment decisions. [5:51] - If you want to build wealth, you need to have a strong ecosystem. [6:53] - A lot of people in financial services are not in alignment with their clients and the system is manipulative. [8:40] - Justin didn't start out asking specific questions and now he always asks those in financial services. [10:02] - You have to do your own work and math to make sure things are not manipulated. [11:10] - There are incredible opportunities to make money but also to lose money. Not all projects are the same. [13:10] - ICOs are super high risk and Justin advises to avoid them. [14:11] - If something is guaranteeing returns, it's a red flag. There's always some form of risk. [15:26] - Justin admits that he has lost money in situations where he didn't see the signs in time. [17:49] - There are some red flags to look for and Justin shares some examples. [21:42] - Having cash flow is important first and then investing becomes safer. [23:29] - Almost every business partnership is going to end at some time and 90% or more of them end poorly. [25:58] - Always have open conversations and express concerns when making decisions. [27:56] - Justin also advises to be careful that you aren't buying another job and you are looking for passive income. [30:51] - What is a targeted return? [32:13] - Don't be lured in by a good targeted return. Justin advises on what to look at instead. [34:38] - You want to know how your investments will do if things don't go according to plan. [36:17] - Justin gives an example to illustrate how returns work. [37:50] - Justin is offering his book free to listeners by going to his website LifestyleInvestorBook.com. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Justin Donald Website The Lifestyle Investor: The 10 Commandments of Cash Flow Investing for Passive Income and Financial Freedom by Justin Donald The Lifestyle Investor Podcast
Ep 106Negotiating with Chris Voss
Negotiating doesn't just take place in hostage situations or in big board rooms. You can end up in conversations exchanging the commodity of your time without even realizing you are in a negotiation. Listen on to learn how to be more aware of these interactions. Today's guest is Chris Voss. During Chris's 24 years of FBI experience, he was trained in the art of negotiation not only by the FBI but by Scotland Yard and Harvard Business School. He is the former FBI Lead International Kidnapping Negotiator. Chris is the author of the negotiating bestseller Never Split the Difference and is the founder and CEO of The Black Swan Group. Chris has taught business negotiation in the MBA programs and has been an adjunct professor at numerous schools of business. He has used his many years of experience to develop a unique program and team that applies these globally proven techniques to the business world. Show Notes: [1:20] - Chris Voss shares his background and how he got into understanding negotiation skills. [2:38] - In his book, Chris presents strategies in specific actionable language. [4:20] - There are times when you are negotiating and you don't know it. [6:22] - We often think that negotiations always include money, but time and implementation are also commodities. [7:16] - The second you want something, you are in a negotiation. [8:11] - Chris explains the results of experimenting with changing the yes questions to no questions. [10:08] - The skills in The Black Swan Method are neutral. [12:50] - If you have a bad feeling, proceed with caution. The more you question, the stronger your instinct will be. [14:31] - Chris Voss describes The Black Swan Method and its solid foundation of skills. [16:20] - Your gut instinct is probably pretty good. Listen to your feelings and think about using the skills to test your gut instinct. [18:30] - Your subconscious can process much more than your conscious mind. [20:30] - Chris Voss demonstrates how anger impacts your decisions. [22:05] - Strategic umbridge is when someone purposefully makes another person angry during negotiation. [25:01] - Dynamic silence is an appropriate response to bringing another's emotions back down. [28:20] - Decision fatigue is something that needs to be factored into negotiation. [29:57] - What is the science behind responding to no-oriented questions? [32:32] - There is a better solution than splitting the difference. [35:02] - What is the craziest negotiation Chris was involved in? [36:01] - 20% of the business deals presented are fake opportunities. [38:57] - It is more impactful and profitable to have a relationship. [40:11] - Chris Voss describes an impossible to fulfill request in a hostage situation in the early 2000s. [41:01] - Stop using the term "pick your brain" when asking for something. [42:06] - It is important to show empathy. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Black Swan Website Chris Voss on Twitter Never Split the Difference: Negotiating as if Your Life Depended On It by Chris Voss
Ep 105Identity Theft of Children with Kelli Grant
Would it shock you to know that over 1 million children under the age of 9 have had their identity stolen in the last year alone? It is important to be aware of how this can happen and what you need to do to prevent it from happening to your children. Today's guest is Kelli Grant. Kelli is currently Senior Editor at CNBC and was the Senior Consumer Reporter at Marketwatch and Smart Money. Kelli has earned the certified financial planner designation which recognizes financial advisors who meet education, experience, and ethics requirements, and have passed tough industry exams. Her work has appeared in the Wall Street Journal, The New York Times, Kipplinger's Personal Finance, Good Housekeeping, Family Circle, and other publications. Show Notes: [1:15] - Kelli shares her background and expertise in the field. [3:07] - What is the difference between identity theft and fraud? [4:12] - Identity theft of children happens mostly through forms and paper. [5:56] - In some cases, organizations that need private information in records don't know how to manage it safely. [7:38] - In many cases, organizations that ask for a Social Security Number don't even need it. Kelli advises leaving it blank first to see if they ask for it. [9:42] - Double check the questions being asked that may seem unimportant. [11:45] - Children are attractive targets of identity theft because it goes undetected for years. [13:47] - A blank slate can be manipulated into anything. [16:14] - Kelli lists some of the red flags that a child's identity has been compromised. [18:01] - Kelli explains the pros and cons of freezing your child's credit until they need it. [20:08] - Freezing credit is not fool proof and does not prevent all fraud and theft. [23:01] - Experts say they see more frequent attempts at Familiar Fraud during times of economic distress. [26:51] - Include your children in conversations about keeping private information safe and secure and how to spot a scam. [28:42] - Children shouldn't necessarily know their Social Security Number until they are teens applying for jobs or financial aid. [29:41] - Be aware when data breaches take place and take the steps to keep your information safe. [31:50] - Cleaning up identity theft is very messy and difficult. Kelli explains that there are some insurance policies that are good resources. [34:01] - Insurance policies are easily available due to the high need. [35:18] - Leave certain pieces of information off of forms and don't even mention it unless the organization asks. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Kelli Grant on Twitter Kelli Grant on LinkedIn The Less People Know About Us: A Mystery of Betrayal, Family Secrets, and Stolen Identity by Axton Betz-Hamilton
Ep 104Utility Scams with Amy Livingston
Fraudsters are always looking for new ways to take advantage of people and going after something everybody uses, like household utilities, can be lucrative for them. Today's guest is Amy Livingston. Amy is a freelance writer who has written on personal finance and consumer issues for Money Crashers and Consumer Search. Her personal blog Eco Frugal Living focuses on ways to save money and live green at the same time. Show Notes: [0:51] - Amy shares her background and how she found herself writing about avoiding scams. [2:20] - Amy describes a utility scam that she actually experienced and the red flags. [3:53] - Scammers who go door to door often pose as someone from the power company. [7:12] - If someone comes to your door, ask for verification that they are who they say they are. [8:49] - Another door to door utility scam could happen by "paying a commission" to have your power restored faster if it has gone out. [10:54] - Home security scams can happen door to door but also through the phone or email. [12:00] - A home security scam that happens is when a scammer poses as someone from your security company. [14:40] - People who are legitimately from your home security company will not ask for your code or password. [18:00] - Chris compares current utility scam slamming to the long distance scams of the past. [19:03] - The unpaid bill scam is another common one that takes advantage of the target's sense of urgency. [20:29] - An automatic red flag is any time someone asks for an untraceable form of payment. [22:05] - You cannot always trust the number that comes up on your caller ID. [25:23] - Any time you get a call from a financial institution, hang up and call the company they claim to be from. [27:11] - Amy describes a federal aid scam that targets people who need assistance. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Money Crashers Eco Frugal Living Blog
Ep 103Pet Scams with Jack Whittaker
Once someone is emotionally invested in purchasing a new pet, it's easier to be manipulated and defrauded. We want to share ways that you can be sure not to get scammed. Today's guest is Jack Whittaker. Jack is a PhD candidate in Criminology with published works in the field of online fraud. He has presented at several fraud conferences as well as has done expert interviews for both national and international news outlets. Jack also helps run a voluntary counter fraud initiative called PetScams.com and occasionally teaches cybercrime awareness to school children. Show Notes: [1:04] - Jack shares how he became involved with PetScams.com. [2:00] - Pet scams are very unique to certain countries including the United States. [3:25] - Pet scams originally come from Cameroon. [4:46] - An offender will create a website and set up Google ads. They spend tons of money to start this sometimes with stolen cards and reinvestment. [6:56] - There are fake sites listed on Facebook, Twitter, and Pinterest to generate more traffic. [7:59] - Victims of these scams tend to be people who are very vulnerable. [9:32] - After the victim pays a deposit, the offender then contacts them as a fake shipping company to charge them more. [10:44] - These scams are social engineering at its finest. [12:04] - If the person building the website is skilled, legitimate websites can be copied as a fake. [13:02] - For now, the best advice is to video chat with the breeder to see the pet. And even better than that, visit the breeder in person. [14:20] - Chris shares the story of almost being scammed when purchasing a pet. [15:30] - Scammers use an address they find of a property that is for sale somewhere. It has caused problems for the buyers of that home later. [17:50] - International scams make things very tricky. [19:54] - Jack explains the different kinds of money mules. [23:32] - Once things are figured out, scammers have adapted. Offenders are always two steps ahead. [25:10] - There is a minimum threshold for crimes to be looked into. [26:12] - Non-refundable payment methods are a huge red flag. [27:49] - Pet scammers often run other types of scams simultaneously and typically follow trends. [30:01] - There are scams that target victims who are in a place where they will not report the crime for fear of their own arrest. [32:14] - Jack describes the hierarchy of scams. [34:08] - Some scammers also torment their targets. [35:43] - Once someone is scammed, their information is shared to other scammers. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest PetScams.com Pet Scams on Twitter Pet Scams on Instagram Scam Directory
Ep 102Dating Scams - What Are the Warning Signs? with Joe Eweka
