loader from loading.io

Privacy and Surveillance

Easy Prey

Release Date: 04/02/2025

Vanishing is a Lie show art Vanishing is a Lie

Easy Prey

Trying to erase yourself from the internet sounds simple until you start counting up old accounts, scattered social media posts, and the hundreds of data brokers quietly collecting and selling your information. The reality is messy, and for most people, the idea of fully disappearing online is more myth than possibility. But there are practical steps you can take to cut down what’s out there and regain some control. My guest, Max Eddy, is a senior staff writer at Wirecutter who covers privacy, security, and software platforms. For one of his projects, he set out to see how much of his own...

info_outline
Hackers Are Winning show art Hackers Are Winning

Easy Prey

Cyberattacks aren’t just about hackers in hoodies anymore. Today, we’re up against professionalized, well-funded organizations that run like businesses. They use AI to crack defenses, run labs that simulate the tools we rely on, and rake in trillions while defenders struggle to keep pace. The scary part? Even the strongest companies and governments can fall behind when the threat landscape moves this fast. My guest, Evan Powell, has spent nearly 30 years in the cybersecurity world. He’s the founder and CEO of Deep Tempo, and a serial entrepreneur who’s helped industries from cloud data...

info_outline
Before the Fraud Tsunami Hits with Ritesh Kotak show art Before the Fraud Tsunami Hits with Ritesh Kotak

Easy Prey

Scams aren’t what they used to be. These days, AI can write perfect emails, mimic voices, and even fake a video call so well you’d swear you were talking to the real person. The problem is, the timing of a scam can be just right when you’re distracted, busy, or looking for exactly what they’re offering. That’s when even the most careful person can get caught. My guest, Ritesh Kotak, knows this world inside and out. He’s a cybersecurity analyst, an Ontario lawyer, and a tech innovator who’s worked with Fortune 500 companies and served in policing, where he helped start one of...

info_outline
Privacy is Dead show art Privacy is Dead

Easy Prey

Privacy in the digital age has grown from a background concern into one of the defining issues of our time. What began with simple questions about online safety has expanded into a complex, global conversation about how artificial intelligence, biometric data, and massive data ecosystems are reshaping daily life. Pam Dixon has been at the center of these discussions for more than two decades. As the founder and executive director of the World Privacy Forum, she’s worked across the U.S., Europe, India, Africa, and beyond, advising governments, international organizations, and policymakers on...

info_outline
America’s Scam Crisis show art America’s Scam Crisis

Easy Prey

Most of us think of scams as random or isolated or something that just happens to unlucky people. But what if the truth is far more organized, far more disturbing? Behind many of today’s scams is a global web of criminal enterprises, structured like corporations and fueled by technology, data, and billions of stolen dollars. In this episode, we sit down with Ken Westbrook. Ken spent over three decades in the CIA before retiring, only to return to the fight after his own mother was targeted and lost most of her life savings to a tech support scam. That moment changed everything. He founded...

info_outline
How Fraudsters Choose Targets show art How Fraudsters Choose Targets

Easy Prey

It’s easy to think of fraud prevention as a technical problem with a software solution. But according to Brian Davis, effective fraud defense is just as much about people, trust, and communication as it is about tools and data. With over a decade of experience, Brian has built fraud teams from scratch, shaped company-wide strategy, and helped growing startups shift from reactive to proactive risk management. Brian is the Head of Fraud at Dodgeball, where he’s helping bring their orchestration platform to market, and the founder of House of Fraud, an invite-only community where top fraud...

info_outline
Hidden Dangers of AI in Cybersecurity show art Hidden Dangers of AI in Cybersecurity

Easy Prey

Everyone’s talking about AI these days, especially in cybersecurity. Sure, artificial intelligence can boost your defenses, but cybercriminals have noticed too. Now they're crafting phishing emails so believable it’s scary and finding clever paths around spam filters while zeroing in on vulnerabilities you didn’t even realize were there.    Today, Aviad Hasnis joins the show. He's the CTO of Cynet Security and spent years running cybersecurity missions for the Israeli Defense Forces. Aviad’s here to help us figure out what the changing threat landscape really means, whether...

info_outline
Author Scams Exposed show art Author Scams Exposed

Easy Prey

Writers pour their hearts into their work, but unfortunately, that passion can make them prime targets for scams. From fake agents and vanity publishers to slick marketing schemes and social media impersonators, the tactics have only gotten more sophisticated over time. In this episode, we dig into the murky world of publishing scams and how they work and who they target. Along with why even experienced authors can get caught off guard. Today’s guest is Victoria Strauss. Victoria is the author of nine fantasy and historical novels for adults and teens, and she’s also the co-founder of...