In today's society, online dating is common. But what are the warning signs that you may be targeted by a scammer? Today's guest is Joe Eweka. Joe is a criminal justice professional, security management specialist, project management professional, and the author of the book Confessions of a Lonely Lover: An Exploration of Online Dating Scams. Show Notes: [0:40] - Joe shares his background as originally from Nigeria and attending college and graduate school in criminal justice and law in the United States. [3:13] - Because of being long distance, Joe joined a social network to be able to better communicate with his brother and found himself in a scam. [5:16] - Catfishing is another term for romance scams and Joe says they are the most dangerous. [6:33] - One red flag is that the person you are speaking with tries to take your conversation off a dating app. [8:13] - Scammers lie a lot and work in teams. Sometimes you may catch inconsistencies. [9:00] - Watch the profile photo as well. If things look too good to be true, they probably are. [10:20] - Be suspicious if you cannot find anything at all about a person. [11:28] - Scammers often used borrowed text. Copy the suspicious text and paste it in a Google search. [13:06] - Scammers avoid video calls. [14:28] - Deep fake technology exists but is not commonplace in dating scams yet. [15:35] - Strange steps in the process like money orders, money transfers, and the purchase of several gift cards are major red flags. [16:34] - Do not accept friend requests from people you don't know on social media and never send money to them. [17:47] - Joe advises using a computer to check links because you can hover your cursor over it to see the URL before you click. You cannot do this on a phone. [18:50] - Don't assume that because you are the one to make the first contact that they are not a scammer. [20:03] - If you use a dating app, limit your communication to just the app. [22:10] - Do not rush and be sure to ask a lot of questions. Cut off all communication with anyone who seems suspicious. [23:30] - If you are meeting someone in person, you should always meet in a public place and with other people you know. [24:42] - Never go to another country to meet someone in person who you have never met before. [26:35] - Always report scammers. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Confessions of a Lonely Lover: An Exploration of Online Dating Scams by Joe Eweka
Ep 101Business Ethics with Scott Stratten
No one enjoys being on the receiving end of a business that manipulates or pushes you into buying something. Good business is about relationships where you are authentic, engaged, and building trust. Today's guest is Scott Stratten. Scott is an author, podcast host, and an award winning keynote speaker. He is known for his energy, passion, knowledge, humor, and his man bun. His live and virtual presentations bring UnMarketing to life, energizing attendees, and creating experiences audiences will remember and learn from. Show Notes: [1:30] - Scott's inspiration for starting UnMarketing was frustration. He explains his background and how he moved forward into entrepreneurship. [3:58] - In business, Scott saw the "buy or bye" mentality and believes there's a better way. [5:27] - It isn't about tactics. Strategies don't take into account the human factor. [6:53] - "I'm going to say what I think and I'm going to say it without a filter." A lot of people are afraid of this for polarizing the market. [8:13] - Scott shares the story behind the domain name for UnMarketing. [11:01] - The kindness of the person who originally owned the domain name believed in Scott's brand. [13:04] - Many companies continue to manipulate people to buy. [14:04] - In marketing, if you lie, nobody knows. [15:49] - Scott shares the story of catching a company in a lie. [18:32] - The internet can't work in a way without trust. [20:09] - In over 300 episodes across six years on the Unpodcast, Scott has never run out of material. [23:31] - Business decisions must be ethical and Scott calls people out for unethical decisions in their business. [26:31] - If you have the endless pursuit of more, you don't appreciate what you have now. [29:38] - Scott has been presented with many opportunities but he couldn't serve too many audiences well and authentically. [33:39] - There is a difference between what is legal and what is right. [36:13] - A lot of companies believe they own their employees. Employees are an asset, not overhead. [37:18] - Scott shares the story of an experience when consulting and a technique called Stop, Start, Continue. [42:04] - After 20 years in this field, Scott continues to be shocked that people don't realize how they are supposed to treat others. [45:01] - Scott recently revamped the UnMarketing website to better show what it is about and to ensure that it is presented authentically. [46:29] - A newer phenomenon in business is that younger generations are coming in with better skills in tech. [48:31] - Be wary of those who say something isn't working anymore because they are likely selling an alternative. [49:27] - Scott personally responds to newsletter email responses and you can sign up for his email newsletters from UnMarketing.com. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest UnMarketing.com UnPodcast
Ep 100Health and Wellness Scams with Natalia Petrzela
With the new year, health, wellness, weight loss, and exercise programs will be in mass promotion. Just because someone looks good doesn't mean that what they're pitching is healthy or will even work. Watch out for unrealistic claims and results. Today's guest is Natalia Petrzela. Natalia is a historian of contemporary American politics and culture. She is also an author and podcast host. She is a frequent media guest expert, public speaker, contributor to international domestic news outlets, including New York Times, Washington Post, and CNN. She is an associate professor of history and holds a BA from Columbia as well as a Masters and PhD from Stanford. Show Notes: [0:56] - Welcome to the show! Natalia explains what she does and how she has gotten into current trends in American wellness. [2:42] - The way health has been looked at has changed drastically over the years. [4:21] - American fitness culture is very focused on an all-or-nothing mentality. [5:40] - Because wellness and fitness is commercialized in the United States, consumers are targeted to buy. [7:02] - Natalia compares the current trend in intermittent fasting to the past trend of eating throughout the day. [8:15] - Before the 1960s, there was very little research around exercise. [11:01] - We equate appearance with health but not just anyone is an expert. [12:32] - There are many people who take performance enhancing drugs casually that may make them appear as the picture of health. [15:03] - Watch out for products being sold to you and extreme promises that are unrealistic. [18:01] - It is so easy to become completely obsessed with health. [19:39] - Many people say that their way is the only successful way to be healthy. [21:33] - Natalia discusses the difference in income and careers that impact views on health and fitness. [23:53] - Any type of extreme promises should be looked at with a great degree of skepticism. [24:57] - The whole weight loss industry is predicated on the reliance that you will gain it back. [27:41] - It is great that more people are exercising regularly, but now there's this pressure to sustain something that is stressful to maintain for many. [29:53] - Natalia discusses gym memberships. [31:04] - Be realistic about what you can start integrating into your day to day life. [32:51] - There is a current trend in specialized exercise and fitness. Unless you love it already, be wary of signing on to just one type of fitness. [36:14] - The pandemic has changed a lot of views on health and fitness and the availability of home exercise. [38:01] - Just because something works for someone else, doesn't mean it will be right for you. [39:53] - How much research can you really do when there are so many products and unqualified "experts" giving advice. [42:04] - Our healthcare system is not currently set up for optimal health. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Natalia Petrzela Web Page
Ep 99How to Travel Safely with Asher Fergusson
Traveling can be a life-giving or a long lasting nightmare. Knowing what to research before you book your trip could have a significant impact on your experience and help you to be incredibly safe. Today's guest is Asher Fergusson. Asher has been traveling around the world since 2004 when he left Australia to study in the United States where he received his undergraduate and master's degrees. He has lived all over the globe, including in India, Europe, Hawaii, and the mainland US. He enjoys researching the travel industry and has been featured on CNN, USA Today, The New York Times, National Geographic, and many other publications. Show Notes: [0:56] - Asher shares his background and how he got interested in travel. [2:12] - On Asher's website, he started sharing travel safety tips and the site has grown. [3:44] - You will run into issues regarding cleanliness in hygiene and water. This can affect your body but is avoidable. [4:57] - Asher shares several tips on eating and drinking in other countries. [7:27] - When visiting another country, street food can be dangerous. [9:20] - Every country has different cultural norms regarding food, water, shelter, and safety. [10:31] - One of the major topics of research for Asher is regarding LGBTQ travelers. [12:01] - Research laws in other countries because you could actually be imprisoned. [14:24] - Another thing to consider is the dress code, especially for women in very conservative countries. [15:37] - Some tourists feel that following stricter rules is a violation to their rights, but it is safer to follow the country's laws and rules. [17:17] - Americans tend to travel thinking that they don't have to prepare and they are above the law. [19:01] - America is a phenomenon as each state has different laws, a large population, and a lot of diversity. [19:58] - Westerners tend to be targets for theft. Asher shares some things that might make you stand out. [23:17] - There are other scams, but they are all about money. [25:25] - It is always safer to go to the official site or location to buy tickets to something. [26:43] - Asher shares the list of the top 10 worst locations to travel to as a solo female traveler. Do your research about your destination ahead of time. [28:22] - Don't be too nice. People might back off if you put up your boundaries. [29:46] - When it comes to family traveling, accommodations are important. [32:02] - Another hassle with traveling with kids in carseats and transportation upon your arrival. [33:26] - Asher dug deep into Airbnb and customer horror stories. [35:23] - Asher describes some of the issues found through this research. [38:01] - It is probable that there is a money laundering scam happening in some listings and hacked accounts on Airbnb. [40:56] - Never book a place with no reviews. The more reviews the better and only stay at the ones with a 4.8 or 5.0 rating average. [43:17] - Look at all the properties listed by the same owner. Only stay with super hosts and make sure they have a verified ID. [45:55] - Avoid the professional Airbnb landlords. [46:46] - Only book with a credit card and if anything goes wrong, be sure to have photographic evidence. [48:17] - Research is critical and real people's experiences are at your fingertips online. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Asher Fergusson Website Asher and Lyric on Facebook Asher Fergusson on Twitter Asher and Lyric on Instagram
Ep 98Call Center Scams with Ben Taylor
Very few people fall for the Nigerian prince scam these days because it has been so well exposed. However, devious criminals keep looking for new ways to package their deception so it goes undetected. Today's guest is Ben Taylor. Ben is the creator of the popular YouTube channel Pleasant Green. His videos exposing various internet scams have been watched tens of millions of times. His goal is to help get scammers out of their current role not only by exposing the scam but by helping some of them find ways of providing for their families without cheating people. Show Notes: [0:50] - Welcome to the show, Ben! He shares what he does through YouTube and his work to educate people. [1:50] - Scam baiting is when you seek out scammers to waste their time. [3:32] - Romance scams are extremely common right now. [4:40] - Tech support and Amazon refund scams are also common. [6:12] - The elderly are often targets, but people can also fall victim to a scam when they're distracted. [7:42] - A lot of time scammers will ask you to verify your name or address. You should ask them to verify it. [9:01] - Scammers typically use a script and if you get them off their game, they will move on. [10:11] - There are countless call centers across the world. [11:09] - Ben has interacted with scammers. Some realize they're doing something hurtful, but some justify it or think they deserve it more. [13:18] - Through his YouTube channel, Ben explains that if scammers are so clever and smart to scam people, they can use the internet for good work. [14:54] - Ben also looks into product purchasing scams. [15:56] - Facebook doesn't crack down on product accuracy of ads. [18:02] - When shopping online, especially from sites that are not as popular or credible, use PayPal as they have some security built in. [20:00] - Reviews are important to look at closely. [22:06] - Ben shares some interactions he's had with scammers and how he has asked them for help. [23:24] - On YouTube, Ben has hired some scammers he's spoken with to help them realize that there are more honest ways to make money. [26:03] - Using the story of Joel who he helped develop a photography skill, Ben helps people flip the script and help their community. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Pleasant Green YouTube Channel
Ep 97How Secure is "In the Cloud?" with Randall Magiera
Just because something is in the cloud, doesn't always mean that it is safe and secure and that you don't play a role in keeping it that way. Those who move into the cloud need to understand cloud security best practices and how to implement them. Today's guest is Dr. Randall Magiera. Dr. Magiera is a cybersecurity professional with over 15 years of experience in security management, change management, risk analysis, intrusion prevention and detection systems, and vulnerability assessments. He has a doctorate of science in cybersecurity, multiple advanced degrees in cybersecurity and technology, and certifications too numerous to list. Show Notes: [1:00] - Randall introduces himself and his background in the field. [3:05] - Things regarding cloud technology have advanced greatly in the last 15 years. [4:09] - These cloud companies do go to great lengths to keep things as secure as possible. [5:16] - The shared responsibility model is important to understand. [6:44] - Large cloud providers do offer some education on best practices to users. [8:01] - Breaches are causing the public to place blame on large companies like Amazon and Google, but it is more related to users not being familiar with how to use the product. [10:47] - A lot of the time, the goal is speed in developing a program, app, or product and security sometimes gets pushed aside. [12:33] - Chris shares a funny story about crypto-mining. [14:48] - Randall explains a recent crypto-mining code placed in a javascript library. [17:50] - Chris and Randall discuss the Colonial Pipeline Attack. [20:00] - A CDN is great for organizations with employees all over the world working in the same program. [23:31] - Ideally, the goal is to have everything stored in the cloud rather than on devices. [25:00] - Malicious actors are motivated by money and they will use the cloud in creative ways as a means to an end. [26:53] - Randall believes that we will be seeing the use of deep fakes more often in coming years. [28:50] - Cloud computing gives users virtually endless capabilities which means that people who are malicious can use them for advanced attacks as well. [31:51] - Per terms and conditions, if you delete data, it is on you. [34:04] - Once something is deleted from the cloud, it is gone forever. [36:21] - Randall describes how AWS works regarding backups. [38:18] - When it comes to disaster recovery, especially for businesses, there is an option for data backup that will create a quick turn around if something happens. [41:51] - Always test your backups and DR. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Dr. Randall Magiera on LinkedIn Tulane University - Randy Magiera
Ep 96Freelance Scams: Red Flags and Warning Signs with Ricardo Fayet
As a freelancer or someone who utilizes them, how can you spot an imposter from an actual business or genuine opportunity? Today's guest is Ricardo Fayet. Ricardo is the co-founder of Reedsy, a community of over 150,000 authors worldwide and a curated network of 1500 handpicked freelance professionals from editors, cover designers, illustrators, book marketers, and publicists. They help bring over 500 books to life every month. Reedsy was named Book Tech Company of 2015 by UK Trade Magazine. Ricardo has been invited to speak at the Frankfurt Book Fair, London Book Fair, and dozens of other writing and publishing conferences. Show Notes: [0:57] - Ricardo shares his background and what Reedsy is all about. [3:10] - There are other freelance websites that are very general. This means they are not very curated. But now there are other sites popping up that are more specific. [5:28] - Asking about work experience is really important. [7:14] - You must trust the platform you are looking for a freelancer on. [8:36] - When hiring a freelancer, you need to treat it as a hiring process. [9:48] - Illustrators and graphic designers are usually easy to hire because you can see their work and choose the style you like. Other jobs are harder to hire. [11:02] - One scam is companies hiring freelancers rather than hiring full time employees to avoid paying for benefits. [12:32] - If a platform guarantees a certain amount earned as a freelancer in the first month or two, doubt it and look at the fine print. [13:39] - There's a tricky email scam that is designed to force you into creating a profile. [16:28] - Create a profile, even if unused, to prevent other artists or freelancers from stealing the identity or your work. Well known platforms can also usually detect when there is a false profile. [18:20] - Large platforms won't be able to investigate until there are victims who have negative experiences with a freelancer. [20:01] - It is highly recommended to charge for services at the beginning of a project. [22:20] - A lot of freelancers on many platforms do not live in the United States and if there is a problem, the legal process becomes almost impossible. [24:00] - Platforms may charge a freelance fee which actually protects both parties. [27:01] - As a freelancer, you are very much at the mercy of the clients and their banks. [29:45] - You have to strike the right balance between solid contracts and trusting people. [33:05] - Don't hesitate to say no to a contract if you feel like something is off. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Reedsy Ricardo Fayet on Twitter Ricardo Fayet on LinkedIn
Ep 956 Basic But Effective Online Security Tips with Jordan Harbinger
People who think they're too smart or savvy to get scammed are the perfect target for social engineering scammers. Today's guest is Jordan Harbinger. Jordan is a lawyer, speaker, entrepreneur, and educator. In addition to hosting the amazingly popular Jordan Harbinger Show, he is a consultant for law enforcement, military, and consulting companies, a member of the New York State BAR Association, and the Northern California chapter of The Society of Professional Journalists. Show Notes: [0:47] - Jordan introduces himself and describes his popular podcast that has been active for 14 years. [1:35] - In the early 90s, as a middle schooler, Jordan discovered his interest in hacking and social engineering. [3:50] - As time went on, Jordan began messing around with cell phones he found. [6:17] - What really got Jordan interested in social engineering was listening in illegally on other peoples' phone calls for hours. [8:14] - In these phone calls, he listened to "real drama." [9:16] - Because of this, 13 year old Jordan realized that people are complex systems but can certainly still be reprogrammed. [10:20] - Jordan shares a story of someone he listened to when tapping into phone calls and what he learned from it as a teen. [14:47] - Manipulating someone who has a big ego or is narcissistic is one of the easiest triggers for social engineering. [17:23] - The easiest people to manipulate are the ones who think they are too smart to get caught up in a scam. [18:50] - As a teen, Jordan was always shocked at some of the things he tried that worked. [21:16] - Imagine what older and more technically savvy adults could do if Jordan as a 13 year old could figure out so much. [24:02] - Jordan and Chris reflect on how unsafe and naive society was in the 90s. [27:40] - Getting scammed is one of the worst feelings ever. [29:14] - Social engineering scams are very sophisticated these days. [31:40] - You can still trust people, but you have to be careful. If you don't trust anyone at all, you'll be miserable. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Jordan Harbinger Show
Ep 94Scams Targeting Website Owners with Liz Eisworth
When you own a business, your website represents you. Scammers can prey on your emotions for their gain by sending false claims of copyright infringement or even other lucrative opportunities that are fake. Knowing what to look out for prevents their negative impact on you and your business. Today's guest is Liz Eisworth. Liz is the founder of SangFroid Web Design specializing in web design, custom WordPress themes, SEO, and digital marketing. She works with businesses to understand all aspects of their website. Show Notes: [0:50] - Welcome to the show, Liz! Liz shares her background and business in web design, online presence, and SEO. [2:21] - Liz describes the common scams that target website owners, starting with domain slamming scams. [4:18] - The reason this happens is because once you register for a domain, your information becomes public. [5:40] - Domain slamming is not an outright crime, but it is certainly unethical. [8:12] - In combination with other things, the length of time a domain name has been owned can be a red flag. [9:30] - Social engineering can also take place with the registrar that your domain name is registered with. [11:20] - It is easy for scammers to set up a fake and flimsy online presence. [12:09] - Phishing scams are often submitted through contact forms on a business's website. [13:36] - These phishing scams have gotten much more sophisticated in the last year and cause enough panic to have the owner click a dangerous link. [16:07] - There are a lot of royalty free stock photo websites that you can find safe images to use on your website. This will help you avoid copyright infringement. [18:26] - Chris shares an experience with registering a trademark that Liz confirms is very common. [20:20] - Liz describes the third party payout scam. [22:11] - In these scams, a detailed and simultaneously vague email will request a project be done. [24:40] - If someone overpays you for a service, be skeptical. [28:01] - The extra details in the initial email could be a red flag. [29:40] - The use of details is intended to distract you. [31:08] - Liz works primarily with small to medium sized businesses, but large companies are also very susceptible to scams. [32:52] - Social engineering and preying on emotions are the common threads between all scams. [35:41] - False authority in an email can also be a red flag. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest SangFroid Web Design Web Page Liz Eisworth on LinkedIn
Ep 93The Risks of Online Gaming with Eric R. Jones
Transparency in a family builds trust, but sharing information while gaming online can set you up for unnecessary risks. Your children may be sharing details that can impact not just them, but you. Today's guest is Eric Jones. Eric is an experienced product manager and developer with over 20 years experience and more than 9 years in Agile Software Development. He is the founder and creator of All Knowing Parent focused on educating people on all avenues of technology and hardware. Show Notes: [0:50] - Eric shares what he does as a career and about his startup. [2:27] - As a father of two young girls, Eric is adamant about monitoring technology use. [3:50] - Eric is a big believer in transparency. [5:40] - Gaming is not just a casual hobby anymore. [7:01] - On all gaming consoles there is some sort of communication with other players online available both as text and voice. [9:10] - On some platforms, you have to be "friends" with someone to play together. Some games do a better job than others on safety. [10:15] - Eric talks daily to his children about safety in gaming. These conversations started before they were even playing it. [12:03] - Setting rules ahead of time is important to avoid cleaning up a mess. [13:23] - Kids tend to give out so much information easily. [14:48] - What are the pieces of information that you should make sure are kept private? Eric says everything. [17:01] - Even giving out gamer handles from other consoles shouldn't be shared. [18:28] - Consoles protect your IP address better but gaming on servers do not. [20:25] - Almost everything these days is connected to the internet. Unfortunately, a lot of pressure is put on the user. [22:18] - When you're playing online, you don't see the type of people you play with through a username. Eric explains what swatting is. [23:20] - People can also raid a streamer's channel with obscenities and can piece together information through social engineering. [25:03] - Don't assume someone doesn't want your information. They may hack you simply as a launching off point to something else. [26:41] - Referring to a previous episode, everything connected to the internet can slowly give away pieces of information. [28:16] - Social engineering is not as hard as you might think in online gaming just by watching how you play. [30:57] - Children trust first and as adults, we've learned to trust second. [31:54] - A gaming company's priority is not user safety. [33:16] - If playing with people you don't know, be extremely kind and avoid topics like politics and religion. [35:21] - DDoS attacks are less common these days but can still happen. [39:11] - Unfortunately, if a kid really wants something, they will be motivated to get around things you have in place to keep them safe. [39:45] - Eric describes how and why he founded All Knowing Parent. [41:14] - Eric's goal is to educate and be a support for people to better understand the technology in their life. [43:12] - There are no cookie-cutter answers. Eric helps people with each question as they arise and gives an example of a recent customer question. [44:10] - All Knowing Parent is offering discounts for Easy Prey listeners! Check that out at AllKnowingParent.com/EasyPrey Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest All Knowing Parent Website All Knowing Parent - Easy Prey Special Discounts All Knowing Parent on Facebook All Knowing Parent on Twitter All Knowing Parent on Instagram
Ep 92Building a Scammer Free Professional Network with Ken Rutkowski
We all have limited resources when it comes to time, money, and energy so in a world where people can create fake personas online, how can you be a part of a community that weeds out imposters? Today's guest is Ken Rutkowski. Ken is a business talk radio personality, innovative strategist, international speaker, and the founder of Metal International. Ken has done government consultation for thirteen different countries and collaborations with Google, Yahoo, Microsoft, Surf Air, Motorola, AT&T, and numerous others. He's been featured on Good Morning America, Oprah, The New York Times, The Wall Street Journal, Bloomberg, The Chicago Tribune, Miami-Herald, Forbes and many other networks and publications around the world. Show Notes: [1:00] - Welcome to the show, Ken! Ken shares his background and why he was led to his career in radio. [2:01] - Ken is one of the early developers of podcasts. [3:17] - When he moved to Los Angeles, he realized that many people he met were imposters. [4:48] - Ken shares that his image has been used to catfish women online. [5:59] - Most people are on Facebook and some sort of photo platform like Instagram. Ken explains why he has a LinkedIn. [6:43] - It's advised to search an image to find the history of it and Ken shares a useful AI tool. [8:01] - Chris predominantly uses video to chat with people and explains why. [10:03] - Go beyond the conversation of business. [11:31] - Ken demonstrates the pyramid of friendship and how you can determine a stable relationship. [13:05] - When talking to others online, Ken looks for specific types of people. [15:08] - How can you tell the difference between a $30,000 millionaire from a legitimate millionaire? [16:10] - Remove time-sensitivity. [18:12] - The pyramid of friends and relationships is important to keep in mind when determining the legitimacy of someone's online persona. [20:23] - There are specific types of relationships that determine your circle of trust. [21:14] - Because many people spend so much time on Facebook, people are spending time in the "friend and acquaintance zones." [23:28] - To keep up with your circle of trust in a digital world, Ken recommends WhatsApp groups. [25:01] - In virtual events, Ken has two banned topics: religion and politics. [26:43] - Genuine community protects you. [29:11] - Everyone should create their own social circle and then fire those who are complicating things. [30:41] - Ken describes a trust token program he is working on. [32:14] - Ken and Chris have a mutual friend and he demonstrates how he used social engineering to vet the legitimacy of Chris's relationship with him. [34:01] - Ken's online community began as an in-person community. He curates who his members are. [36:49] - What are the rules of Ken's community? [38:40] - It is not just your money that is vulnerable to scammers, but your time and energy. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Metal International Web Page Ken Rutkowski on Twitter Ken Rutkowski on Instagram Ken Rutkowski on LinkedIn Ken Rutkowski on Facebook Ken Rutkowski Home Page
Ep 91How to Donate Wisely and Avoid Charity Scams with Laurie Styron
Some organizations may use misleading language or pressure you as they solicit for a donation and this can cause distrust. Research is needed to make sure your money is going to the charity of choice and not a predator preying on your emotions. Today's guest is Laurie Styron. Laurie was appointed the Executive Director of CharityWatch, American Institute of Philanthropy in 2020. She served as CharityWatch's Senior Analyst for 16 years and thereafter as a Program Consultant through her nonprofit accounting and consulting practice. Laurie has been quoted in The New York Times, Los Angeles Times, The Wall Street Journal, NBC Nightly News, and by many other media outlets. She has also vetted charities for Good Morning America and has worked with 60 Minutes and many other news organizations on charity related investigations. Show Notes: [1:53] - Laurie shares how she started with CharityWatch and why she was drawn to working in a nonprofit. [3:31] - The founder of CharityWatch realized people were not making fact based decisions around donating to charities. [5:04] - There has been some effort to regulate and enforce how donations are used. [6:14] - Niche and very specific causes are harder to raise money for. [8:14] - The funding for regulators is insufficient for them to adequately oversee. [9:40] - Laurie explains how to vet a charity on CharityWatch and gives an example of how organizations are ranked on the site. [11:50] - Sometimes organizations will use donations as their funds to continue marketing for more donations which causes an ineffective cycle. [14:06] - A lot of donors get really focused on the salaries of charity executives. [15:05] - It is actually a red flag if board officers are not paid enough. [18:17] - There are not enough people in the United States with a masters degree that could work for a low salary. [20:46] - Going into the season of giving, avoid high pressure tactics. [22:12] - A lot of fundraisers have expert scripts that are designed to pressure you. Laurie gives tips on how to say no. [25:01] - Laurie gives advice on how to use your emotions to choose a charity for a cause you are passionate about. [26:33] - Laurie tells the story of a crowdfunding scam that was well intentioned but the money raised was not done by someone who could execute the result. [28:41] - She shares another story of fake campaigns on GoFundMe as copycats. [30:22] - You have the ability to check filings, tax information, and registrations for organizations. Crowdfunding sites do not vet their account holders. [32:36] - Cut out the middleman. Donate directly. [34:02] - It is advised to only donate on crowdfunding sites to those you know. [35:04] - It is not logical for a charity to use 100% of all donations on the cause. [37:24] - Laurie describes how charities are rated on a grade scale on CharityWatch's website. [38:35] - There are other sites that rate and rank charities but not all are reliable. [40:57] - When you are doing your research, ask yourself what the site's process is. [43:00] - Sometimes, third party platforms will hold on to the money for longer than necessary and Laurie says to donate directly. [45:47] - If you send small donations across multiple charities, your donations will be much smaller due to fees. [49:42] - Make that little bit of research you do before you donate part of your giving. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest CharityWatch.org
Ep 90Internet Defamation with Kenton Hutcherson
With the sense of anonymity, people often post false claims, lies, and private information that can impact a person's livelihood. Illegal content such as copyright infringement, invasion of privacy, and defamation are on the rise on the internet. But there is something to be done about it. Today's guest is Kenton Hutcherson. Kenton is an attorney and owner of Hutcherson Law. He and his team focus on a very specific niche of law: helping people, professionals, and businesses who have been attacked on the internet. Show Notes: [1:11] - Kenton explains the three types of cases he works with - internet defamation, copyright infringement, and invasion of privacy. [2:20] - Kenton shares his background and journey as an educator and lawyer. [4:15] - The pandemic in particular caused a lot of interesting problems that Kenton has worked to solve. [5:36] - Defamation encompasses libel and slander. Kenton explains the difference. [7:00] - Written posts on the internet can harm people many years later. [8:27] - When does it make sense to see a lawyer for internet defamation? [9:50] - Is the damage being caused worth the cost of a lawyer? Kenton describes the clients that usually merit hiring a lawyer. [11:57] - Sometimes a bad situation is to cut your losses and move on. [13:20] - You want a better life, not a better lawsuit. Be a kind and respectful person. [14:46] - Extortion by defamation is unfortunately common by consumers. [15:43] - Not all reviews are true and accurate. [16:56] - The Communications Decency Act has created safety for review sites themselves because it is user generated content. [18:53] - Google has stepped in and will remove some sites and reviews from searches when review sites refuse to take down a false review. [20:50] - Kenton has worked with Yelp previously. He shares Yelp's policy for defamation. [23:01] - Sometimes people will use throw away accounts that they can't access again in order to change their review or post. [24:01] - You can also hire a reputation manager who can help bury negative false claims. [25:01] - Kenton shares an example of a case and client he has had. [29:03] - The case Kenton shares demonstrates how people can truly destroy a business. [31:12] - In this case, the convict broke out of prison. He did not stop pursuing Kenton's client. [32:55] - Kenton's team contacts Google, Yahoo, Bing, and other search engines to take down posts and reviews for their clients. [34:09] - Simply express your opinion. Do not post false assertions of facts. [35:50] - For both sides, a lawsuit can damage their lives. [36:32] - If you are sued, you cannot discharge this with bankruptcy. [39:05] - Defamation is approached a bit differently if it is a competitor. [40:08] - Kenton describes how an internet lawyer unmasks defamation. [41:56] - You need to have enough materials and content to analyze. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Hutcherson Law Website
Ep 89Women's Safety Tips with Jessa Russell
Safety in public spaces can be complex. There are things that you can do to be prepared and alert in all situations. Techniques can be used to distract someone long enough to escape, no matter the size of the attacker. Today's guest is Lieutenant Jessa Russell. Lieutenant Russell serves as the Community Relations Officer for Highland Park Department of Public Safety. In this role, she assists with crime prevention, safety education presentations, crime watch, community welfare concerns, and is the liaison to the Highland Park ISD. Lieutenant Russell began her career with Highland Park DPS in August 2008 and has served as a field training officer, defense tactics instructor, and operations supervisor. Show Notes: [1:01] - Welcome to the podcast, Lieutenant Russell! Jessa explains how she got into law enforcement. [3:40] - Every department has different norms. Jessa describes the more common problems her department responds to. [5:10] - What is jugging? Jessa describes this crime and what to do to avoid it. [7:06] - There are more fire stations than police stations and if you are being followed, pulling into a fire station could cause them to stop. [9:01] - Always be skeptical. The world is a good place but there are bad people in it. [11:12] - Restaurants and bars are places to have a heightened situational awareness. [13:14] - If you are on a walk or run, only use one earbud. [14:51] - You have to be assertive. Political correctness will hamper you when safety is a concern. [16:30] - Park close to lights and the closer to the store the better. You can also request security officers or employees to escort you to the car. [17:49] - There are different mindsets regarding an attack. [19:12] - RAD is a program that Jessa educates through. It stands for Rape Aggression Defense. She explains the program and the training involved. [20:58] - Some women are taught to be so submissive that they don't realize they have power, which can simply be your voice. [21:54] - Training does not mean you are a fighter. The techniques are designed to escape. [24:20] - Most attackers are known to the victims, but random attacks can happen as well. [25:28] - Assertively yelling "stay away" instead of screaming for help will catch someone's attention more. [26:33] - Chris shares a story to demonstrate how bystanders may not know if the situation is serious. [28:47] - Jessa gives tips on how to help someone in danger. [29:50] - Noticing clothes is great, but noticing shoes is even better. [31:00] - Jessa explains what is important to note in describing an attacker. [34:18] - Remembering the first few characters of a license plate is often enough to help. Remembering all is very challenging. [36:50] - You need to know what to do if you are ever pulled over. [39:43] - If someone is trying to rape you and you are not fighting back, you are not at fault at all. [41:24] - Every department has a victim liaison. [43:18] - Don't be afraid to report something and work with the police. [44:40] - Always lock doors and keep valuables in the house. [47:41] - Jessa discusses carrying a gun and the importance of knowing how to properly use it if you want to have it. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest RAD Systems Website
Ep 8820 Ways You Are Ruining Your Credit
For most people, figuring out how our credit score is calculated is a black box. Learning what impacts your credit score gives you flexibility to change it. Here are twenty ways you are ruining your credit. Today's guest is Steve Snyder. Steve is an author, speaker, and one of the top personal finance commentators in the country trained by the Fair Isaac Corporation, the firm that created the score that credit reporting agencies use to calculate a consumer's credit worthiness. FICO Score is widely recognized as the industry standard for lenders. Steve has been quoted in the US News World Report, The Wall Street Journal, Newsweek, The Washington Post, and many others. Show Notes: [1:03] - Welcome to the podcast, Steve! Steve describes what he does in his career and what got him interested. [2:43] - Steve recovered from bankruptcy in less than eight months and realized that most people have no idea how to manage their credit. [3:34] - The biggest mistake is not knowing that you have three credit scores. [4:50] - The three scoring companies from Equifax, Experian, and TransUnion. [5:41] - Not all lenders report to your credit reports which is why scores can be different. [8:05] - There's a system in place to correct things that are wrong with the large scoring companies. [9:01] - Most people purchase the wrong scores. Most of the scores you are bombarded with online are fake. [10:43] - Steve explains why the vantage score was created and why your FICO score is more important. [12:01] - Debts going to collections, late payments, judgments, liens, bankruptcies, high utilization, negatively impact your credit. [13:51] - Steve explains how shopping for cars and mortgages shows up as multiple inquiries on your credit. [15:50] - Most people don't realize that they have a utilization sweet spot. [17:05] - No utilization can be bad for your credit score as well. You can have too much or too little. [19:01] - Having a credit card is the first step. Using it is the second. [21:45] - Your credit history goes back longer than just recent months and years. [23:35] - You never want to randomly close credit accounts even if it is an unused card that you've had for a long time. [24:40] - Never fight about your credit on your credit reports. If you have an issue, take it to small claims court. [27:41] - Most people do not understand how credit works because we are not prepared early in life. [29:21] - Steve is not going to ever risk his perfect credit scores by co-signing anything even with his own children. [32:00] - Co-signing student loans can be detrimental. [34:11] - It is wise to freeze your children's credit until they are ready to use it. [35:26] - Steve explains the meaning of "thickening a thin credit file." [37:46] - People think that because they make a lot of money that money will take care of everything else. [39:25] - Allowing collections to show on your credit is a huge mistake but is easily rectified. [40:51] - Steve explains the difference between a charge off and a settlement. [42:00] - Too many credit inquiries lowers your score but will also "spook lenders." [43:16] - You could be paying off the wrong things. Your credit score is heavily weighted on your personal credit balance. [45:01] - Business and personal finances should be separate. [46:55] - No interest business credit cards are a great way to get started, but you have to be disciplined with a real business idea. [49:25] - The best time to apply for credit is when you don't need it. Don't wait for the emergency. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest After Bankruptcy Website Credit After Bankruptcy by Steve Snyder
Ep 877 Ways You Are Being Influenced with Dr. Robert Cialdini
There are methods used to influence us to either buy or do something. We may even be persuaded to participate and only later on wonder how they got us to join. It is beneficial to know these seven principles that compel us to react. Today's guest is Dr. Robert Cialdini. Dr. Cialdini is an author and keynote speaker as a leading expert on influence and persuasion. His books are published in 44 different languages and have sold over 7 million copies. He's a New York Times, Wall Street Journal, and USA Today best-selling author. He's also been elected to membership in the National Academy of Sciences. Show Notes: [1:10] - Dr. Cialdini got into this field because he was easily persuaded in the past. [3:05] - Incognito, Dr. Cialdini answered as many ads and training programs he could get into to see how advertisers convinced people to buy. [4:40] - In his research, he found that there are seven principles to persuasion. [5:44] - The first principle is the principle of reciprocation. This is present in every culture. [6:57] - First someone gives you something and then you feel obligated to give back. [9:03] - Chris shares an experience at a restaurant to receive something for free that actually required him to do something first. [11:37] - Is something genuinely giving you something or trapping you into compliance? [12:19] - The second principle is the principle of "liking." You will be influenced more by those who you like. [13:48] - One way to get people to like us is to give them something which ties right into the principle of reciprocity. [16:12] - Step back from the situation and separate the salesperson from what he or she is offering. [17:18] - The next principle is the principle of social proof. If a lot of people are choosing or favoring something, it seems like something you should do, too. [18:28] - We recognize when there are fake reviews. 5 star reviews generally make us skeptical. [21:04] - Dr. Cialdini describes a study done in McDonald's that boosted sales of one menu item by 40%. [24:48] - The next principle is similar to social proof and decreases someone's uncertainty. It is the principle of authority. [25:58] - The problem with assuming someone is an expert is the appearance of actors and influencers being paid to promote. [27:34] - Ask yourself, "Is this person an authority on the topic at hand?" [28:32] - Also ask if the person is being unbiased in their testimonial. [30:19] - The next principle is the principle of consistency. [32:01] - Dr. Cialdini shares why he no longer signs petitions. The pressure to be consistent can motivate us to do things we don't want to do. [35:28] - Sometimes sales sites will list an item or booking that there are only two left at this price and list a number of people also looking at the listing. [37:38] - We don't know all the time if something is legit. [39:55] - Dr. Cialdini added a seventh principle to his book called the principle of community. [41:17] - Dr. Cialdini demonstrates how this works with a personal example. [43:11] - Be wary of promotions within your "tribe." [44:12] - Some companies will ask for collaboration to create unity and produce customer loyalty. [47:09] - Dr. Cialdini shares a story about letting people into one's house. [50:55] - Check out Dr. Cialdini's website for a Harvard article to help prevent digital attacks on your organization or business. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Influence at Work Website Influence, New and Expanded: The Psychology of Persuasion by Dr. Robert Cialdini
Ep 86Cybercrime Investigations with Ken Gamble
Criminals feel safe to hide behind the internet. They hire people and train them to be effective salespeople with the goal of taking your money. Let's look at a few ways to do our due diligence to be sure that who you are working with online are who they say they are. Today's guest is Ken Gamble. Ken is a professional investigator, corporate security specialist, and cybercrime expert with 33 years of experience working for individuals and multinational corporations. He is the co-founder and executive chairman of IFW Global that conducts fraud investigations, asset tracking, fraud recovery, disruption and prevention of global cybercrime, monitoring enforcement actions to protect and recover assets for worldwide clients. He is the current Australian chairman of the International Association of Cybercrime Prevention, a non-profit association founded in Paris in 2006. Ken is an accomplished surveillance specialist and former surveillance advisor contractor to a commonwealth government agency in Australia and a consultant to numerous law enforcement agencies in the US, Asia, and Europe as well as several foreign governments. Show Notes: [1:23] - Ken shares his background and international experience. [2:41] - In his career, Ken has worked in all sectors of investigation. [3:50] - What inspired Ken to get into this field? The internet. [6:00] - International crimes are very complicated to pursue which has made crime on the internet so impactful. [8:01] - Although challenging, it is possible to track people down by following a digital footprint and mistakes. [9:39] - The type of work Ken does is very high-end. [10:47] - Ken has worked for foreign governments and government officials for many high-end cases. [11:37] - Following the money doesn't lead to the scammer. Ken describes other methods to track the location of criminals. [13:05] - A lot of success comes from informants and whistle-blowers. [13:55] - Sometimes people work in a call center not knowing that they are working for a scam organization. [15:02] - This is a male-dominated industry, specifically young men. [17:06] - Although these criminals are ruthless, they are well spoken, polished speakers and are generally very charming. [18:03] - Craigslist is often used to attract job applicants. [19:37] - Criminal organizations are extremely manipulative to those who come to realize that the operations are wrong. [22:38] - A big red flag is talking to someone and not ever seeing them either in person or on a video chat. [24:25] - Do your due diligence and research who you're talking to. [26:54] - Criminal organizations train employees through very well rehearsed scripts. [29:23] - The number one red flag is that criminal organizations are not regulated firms. [30:52] - Cryptocurrency is a big trend in scams currently. [33:18] - There are a lot of new challenges with cryptocurrency fraud. [35:22] - Cybercrime organizations are extremely sophisticated. [36:55] - Many organizations have mastered moving funds to other countries that won't cooperate with law enforcement. [38:29] - Being able to reveal who the criminals are leads to a better chance at asset recovery. [40:02] - If Ken can identify a criminal and freeze accounts, it worries them. Paying back a client is how they can get out of their predicament. [41:18] - Some countries are more favorable to the victim and others are not. [42:37] - Ken now takes the media along to busts to expose criminals and educate the public. [44:09] - Financial crime is devastating to the victim. [46:50] - Criminals sometimes feel extreme guilt but they justify their actions. [51:15] - If you want to invest in something, ask for second opinions and do your due diligence and research. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest IFW Global Website Ken Gamble on LinkedIn
Ep 85Surveillance and Student Privacy with Jason Kelley
Surveillance cameras and other student monitoring tools are becoming more and more common in schools today. Laptops are distributed to the students and software is installed on them for their own protection, but it is important to know what is being done with the data collected outside of classroom use and if your students or your own privacy is being invaded. Today's guest is Jason Kelley. Jason is the Associate Director of Digital Strategy at the Electronic Frontier Foundation, focusing on how privacy and surveillance impact digital liberties. Before joining EFF, Jason managed marketing strategy and content for a software company that helps non-programmers learn to code, and advertising and marketing analytics for a student loan startup. Show Notes: [0:53] - Jason describes his current role at Electronic Frontier Foundation. [2:32] - Big tech companies who offer devices to schools collect data from them. [4:17] - Physical surveillance has increased due to the continuous problem of school shootings. [6:01] - Surveillance cameras can be accessed directly by local police. Jason explains how this can be controversial. [8:34] - Jason and Chris discuss the reason for using school-issued devices only for education purposes. [9:53] - Surveillance cameras do have blind spots. Facial recognition also has some issues. [11:03] - When devices are provided, parents, young people, and even administrators don't always know the capabilities. [12:22] - Jason shares an example of one of the pitfalls of student monitoring apps that are on school issued devices. [14:07] - Schools can take screen captures from issued devices which isn't done out of malice but does raise questions about privacy. [15:12] - We have to choose which is more important: safety or privacy. [16:37] - Students and parents need to know that school issued devices have features that will impact privacy. [17:32] - Jason describes some of the differences between the types of alerts school administrators receive. [19:12] - Sometimes software blocks things that are safe and doesn't block things that could potentially be inappropriate. [20:50] - Teachers cannot have their eyes on every student's computer at all times and often rely on software to help. [22:04] - Teachers shouldn't be expected to know how surveillance software works. [23:01] - Jason describes a recent problem at Dartmouth with Canvas logs. [26:27] - This issue at Dartmouth was very serious and could have impacted the students' careers drastically. [28:21] - There is an epidemic of misunderstandings of technology. [29:24] - EFF offers guides for students on what to do and expect with school-issued devices. [30:42] - There have been a lot of successful petitions in recent years about data tracking in universities. Parents have some leverage here as well. [33:00] - Sometimes, there's not anything you can do about student surveillance. [34:20] - The Covid-19 pandemic made things very challenging as students needed access to education remotely very quickly. [36:50] - Jason describes some of the features of remote proctoring programs. [38:33] - This vastly impacted thousands of students who took the BAR exam. [40:36] - EFF has been pushing back on proctoring and Jason explains a recent win. [42:18] - Jason is hopeful that the pandemic has made it more clear where technology fails us. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Electronic Frontier Foundation Website Jason Kelley on LinkedIn Jason Kelley on Twitter EFF on Twitter EFF on Facebook EFF on Instagram EFF on YouTube
Ep 84Gaslighting with Dr. Deborah Vinall
The term "gaslighting" is becoming more commonly used as people come to understand the psychological impact. It is important to identify the techniques used by someone to maintain an unhealthy relationship so you can avoid it or change it. Today's guest is Dr. Deborah Vinall. Dr. Vinall is not only a licensed marriage and family therapist, but also a doctor of psychology. She is a certified trauma therapist that uses EMDR and brain spotting. Dr. Vinall is the author of Gaslighting: A Step by Step Recovery Guide to Heal From Emotional Abuse and Building Healthy Relationships. Show Notes: [1:18] - Dr. Vinall explains why she wrote her recent book as gaslighting is something a lot of people experience but don't understand. [2:42] - What is gaslighting? Dr. Vinall gives an example. [3:18] - Gaslighting can happen anywhere and with anyone. [4:06] - There are different types of gaslighting that range from fully calculated to more defensive in nature. [5:01] - Many people exhibit gaslighting at some point in their lives, but patterns are when things get problematic. [6:19] - Insecurity is one reason many people tend to gaslight. [7:29] - What are some signs for pattern gaslighters? [8:22] - Pattern gaslighters are often very charming in public but are much different behind closed doors. [10:00] - What is "normal" and what is problematic? Look inside and see how you feel around this person. [11:03] - Dr. Vinall gives tips on how to manage situations where it is a co-worker that you can't make a break from. [12:53] - When confronted, pattern gaslighters may dismiss accusations or could "fly off the handle." [13:49] - In relationships, gaslighters tend to move very fast. [15:22] - In cases where relationships are deeply connected, Dr. Vinall suggests reaching out to a lawyer. She also discusses the impact of violence escalation. [18:02] - There is a distinction between occasional gaslighting and chronic pathological gaslighting. [19:39] - Try some different strategies in the workplace and think of an exit plan in case a change is needed. [21:12] - Journaling is an excellent tool to help you release and sort through your thoughts and can also be used later to confirm to yourself that you are not crazy. [22:58] - A red flag of gaslighting is someone trying to pull you away from your support system and external relationships. [24:11] - It's important to grieve the loss of a relationship and all the things that go with it. [25:26] - Notice your self-talk. You can start internalizing the negative talk that you hear from someone who gaslights you. [27:19] - Being a gaslighter may be difficult to overcome as there's something deeper going on and you must want to heal. [28:07] - Take your time in a relationship and listen to your intuition. [29:49] - Figuring out your boundaries for those in your life who you don't want to cut out. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Gaslighting: A Step by Step Recovery Guide to Heal From Emotional Abuse and Building Healthy Relationships by Dr. Deborah Vinall Counseling Services with Dr. Deborah Vinall Dr. Deborah Vinall on LinkedIn
Ep 83Securing Your IoT Smarthome with Amanda Fennell
Home technology can be hacked. Anything from a coffee machine or LED light to a TV or a doorbell. We understand the risk of being vulnerable on our tablets and phones, but you'll be shocked to realize how much data is collected from our other smart devices and how those very same devices can lead to a much wider compromise. Many of us don't even know how many devices are on our connected networks, so we better listen up. Today's guest is Amanda Fennell. Amanda is the Chief Security Officer and Chief Information Officer at Relativity. In her role, she is responsible for championing and directing their tech and security strategies including risk management and compliance practices. She has a Master's degree in Forensic Science and over 15 years of experience in Forensics and Cyber Security. Show Notes: [1:12] - Amanda explains Relativity, her roles in the company, and how she was drawn to this field. [3:35] - Many people assume Amanda has all the new and greatest technology but knowing the risks of exploitation, she is selective. [4:25] - There are a multitude of devices that people don't even realize they connect to their network. [5:23] - Because of the sheer volume of devices, hackers can do a sweep and use the information gathered. [6:32] - The number one security problem is keeping things up to date. [8:16] - Amanda walks through the simple steps of hacking smart devices. [9:40] - Amanda demonstrates how hacking something seemingly inconsequential can lead to accessing more. [11:23] - You need to know what's connected to your network. You have more than you think. [12:41] - Surprisingly, there are connected lightbulbs that people sacrifice security for ease of access. [14:02] - When guests come over and you share your password, did you take their access back? [15:15] - Amanda is a big fan of segregating your network. She describes what this means. [16:29] - How can you segregate your network? [18:08] - Amanda suggests using WireShark. [19:39] - Many people hang on and use old routers because they still function, but most are not supported with updates after just a few years. [21:18] - It is also common practice to use identifying information as passwords and device names. [22:33] - Even Direct TV can be hacked. How can this be used against you? [23:30] - Amanda shares an investigation and how she used a printer spool file. [25:06] - Medical devices, printers, and copiers can be hacked. [27:29] - Amanda describes the differences between two security companies and what she advises doing to stay secure. [31:40] - How can you implement ongoing monitoring and detection in your home network? [33:52] - Implement updating devices into your monthly or weekly routine. [36:03] - You can do a scan on your network and even ask a friend for help. [37:28] - Smart coffee and smart fridges seem simple but can be used for targeting phishing and even when you are leaving the house. [39:33] - Just making yourself a little less accessible could deter a hacker because others will be easier. [41:43] - Amanda shares how false donations were used in fraud. [43:25] - We all deserve to have our information private and secure but it also needs to be personally accessible. That's the risk. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Relativity Website Security Sandbox Podcast Amanda Fennell on Twitter Relativity on Twitter
Ep 82The Intersection of AI, IoT, and Blockchain
Fear can cause people to hoard. Blockchain would allow transparency that could alleviate those fears. Understanding the trivergance of AI, IoT, and Blockchain can transform your thinking even for those resistant to change. Today's guest is Don Tapscott. Don is one of the world's leading authorities on the impact of technology on business and society having authored 16 widely read books, including the global bestseller Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World, now translated into 20 different languages. He is currently Co-Founder & Executive Chairman of the Blockchain Research Institute, an Adjunct Professor at INSEAD, recently a two-term Chancellor of Trent University in Ontario and Member of The Order of Canada. Show Notes: [1:22] - Don shares his professional background, career, and work as an author. [2:55] - The Blockchain Research Institute researches how industries are affected by blockchain technology. [4:41] - Don and Chris think back to the earlier days of the internet. [7:02] - This new generation of technology represents a new paradigm. [8:04] - What is happening in Congress at the moment that could change everything about the industry? [11:35] - New paradigms create a crisis in leadership. Don's life work has been to find leaders who embrace the shift. [13:12] - We view this current time as the second era of the internet. What is different from the previous era? [14:23] - We are moving from an internet of information to an internet of value. [15:21] - People hoard out of fear and this impacts supply chains. [17:09] - Blockchain can be a solution for health records. Many people consider it a problem due to lack of understanding. [18:25] - Blockchain gives people the control to manage their transparency. [20:29] - It takes time for us as a society to figure things out. What is the future of blockchain? [22:19] - Don is speaking at an event about the vision of how industries will be changed by blockchain. [24:43] - Don references years past when CEOs didn't type because that was a secretary's job. It took time to change and it will take time to make these changes as well. [26:06] - There are industries that will be very resistant to change. [26:51] - On the Blockchain Research Institute's website, there are reports on various industries. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Don Tapscott Web Page Men In Suits Music Web Page Blockchain Research Institute Web Page Don Tapscott on Facebook Don Tapscott on Twitter Don Tapscott on Instagram Don Tapschott on LinkedIn Books by Don Tapscott
Ep 81Preventing Identity Theft with Adam Levin
At some point in our life we will encounter a cyber intrusion, either through somewhere we have done business or because we are targeted as an individual. It is important to know how to prevent identity theft as well as how to respond if you've already been compromised. Today's guest is Adam Levin. As a graduate of Stanford University and the University of Michigan School of Law, Adam Levin is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance. He is an author and the former director of the New Jersey Division of Consumer Affairs. Levin is the chairman and founder of Cyber Scout and co-founded Credit.com. He has been featured in the New York TImes, Associated Press, Wall Street Journal, The Los Angeles Times, USA Today, and The Chicago Tribune. In addition to that, he has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC, MSN, and many others. Show Notes: [1:14] - Adam shares his background and education in law and politics. [2:29] - In 2003, Adam created an Identity Theft company that later became a global business called Cyber Scout. [4:49] - Adam believes that security breaches are a certainty of life these days. [6:35] - While hacking has been around for a long time, Adam shares how he got into the business of identity theft protection. [8:36] - Over time, insurance companies have come to be support in identity theft. [10:01] - Chris shares a scenario of a friend that had their identity stolen. [12:23] - Many victims feel like they were in the wrong when in reality they may not have done anything wrong at all. [13:56] - In recent years, the IRS has been a lot more proactive. [16:02] - What is Adam's definition of identity theft? [19:01] - Adam explains why you should be vetting your vendor as well. [21:13] - There are four kinds of threat actors - state sponsored, for-profit, cause-related, and "because I can." [23:29] - Social engineering is the most successful method of identity theft. [25:42] - Adam wrote the book Swiped and explains that there needs to be a new framework around mitigating the threat of identity theft. [26:32] - How do we minimize your risk of exposure? This is very difficult. [27:46] - Two factor authorization is extremely helpful in protection. [28:41] - Always verify that the person you're speaking to is who you think they are. [30:12] - How can you monitor everything on your accounts and reports? [31:37] - One of the ways credit card numbers are sold on the dark web is by zip code which causes many banks to miss fraudulent use. [32:51] - The third "M" is to manage the damage. What can you do after an incident? [34:05] - Identity theft protection programs are relatively inexpensive. [37:01] - You can set the threshold for when you are notified. But you should choose to be notified of any purchase, even the really small ones. [38:50] - How do banks know when there's a fraudulent charge? [40:38] - There are features where you can lock the use of your card before having to change account numbers. [42:33] - The best protector of your portfolios, including your identity, is you the consumer. [44:37] - Adam describes his new podcast called What the Hack. [50:23] - Remember that many people are not who they claim to be. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Adam Levin Web Page What the Hack Podcast with Adam Levin Adam Levin on Twitter Cyber Scout Web Page Cyber Scout on Twitter
Ep 80Attention Thieves with David Kadavy
We can sabotage ourselves by the way we prioritize our day by not differentiating between the urgency of emails and getting distracted or manipulated by the media. Today's guest is David Kadavy. David is the author of the books Mind Management, Not Time Management, The Heart to Start, Design for Hackers, and multiple short reads. David is a self-published coach and the host of the podcast Love Your Work. David has spoken in multiple countries and has been featured in The Overserver, The Huffington Post, Upworthy, and Life Hacker. Show Notes: [1:02] - Welcome to the show, David! David explains what he does in the writing field. [2:50] - Chris admits he is a master procrastinator and tends to spend his time doing tasks that are not as important as others. [3:45] - David explains how he divides things up by mental state. [5:57] - A way to avoid emails that don't need attention right away, David uses a program called Boomerang. [7:38] - David demonstrates how open loops apply to click-bait. [8:56] - The looming possibility of urgent emails can waste energy. [10:10] - David keeps his phone on do not disturb and uses the favorites feature. [12:22] - The news and media can be a huge distraction. [13:10] - If the media captures your attention, it is not a mistake. We are attracted to negativity. [15:47] - You don't need to know everything that is going on every single moment of every single day. But it is hard not to get sucked in. [18:10] - The immediate availability to communication creates urgency that hijacks your attention. [19:30] - The first person that should get your attention is yourself. [21:00] - As you start prioritizing different things, people may stop demanding your attention immediately. [22:23] - David lives in Columbia and the cultural values are much different there than in the United States. [25:19] - People in different countries may look at time differently as well. [28:33] - People also tend to change how they think about time. [30:03] - If there is a specific set of steps to complete a task, AI can do it. But human creativity is missing. [32:27] - David describes a typical writing day for him and how he manages his mind. [35:01] - David explains the science behind why morning grogginess is actually a prime state to be in for creativity. [38:29] - While resting, free association gets a chance to manifest. [41:15] - Arguing viewpoints on social media has become a priority for a lot of people. [44:50] - There's so much fighting for our attention. [45:55] - David shares the titles and brief description of his books linked below. [48:01] - kdv.co is shared as an opportunity to download a free writing toolkit. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest David Kadavy Web Page David Kadavy on Twitter 100-Word Writing Habit Books by Author David Kadavy Love Your Work Podcast David Kadavy's Writing Tools
Ep 79Social Engineering and Pick-Pocketing with Chris Kirsch
Gifted pick-pocketers can use social engineering skills to choose their victims. Many times as we travel, we may not realize that our body language makes us an easy target. Today's guest is Chris Kirsch. Chris is the CRO and co-founder of Rumble. With a background in product marketing and technical mindset, he has helped formulate go-to marketing strategies at PGP, Rapid7, and Veracode. In 2017, he earned the black badge for winning the social engineering capture the flag competition at DEFCON. He has a passion for InfoSec, OSINT, and is a volunteer advisor for the National Child Protection Task Force. Show Notes: [1:05] - Welcome Chris! Chris shares his background. [2:20] - Chris co-founded Rumble, an asset discovery company to help clients secure their network. [3:48] - Pick-pocketers are masters of misdirection. [6:34] - Chris explains why he got into the social engineering side of DEFCON. [8:18] - When in Paris, Chris's father was pick-pocketed which prompted him to start researching. [11:18] - After meeting a magician at a convention, Chris then became interested in open-source intelligence (OSINT). [11:51] - Chris defines the difference between the two schools of thought on pick-pocketing. [13:29] - Some pick-pocketers can steal without interacting with people while others utilize social interactions. [15:31] - Chris shares in more detail the story of his father being pick-pocketed. [17:38] - This experience showed Chris and his family a way that teams of people can work together to fool a target. [20:03] - There are some unusual laws that limit consequences for theft. [21:50] - Chris shares tips on where to place your wallet when traveling and demonstrates a scenario. [25:18] - Escalators are areas where pick-pocketing teams can be very successful. [28:17] - Placing your hand in your pocket to intentionally keep your belongings safe might actually make you a target. [30:31] - When something else is on your mind, you are an easy target. It is hard to always be aware. [33:19] - Chris uses an example of a phishing scam that demonstrates social engineers move you from rational thinking to emotional. [36:20] - Many people take these scams personally when in reality, scammers have no idea who you are. [38:27] - Chris references a documentary from the point of view of a social engineering target. [40:51] - Darren Brown on YouTube and Netflix has several videos and shows that demonstrate the psychology of many scams and manipulation. [43:59] - The sample you are seeing is what the person wants you to see. [45:12] - Chris gives actionable steps to take when feeling suspicious. [47:09] - Chris describes a time when he was able to use social engineering strategies that would have been shot down if the target had done something simple. [49:21] - For the "long con" scammers, Chris has advice about trust. [51:42] - Search for Kirsch Identity Fraud and you find free resources on identity theft. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chris Kirsch on LinkedIn Chris Kirsch on Twitter Rumble Network Discovery Web Page Rumble Discovery on Twitter
Ep 78School Safety and Security with Jason Stoddard
You cannot separate community and school safety from each other. They simply go hand in hand. We've seen adults displaying lack of impulse control on airplanes and as kids go back to school, we cannot underestimate the challenges that may arise. It's important to be prepared to know how to respond. Today's guest is Jason Stoddard. Jason is the Director of School Safety and Security for the Charles County Public Schools. He is responsible for sustaining a safe learning and work environment for over 27,000 students and nearly 4,000 staff members. He is a retired police commander with over 24 years in law enforcement. Show Notes: [0:51] - Jason describes his job and what he is responsible for. [1:40] - Because of everyone's experience in school, everyone has their own opinion of what things should be like even though things have changed. [3:00] - In recent years, ransomware and hacking has been a threat to schools. [4:41] - School issues have not been seen as what they really are: community issues. [5:50] - Jason shares ways he builds relationships within the community for school safety. [7:10] - Handle With Care is a program that is implemented in Jason's county. [8:52] - Instead of asking what's wrong, ask the kid what has happened. [11:14] - We can never over communicate what is going on. Honest conversations are necessary. [12:53] - What could be the ramifications of early experiences with the criminal justice system? [14:40] - When the police arrest a child that could affect their safety, Jason shares that in his county, they are required to report it to him and his team. [16:01] - Jason's county is also committed to working with law enforcement regarding gangs. [18:24] - There are some services that provide social media monitoring but there are some problems with using this. [20:48] - Kids need to feel comfortable bringing information forward. [21:17] - Jason believes that this school year is set up for tragedy. [23:22] - Any school system is built on layers. It can never be just one plan. [24:58] - How do we get kids to the services they need to help them with impulse control? [26:08] - School safety programs cannot force kids into mediation programs. [28:10] - When students are suspended, they are missing out on their education and sometimes can't get caught up. This creates a cycle for more misbehavior. [31:15] - School systems see all the same problems everyone else sees but with the added kid component. [33:19] - Malware and ransomware are huge problems right now with the increase in virtual learning. [35:54] - Valuable information can be sold on the dark web. [37:27] - Swatting is where someone will call into 911 to get law enforcement to respond. [40:11] - Sometimes kids also hack to change their grades but are usually easily fixed. [41:00] - Teachers will also sometimes write their passwords on a post-it for students to see. [42:01] - Covid-19 continues to be incredibly challenging. [44:57] - Stay connected with what is going on locally, nationally, and from the CDC. [45:56] - The fact that this situation has been so polarizing has made policy very difficult to enforce. [49:53] - Jason explains some of the issues that arose through virtual learning last year. [50:55] - There are so many layers to security and a positive school climate is the key. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jason Stoddard on LinkedIn Charles County Public Schools Safety and Security Web Page
Ep 77Situational Awareness with Robert Montgomery
When seconds count and freezing isn't an option and lives are at stake, how do you prepare to know what to do? Even our bodies have natural reactions. But what can you do to stay calm, level your breathing, and be alert? Today's guest is Robert Montgomery. Robert was an operations officer in the CIA for 34 years and served in some of the most dangerous places in the world. He is also a former Marine and the founder of Guardwell Defense. Robert is an author and teaches training courses such as Combat for Women, Improvised Weapons, and Street Smarts for Students and Businesspeople designed to help anyone mitigate and deal with unexpected violence. Show Notes: [0:53] - Robert shares his background, experience, and how he shifted into training civilians for personal defense. [3:46] - Using security cameras that he can access on his phone, Robert shares the story of seeing people on his property while he was in Afghanistan. [7:29] - Through this experience, Robert realized why his wife was able to stay calm in the moment. [10:13] - Referencing Chris's website and podcast, Robert explains the common scams that he has seen come up. [11:26] - "If you find yourself in a fair fight, you didn't plan properly." [12:27] - There is a correlation between your heart rate and ability to control fine motor skills. [14:12] - Controlling your breathing is the key to lowering your heart rate. [16:37] - Practicing breathing in non-stressful situations can help you in the moment. [18:18] - Chris shares a story that connects to the discussion on adrenaline and fear. [19:51] - You cannot be alert all the time. Being hyper alert can lead to PTSD and often does in members of the military. [23:23] - With situational awareness, you have to stay level headed and make decisions quickly. [24:51] - It is okay to "be rude" if you feel uncomfortable. [27:10] - There are many signals you may notice if approached by a predator. [28:13] - A common situation many people find themselves in is walking or jogging outside with headphones on. This affects their awareness. [31:46] - Situational awareness will mitigate many problems. [32:47] - Robert gives some tips on what to do when beginning to travel again, especially overseas. [35:21] - Maintaining a lower profile to lessen your chances to be targeted for crimes as a tourist can be challenging, but Robert gives advice. [36:28] - Edson Tiger offers an excellent online course for training for travel. [38:27] - Paper copies of things are important in case things are lost. [39:54] - Every citizen should learn the basics of first aid. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Seconds to Live or Die: Life-Saving Lessons from a Former CIA Officer by Robert Montgomery Guard Well Defense Home Page Edson Tiger Training for Travel Course
Ep 76Exposing Weakness Before It's Exploited with Jayson E. Street
There are many ways your network can be accessed, not just remotely but physically. How equipped are you and your coworkers to prevent intrusions? Today's guest is Jayson E. Street. Jayson is the author of Dissecting the Hack: The F0rb1dd3n Network Series. He is the DEFCON Groups Global Ambassador and the VP of InfoSec for SphereNY. He has also spoken at DEFCON, DerbyCon, GRRCon, and at several other cons and colleges on a variety of Information Security topics. Jayson was also featured in The National Geographic series Breakthrough Cyber Terror. Show Notes: [1:00] - Jayson explains how he hacks to help. [1:59] - People want to see how Jayson can get into their facility and rob them. [3:39] - Jayson shares how "being the bad guy" can get the information needed to educate users and clients on preventing more. [4:51] - Jayson has been known to rob banks and shares the story about how he robbed the wrong bank because he had to go to the bathroom. [7:24] - The devices Jayson uses emulate keyboards and code. [9:03] - Some employees for big companies like Microsoft have posted their badge on social media from which Jayson prints and uses as his own. [10:08] - How did Jayson get caught in robbing the wrong bank? [13:21] - He found out later that the bank he robbed by mistake wound up wiping their machines which cost them a lot of money even though Jayson's procedure was harmless. [16:01] - Jayson has a 100% success rate which shows how employees trust anyone who looks official. [17:13] - What is the yellow method and why does Jayson use it? [18:18] - Jayson describes the facility that took the longest amount of time to get into in Jamaica. [20:17] - In one instance, Jayson did not go back to talk to the client after conducting the pen test for a charity. [22:30] - When these tests happen, it isn't about winning and losing. Jayson makes sure he is caught so he can provide education and training. [25:08] - "The biggest thing that people can do to protect themselves is to listen to the voice in the back of your head saying that something is odd or unusual. Realize when you're at work, part of your job and responsibility is to think that something bad may happen." [26:25] - Companies need to give a proper avenue for employees to feel comfortable in reporting something strange. [28:39] - Jayson shares some of the techniques he uses that have a 100% success rate in penetrating the company's network. [30:06] - At events, oftentimes there are company USB drives loaded with giveaway items. These could be dangerous to use. [31:39] - There is no way to completely eliminate threats. The important piece is how you respond to a threat. [33:10] - Network security is great, but physical security of a network is just as important. [35:01] - Jayson explains that the users of the programs in a network are the people that need to have the proper education. [37:45] - Jayson has a program where he gamifies security education. [39:50] - Many people don't realize how easy it is for an official looking badge to be recreated. [41:41] - Jayson describes his most boring and simple robbery he completed in 15 seconds. [42:29] - What was Jayson's most successful interaction? [43:51] - After obliterating a company one year, management took the lessons to heart, educated their team, and had him come back the next year. [46:19] - If pen testers are not rooting for the client, they are in the wrong business. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jayson E. Street Home Page Jayson E. Street on Darknet Diaries Podcast Jayson E. Street on Twitter Jayson E. Street on LinkedIn Dissecting the Hack: The F0rb1dd3n Network by Jayson E. Street
Ep 75Child Exploitation and Human Trafficking with Kevin Metcalf
Children go missing, exploited, and trafficked everyday. It takes investigators, prosecutors, and private sector technology specialists to help them. Misinformation and TV portrayals can impact our resources that are directed to help. Today's guest is Kevin Metcalf. Kevin is a former federal agent turned prosecutor and the founder of The National Child Protection Task Force which brings together recognized experts in the field such as strategic legal applications, open source intelligence, cellular mapping analysis, dark web investigations, and cryptocurrency to help law enforcement agencies everywhere. He has undergone training provided by the National Computer Forensics Institute, the National White Collar Crime Center, and the FBI Cellular Analysis Survey Team, among others. Kevin developed a system for working with cell phone related data in criminal cases that developed into a mobile device foundational course that focuses on the integration of legally-derived information with open source information. Kevin has also published a series of instructional books available on Amazon. Show Notes: [1:26] - Kevin shares his background and how starting the National Child Protection Task Force was not something he initially thought he'd do. [2:20] - As a single parent, Kevin left his job in law enforcement, went back to school, and became a prosecutor. [3:58] - As he was led into working in social media and cell phones, Kevin realized how often he was working on cases that had to do with children. [5:11] - Kevin describes the case that got him national attention and how it led to him working with experts that wanted to come together to help more kids. [7:01] - Chris notes the gap between law enforcement and the technology that is available. Kevin is trying to bridge that gap. [8:00] - How does Kevin deal with the "CSI Effect"? [9:57] - There is a lot of misinformation regarding human trafficking. [10:52] - It is very challenging to convict someone for human trafficking due to little information and the victim not being forthcoming with details out of fear. [12:19] - Most of the time they are able to convict for something else, like drugs or gun charges, which does at least get the person in jail without putting the victim through testifying again. [13:34] - There are a lot of psychological factors involved for victims even years afterwards. [14:55] - Kevin's organization works with missing, exploited, and trafficked children. He explains the difference between exploitation and trafficking. [16:49] - Children who are missing and runaways are at higher risk of being exploited and trafficked. [17:51] - There is a huge problem with missing children investigation or lack thereof. Predators are aware of this and take advantage. [21:21] - There are so many problems with statistics that Kevin doesn't know what questions to ask. [23:18] - Kevin feels that there are two categories for children, missing or not. [24:04] - Kevin lists some of the things that put children at risk, including parents trying to control everything. [27:35] - During the grooming process, predators are looking for the weaknesses in a parent-child relationship. Mental health issues also add another level of vulnerability. [31:10] - The NCPTF is composed of active duty law enforcement. Kevin explains following the rules of the jurisdiction they're working in. [32:51] - Although there are some controversial tools used to investigate these cases, Kevin describes how to prevent breaches in privacy. [35:04] - "You have to understand the limitations of technology. If you don't, you're going to misuse it, screw up an investigation, and arrest the wrong person." [36:19] - Kevin explains the algorithms used for facial recognition, especially using the face of a child. [38:43] - An investigator needs to follow up on every hit used with facial recognition. [39:59] - Kevin describes how the NCPTF hones their technology skills. [41:38] - Predators are using information willingly posted on social media to harm others. [42:51] - It is difficult to make politicians and policy makers understand how bad the situation is and what is needed to prosecute a predator. [45:00] - Newer privacy laws make it difficult to use technology to identify a human trafficker. [46:51] - Using these technological resources for minor infractions is a waste of time and money. They should be used for the major things. [49:27] - It is important to not tip predators off with what they are using to identify them. Sometimes photos and videos will allow investigators to determine their location. [51:14] - A lot of people don't realize how easy it is to find their information. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Erica Stanford on LinkedIn Nationa
Ep 74The Rise and Risks of Cryptocurrency with Erica Stanford
Transferring money through a third party can add substantial fees and using cryptocurrency bypasses those. However, does the emerging technology invite additional risks? Today's guest is Erica Stanford. Erica is founder of the Crypto Curry Club, UK's number one rated networking educational event for blockchain, digital currency, crypto payments AI, and tech for sustainability. She is the author of Crypto Wars: Faked Deaths, Missing Billions, and Industry Disruption. Erica is a public speaker, crypto currier, and conducts blockchain industry reviews. Show Notes: [1:02] - Erica shares what began her interest in cryptocurrency. [2:11] - After being mugged while overseas, Erica explains how she could only access money from a Western Union with high fees. [4:25] - This experience opened Erica's eyes to how many people in the world live without access to money and she learned about cryptocurrency. [5:06] - The Crypto Curry Club started off as a way for Erica to meet other people in the industry through events. [7:17] - Cryptocurrency is digital currency; money that is secured by encryption and blockchain. [9:05] - Prior to crypto, going through a third party was the only way to make a digital exchange. Erica explains what could happen if the third party disappears. [10:50] - Erica explains how blockchain works. [11:56] - The best part of transferring money through cryptocurrency, it is usually free of charge with absolutely no fee. [12:59] - Some businesses would have a minimum transaction amount due to the price they pay in fees. Crypto bypasses that. [14:40] - It is digital money and very volatile. People have started taking advantage of this. [16:02] - There's a lot of hype around cryptocurrency which means it can also get a lot of scammers creating their own currency. [18:22] - Even in cases where the cryptocurrency business is terrible, they still brought in millions of dollars because of the hype. [20:17] - There have been scams where celebrities have been hacked or a fake profile has been created stating to send them money and they'll double it for you. [21:05] - Erica describes recent Ponzi Schemes, networking marketing, and multi-level marketing using cryptocurrency. [22:22] - Cryptocurrency is created through a process called mining. [24:31] - In a recent Ponzi Scheme, good people invested everything they had and lost it. Some people knew it was happening but many were victims. [26:09] - A cryptocurrency business recently shut down. Erica discusses red flags. [27:51] - Erica explains "staking." [28:46] - Some red flags are claims of working with huge companies as customers and partnerships. Scammers can be very brazen. [30:00] - If you see one single thing that is fake or dishonest, you have to assume that there are more things that are untrue. [30:40] - Erica explains why she decided to write the book Crypto Wars. [31:53] - A huge scam that is still shockingly going on inspired Erica to get more information and start her research. [34:23] - That one event and the fact that Erica already had an audience and community, she was asked to write the book. [35:14] - Erica shares a discount code for the book when it is released this month. [36:11] - There have even been faked deaths and Erica tells the story of the scammer behind Quadriga. [38:40] - Some of these shocking stories are really happening and possible with cryptocurrency. [40:16] - There could be ways to track everything, but if someone has been planning a scam, Erica explains how they can get around that. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Erica Stanford on LinkedIn Crypto Wars: Faked Deaths, Missing Billions, and Industry Disruption by Erica Stanford Crypto Curry Club Home Page Crypto Curry Club on Facebook Crypto Curry Club on Instagram Crypto Curry Club on Twitter