info_outline
Tricked by Followers and Badges show art Tricked by Followers and Badges

Easy Prey

What if your social media success was built on deception, and it was working? In today’s episode, we hear from someone who knows exactly how that happens. Tim O’Hearn is a former software engineer and the author of Framed: A Villain’s Perspective on Social Media, a book that pulls back the curtain on how follower factories, automation, and persuasive technologies have shaped the online world we now take for granted. Tim doesn’t just theorize, he built these systems himself. Tim walks us through how his small side gig growing Instagram accounts evolved into a lucrative business, one...

info_outline
Only 10 Seconds to Expose a Scam show art Only 10 Seconds to Expose a Scam

Easy Prey

What if you could stop a scam in real-time before the damage is done? In this episode, I’m joined by Nick Stapleton, an investigative journalist and the face behind Scam Interceptors, the BAFTA award-winning BBC series that exposes online fraud and steps in to protect victims as scams unfold.  Nick brings a decade of undercover documentary experience to his current mission: fighting digital deception and empowering everyday people to stay safe. He shares jaw-dropping stories from the front lines, including the near miss that almost caught him off guard, and breaks down the complex...

info_outline
 
More Episodes

Ever had that creepy feeling someone's watching you online? Now imagine if that feeling was actually your reality, not just your browsing history being tracked, but cameras following your every move on the street, your conversations being monitored, your payments scrutinized. For our guest Josh Summers, this wasn't some dystopian nightmare, it was his daily life.

Josh isn't your typical privacy advocate. As the creator behind All Things Secured (both a website and YouTube channel), his passion for digital privacy was forged through nearly 20 years living abroad, much of it in China. There, he didn't just read about surveillance, he lived under its shadow, using VPNs to bypass censorship and experiencing the gut-wrenching moment of being detained and questioned by Chinese authorities.

In our revealing conversation, Josh pulls back the curtain on what government surveillance actually feels like from the inside. He shares how these experiences transformed a personal survival strategy into a mission to help others protect themselves in our increasingly watched world.

We dive into how surveillance actually works from those eerily accurate facial recognition systems to the GPS tracking that follows your every move, and the countless ways big companies turn your personal information into profit. Josh not only makes us aware of potential problems, he offers real-world solutions that balance security with the convenience we all crave.

With Josh's guidance, we discover surprisingly simple ways to shield our digital lives from encrypted messaging apps that keep conversations private, virtual credit cards that protect your finances, and alternative mailing addresses that safeguard your physical location. He also reveals the hidden dangers lurking in those so-called smart devices scattered throughout your home, and explains why privacy matters even if you think you have nothing to hide.

Show Notes:

  • [00:34] Josh is the host of All Things Secured. He wants to help people become a hacker's worst nightmare.
  • [01:30] Josh, his wife, and children lived in China. There was censorship and social platforms were blocked. 
  • [02:05] He began using VPNs. Over the decade there, every type of surveillance was used.
  • [03:34] He had a travel site and walked around with a camera.
  • [04:03] In 2018 he was detained by the government. It was scary and he realized the rights he was giving up when traveling to other countries.
  • [05:53] He was kicked out of China, and became more conscious of the pervasive mass surveillance.
  • [08:40] He was severely outmatched with the psychological tricks of the interrogators.
  • [12:57] Even if surveillance is legal, that doesn't make it ethical. 
  • [13:18] Small consistent steps towards privacy will make us less of a target.
  • [14:25] Josh talks about ways that we are being monitored from cameras to facial recognition. Digital currencies track what we purchase.
  • [17:04] Facebook has so many files on us. Being tracked online adds up.
  • [21:07] There are ways to build a privacy moat around your digital life and still stay in contact with friends and family.
  • [22:27] Steps for practical privacy include being careful about how you share data, encrypted alternatives, and use masking services to reduce your digital footprint. You can also use virtual credit cards.
  • [31:46] We talk about using peer-to-peer payment apps.
  • [34:12] When your habits and your contacts are public, it makes it easier to social engineer.
  • [35:29] Virtual mailboxes can add additional privacy. 
  • [39:50] Issues with IoT devices include how it's being stored, transmitted, and shared.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. 

Links and Resources: