Easy Prey
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
info_outline
5 Things to Teach Your Kids About Predators with Michael Buraimoh
11/29/2023
5 Things to Teach Your Kids About Predators with Michael Buraimoh
Many parents assume that their children will never be groomed by a predator and then miss the opportunity to educate their kids on the techniques that are used. Every child, regardless of gender, can be manipulated and tricked into making poor choices and put themselves in dangerous situations. Today’s guest is Michael Buraimoh. Michael joined Breck Foundation as CEO in January 2022. He is dedicated to the foundation’s mission to create a better online world for children and young people and is helping take the foundation’s important work to new heights. He is an author, and having his own children inspires him to create a safer digital world for them to grow up in. Show Notes: [1:01] - Michael shares the background and the reason behind the creation of the Breck Foundation. [4:02] - Michael’s own background is in criminal justice, specifically with young people. [6:23] - It is crucial that parents are honest and open with their children about this discussion. [7:51] - Ignore the misconceptions about grooming. [10:37] - Safety doesn’t mean having to put every form of digital activity aside. Parents need to be involved. [12:07] - Trust is the key to ensuring that a child will tell their parents things that are happening online. [14:05] - There are signs to look out for that could be indicative of something going on. [16:32] - It can be hard to determine what is unsafe and what is normal teenage conversations, but it's important to be aware of red flags. [18:11] - Young people now are digital natives. They have to be able to engage online. [19:52] - There is a place and time for parental controls and limiting access, but relationships are far more important. [21:42] - The Breck Foundation educates parents but also the children and young people themselves. [23:08] - Young people need to know that if someone is trying to isolate them from their friends and family through secret conversations, something isn’t right. [24:52] - Look for a trusted adult to report to. For parents, contact authorities. [28:30] - Screenshot, shutdown, and report. The Breck Foundation has a lot of resources for this education. [31:51] - Play virtually, but live real. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28470161
info_outline
The Evolution of Digital Identity with Philipp Pointner
11/22/2023
The Evolution of Digital Identity with Philipp Pointner
Currently we have hard copy passports and driver's licenses, but as our digital identities evolve, we may find ourselves with a worldwide digital standardized way of proving who we are. Today’s guest is Philipp Pointner. Philipp leads Jumio’s digital identity strategy and the initiative to enable multiple digital identity providers in its ecosystem. Prior to Jumio, Philipp was responsible for paysafecard, Europe’s most popular prepaid solution for online purchases. Show Notes: [0:53] - Philipp shares his background and current role at Jumio. [2:12] - Our online identity has changed very quickly over the last decade. [3:47] - Over time, this evolution has made people a lot more comfortable with technology. [5:50] - The changes that Philipp thinks are coming may cause problems with some countries not accepting them. [7:30] - The digital identity will likely be more secure than physical copies of important documents like passports and driver’s licenses. [10:47] - Chris and Philipp discuss a recent experience in verifying the credibility of physical documents. [12:52] - With more sophisticated benefits to a digital identity comes more sophisticated attack attempts. [15:40] - Where does one turn if they are a victim of identity theft? [17:11] - Philipp believes that it should be the responsibility of an organization to ensure the end user is safe. [18:48] - Philipp shares the results of a survey that asked people if they were willing to take more steps to ensure that they were secure online, but the exception was social media. [22:02] - Education around scams is improving and increasing, but not about everything. [26:20] - The technology exists to keep people more secure, but it isn’t employed as often as is necessary. [27:47] - At the end of the day, the inconvenience is always put on the end user. [29:07] - Biometrics are strong and have a lot of well governed standards already in place. [31:40] - Research shows that the requirement to change passwords every 90 days is ineffective. [32:59] - Currently, there isn’t a one-stop shop to receive the education they need to better understand cybersecurity. [35:48] - Philipp and Chris talk about the recent issue with concert tickets being purchased by bots for scalping. [38:28] - The general public has become an easier target than in years past because of the increase in online activity. [40:09] - People vastly overestimate their ability to detect fake images and deep fakes. [41:42] - Philipp explains what it means to have a reusable digital identity. [43:30] - When digital identity is used to verify in the future, will users have the ability to revoke their provided information? [46:58] - Pursue education on this topic and then take action. [50:01] - Your data is definitely online and it's important to be aware of what is available for potential scammers to know. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28378496
info_outline
Preventing and Reporting Cyber Attacks with Robert Karas
11/15/2023
Preventing and Reporting Cyber Attacks with Robert Karas
Cyber criminals are growing in their attack planning. CISA is continuing training their teams to look for vulnerabilities and help out not only the government, but other entities secure their networks and products. Today’s guest is Robert Karas. Rob came to the Cybersecurity and Infrastructure Security Agency in 2010. He has over 30 years experience in the information security field and significant experience in building nationally recognized security platforms. At CISA, Rob built the Cyber Hygiene Program, risk and vulnerability assessments, and penetration testing programs. He has also created the Cyber Defense Education training programs to address industry challenges. Rob was also recognized by Cyber Patriot as Mentor of the Year. Show Notes: [1:03] - Robert shares his background, what he does at CISA, and what CISA does as an agency. [4:01] - At CISA, agents hack into a company’s system with their permission to see where the vulnerabilities are. [5:53] - Phishing and social engineering continue to be the most successful attacks. [8:41] - A lot of times it feels like good security equals bad customer service. [10:27] - Playbooks are all the same or similar but the tools that CISA uses are unique. [12:29] - With the introduction and evolution of AI, there is some preparation to be done for an inevitable increase in attacks. [14:07] - Attackers prey on human vulnerability and emotion. [15:53] - Phishing emails are so good now that many times they really appear to come from someone you know. [17:15] - Over the last ten years, the statistics of people reporting a scam have improved. [20:16] - It is important for organizations to be prepared. For help with this, you can email . [23:39] - CISA has implemented Secure by Design. [25:30] - If you suspect you are communicating with a scammer, stop communicating right away. [27:02] - It is overwhelming when you think about the amount of devices we have that are connected and relied on. [30:16] - The amount of data we have and can have access to is so immense. How can we inspect everything? [32:09] - When it comes to purchasing new devices, ensure that frequent updates are part of the guarantee. [34:41] - A great place to start for resources on CISA’s website. Robert shares some of the resources available, including . [35:54] - CISA also offers free vulnerability scans for businesses. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28345769
info_outline
Support to Navigate the Justice System with Rachel Gibson
11/08/2023
Support to Navigate the Justice System with Rachel Gibson
Everyday people are falling victims to scams and fraud. Embarrassment and guilt can prevent people from reporting the incident. Not everyone is aware that there are resources available to help navigate the justice system. Today’s guest is Rachel Gibson. Rachel is the Director of the Center of Victim Service Professionals at the National Center for Victims of Crime where she works to further the mission by supporting and overseeing programs for victim service professionals, providing training and technical assistance. Show Notes: [0:48] - Rachel shares her background and her role as the Director of the Center of Victim Service Professionals. [2:53] - We talk a lot about prevention work, but there aren’t as many resources for what to do after an incident. [3:47] - Rachel explains the background and how the Center for Victims of Crime was founded. [5:46] - Many victims are experiencing polyvictimization and may not realize they are victims of a crime at first. [7:14] - 24-hour hotlines are available and very impactful. [8:51] - Rachel describes the different programs that she is involved in at the Center for Victims of Crime. [9:57] - Part of the work she does is helping people realize the intersection and connections between different types of crime. [12:08] - Oftentimes in these cases, this is the first time victims have been involved with the justice system. [14:02] - Maybe a victim doesn’t want to go to law enforcement, but the crime should still be reported. [15:12] - Financial fraud is a crime where society victim blames right out of the gate. [16:24] - The conversation shouldn’t be about who is victimized, but rather who is being targeted. [19:17] - Google is a great first step in determining legitimacy. [21:51] - Fraudsters are banking on targets not being knowledgeable. [23:55] - We have to come to the conversation with an attitude of empowerment. [26:26] - Rachel explains how partnerships are important as service professionals will likely hear about crimes. [28:47] - Legally, there’s a difference between a scam and fraud. But there’s always an opportunity to connect people to resources. [32:07] - Think about what someone needs in the moment. It might not be to go to law enforcement. [35:03] - Talk to your friends and family. If something seems too good to be true, it probably is. [36:24] - A big trend right now in questions and concerns is the intersection of AI and fraud. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28306430
info_outline
Human Trafficking Into Scam Call Centers with Matt Friedman
11/01/2023
Human Trafficking Into Scam Call Centers with Matt Friedman
It’s hard to imagine finding a job, advancing into a second interview, they send you a ticket to their overseas office, only to find out that you’re about to be trafficked into a life of forced labor while they threaten your family. But this is happening all around the world today. Today’s guest is Matt Friedman. Matt is an international human trafficking expert with more than 35 years of experience. He is the founder and CEO of The Mekong Club, an organization of Hong Kong’s leading businesses which have joined forces to help end all forms of modern slavery. Show Notes: [0:57] - Matt shares his background and the extensive experience he has in this field. [2:09] - Matt explains some of the terrible situations that he has seen in human trafficking and the reason he became an activist. [5:31] - Covid-19 impacted criminal activity in China. They started to trick and deceive people into accepting a job at a scam center. [6:51] - There are tens of thousands of people who have been human trafficked into scam call centers. [9:12] - A red flag is if it sounds too good to be true. [12:15] - Matt describes the buildings these call centers are in. [13:34] - In Myanmar and Cambodia, the people being trafficked into call centers tend to be citizens of other countries. [16:04] - The scams that they are forcing people to do are pig butchering. [18:20] - Matt shares some of the types of scams that they do from these call centers. [20:28] - In these call centers, if a person does not hit their daily quota, they are beaten and tortured. [22:56] - If you think that you want to have a job opportunity overseas, you need to know without a doubt that it is legitimate and have a system in place to make sure your friends and family know where you are. [25:21] - Matt’s organization The Mekong Club works with businesses on understanding scams and trafficking. [27:09] - Where does this laundered money go? [28:41] - The Mekong Club has a large social media presence in multiple languages and PSA campaigns to provide education. [31:32] - We’ve entered a time where scams are commonplace and it’s getting harder to tell what is real and what is not. [33:40] - If we don’t take action now, we will find ourselves in a situation that we cannot control. [37:33] - Share this information with other people. This is the most important step to take and right away. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28282979
info_outline
Active Shooter Preparedness with Katherine Schweit
10/25/2023
Active Shooter Preparedness with Katherine Schweit
No one ever wants to find themselves in an active shooter situation. But if you are, it’s important to know how to respond. Today’s guest is Katherine Schweit. Katherine is an attorney, consultant, and retired FBI special agent who created and led the FBI’s Active Shooter Program after the horrible tragedy at Sandy Hook Elementary School. She joined a White House team working on violence prevention matters, led by then Vice President Biden. She is the author of , , and the FBI’s research on mass shootings, a study of 160 active shooter incidents in the United States between 2000 and 2013. She was part of the crisis team responding to shooting incidents including at the Holocaust Memorial Museum, the Pentagon, and the Navy Yard in Washington, DC. Show Notes: [1:14] - Katherine shares her background, her experience in the FBI, and her work in the Active Shooter Program. [3:05] - In her work, she spent time with parents and families of those killed in mass shootings. [4:23] - What constitutes a mass shooting or an active shooter situation? There is no real definition. [6:10] - Most mass killings are domestic, particularly murder/suicides, but those will not show in data. Katherine explains what the FBI looks at. [8:44] - Journalists and media impact what stories are news-worthy. [10:21] - Katherine released her book to keep the conversation going. [13:19] - In 2020, the CDC determined that gun deaths in youth 19 and younger exceeded the deaths by traffic accidents in the same age group. [15:56] - Safety isn’t about when it happens. It’s about if it happens. [16:58] - The shooting at Columbine changed the way the American public viewed and feared shootings, although public shootings were not new events. [18:32] - Katherine explains the response and training of law enforcement officers during the tragedy at Sandy Hook Elementary. [21:06] - The numbers of incidents have increased but we have not seen the number of casualties increase. [25:00] - Television shows and movies create misunderstandings on what law enforcement officers and FBI agents can accomplish. [26:37] - See something, say something. [28:00] - In most cases, someone close to a shooter had information and didn’t say anything. [29:48] - What do you do when something happens? People should have Run, Hide, Fight training. [32:51] - In 13% of shootings, a civilian was successful in getting in to help incapacitate the shooter. [37:40] - A simple thing to be prepared with is knowledge of the exits in your location. [39:19] - It is important when hiding to hide where there is actual cover. [40:27] - Don’t stay where there is no protection. [42:51] - Shooters come in with a plan and it is always intentional. [44:11] - Sometimes an unexpected distraction makes a difference because it throws off a shooter’s plan. [47:37] - While school shootings are terrible incidents, children are actually more in danger in their homes and neighborhoods. [49:45] - Although they are major news stories when they happen, elementary school shootings are rare. [51:29] - Listen to Katherine’s podcast, Stop the Killing, for more information. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources: by Katherine Schweit by Katherine Schweit
/episode/index/show/easyprey/id/28247711
info_outline
The Passwords Are the Problem with Thierry Gagnon and Philippe Desmarais
10/18/2023
The Passwords Are the Problem with Thierry Gagnon and Philippe Desmarais
With the use of passwords, we’re hoping to ensure privacy and security, but sometimes it is at the expense of convenience. As technology changes and biometric databases become more utilized, we need to remember that they may also be hacked. Today’s guests are Philippe Desmarais and Thierry Gagnon. Philippe is a tech entrepreneur who co-founded Kelvin Zero and currently serves as its CEO, overseeing the company’s strategic direction. He is also a member of the Next Generation Advisory Council at Rockefeller Capital Management. Before creating Kelvin Zero, Philippe played a significant role in various start-ups, focusing on data analytics for political campaigns, remote hardware device management, and cybersecurity. Thierry Gagnon is co-founder and Chief Technology at Kelvin Zero. He is an expert in software development, malware analysis, cryptography, and reverse engineering. He has been actively involved in the cybersecurity community, participating in renowned competitions and projects such as Malware Information Sharing Platform. Show Notes: [1:18] - Philippe and Thierry share their backgrounds and their roles in the company they co-founded together, Kelvin Zero. [2:34] - Thierry’s expertise is in cybersecurity but Philippe’s interest was more in crime. They combined their strengths and passions to create Kelvin Zero. [6:18] - Passwords have been around for millennia. [7:24] - We often confuse being smarter with being faster. [9:45] - Passwords are not often attached to an individual. We have so many passwords and can’t actually know them all. [11:53] - We can compromise passwords at scale. [13:20] - The attackers only need to be right once. The defenders need to be right 100% of the time. How can we flip this? [15:47] - The average person is tasked with trying to keep up with cybersecurity and, in most cases, they are not qualified to do this. [17:11] - What does it look like to take a password-less approach? [19:20] - If cybersecurity is done successfully, the opportunities are massive. But regulation holds us back. [21:51] - Once a tech company can serve protection, then companies can focus on their services and products. [24:46] - There are differences between the physical world and the logical world. [28:41] - How do you convince people to share medical data for research when there are constant breaches? [31:33] - Is privacy the same as anonymity? [33:52] - Technology should be able to do what we want it to do, but that’s not the case. [36:36] - In a password-less environment, how can we validate a user? [39:40] - Thierry believes we should get away from the server authenticating because then it is the responsibility of the organization. [43:18] - Sci-fi movies sound far-fetched, but a lot of them predict technology. [46:35] - Thierry and Philippe share their thoughts on what we should be putting our focus on now. [49:40] - Stay away from single-factor authorization. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28243100
info_outline
5 Ways to Stay Safe Online with Patrick McNamara
10/11/2023
5 Ways to Stay Safe Online with Patrick McNamara
Staying safe online requires you to be an active participant. You need to do your own research and not rely entirely on other people’s tools, some of which are intended to actually take advantage of you. Today’s guest is Patrick McNamara. Patrick holds a bachelor’s degree in cybersecurity from University of Maryland Global along with multiple certifications. He operates the cyber awareness site DIYSecurityTips.com and is currently a cybersecurity engineer for a software company. Show Notes: [0:52] - Patrick shares his background and current role in cybersecurity. [3:09] - Chris and Patrick discuss the changes in cybersecurity in education in just a few years. [7:18] - When it comes to working in the industry, there are a lot of misunderstandings and inflexible definitions of what cybersecurity is. [9:35] - Volunteer as much as you can. [10:48] - A great place to start for your own online security is with passwords. [13:17] - Literally anything can be breached. A password manager can at least mitigate risk. [15:40] - Is it safe to connect to public wifi? [17:56] - Using your cell phone’s hotspot is a lot safer than using public wifi. VPNs are also fantastic to invest in. [20:42] - VPNs that are free could be dangerous as well. How are they making money if they are offering the service for free? [21:33] - Pay attention to the developer before downloading any app on your phone or mobile device. [23:16] - Check the permissions for the apps you download. For example, a calculator app doesn’t need access to your contacts and pictures. [25:01] - Anything that is new and exciting, malware developers will be on it very quickly. [27:40] - Understand how crypto works before investing in it. [28:52] - Patrick believes that it is possible to be completely anonymous online but there are a lot of very difficult steps to follow to do so. [32:13] - Privacy is easier to maintain than anonymity. [34:41] - There’s special malware for every type of attack. Patrick shares some scenarios on different types of attacks. [35:57] - VPNs cannot protect you from social engineering. [37:21] - Some malware is downloaded through files online on a site that was recently breached. [39:01] - Chris shares an experience in supply chain crypto mining that happened unintentionally. You never know. [40:34] - You should at least know how to back up your data. [44:13] - Patrick shares about his website and how to learn more about online safety. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28121429
info_outline
Tracking Down Scammers with Ryan Kelly
10/04/2023
Tracking Down Scammers with Ryan Kelly
Everyone is being targeted by organized crime to separate you from your money. If you’ve been scammed, don’t allow embarrassment to keep you from reporting it. Your story could keep someone else from going through the same thing. Today’s guest is Ryan Kelly. Ryan is a stand-up comedian who hunts scammers with his master’s degree in Homeland Security. Show Notes: [0:45] - Ryan shares his background and how he wound up hunting scammers. [2:12] - Just a few months ago, Ryan himself was scammed. [3:25] - Through social media, Ryan shared his experience and all of the comments showed that an incredible amount of people experienced it as well. [6:13] - We do victims an injustice when we describe a hacker as a bored man in a basement and a hoodie. There are incredibly organized scam crime rings. [9:07] - Your phone sells a lot of data. [10:53] - Ryan shares what he does initially when tracking down a scammer. [13:47] - Knowing an IP address can be helpful in knowing a little information, but it’s not exact. [15:46] - Some military personnel cannot use fitness trackers or other devices that transmit data. [18:08] - Ryan explains how a fan of his social media content recognized the background of a video and found him in person. [21:03] - If you possibly feel like you are being targeted as a scam but you are unsure, you can ask a series of questions to see if they are lying. [22:16] - Sometimes scammers purposely use bad grammar and spelling to weed out the people who are suspicious. [24:37] - Two factor authorization should be a requirement on every login. [27:01] - Your information is easy to find. There are ways to take some things down. [29:01] - LinkedIn is a great tool, but it can be dangerous as scammers can create a false connection. [32:09] - If you’re paying for something and it feels like a weird way to be paying for something, stop. [34:51] - If you are looking at investing in something, think about the risk. Can you afford to possibly lose it all? [37:36] - Scammers also target people under the pretense of helping them get their money back after a scam. [40:25] - Don’t send photos to people you don’t know. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28082580
info_outline
World Romance Scam Prevention Day - October 3rd with Kathy Waters and Bryan Denny
09/27/2023
World Romance Scam Prevention Day - October 3rd with Kathy Waters and Bryan Denny
Romance scammers are patient and willing to take their time to win over their target. In today’s episode, we’ll talk about how you can help out and make a difference to reduce the impact of romance scams. Today’s guests are Kathy Waters and Bryan Denny. Kathy Waters is an expert advocate and an educator on the subject of online romance scams. Kathy is co-founder, along with retired Colonel Bryan Denny, of the non-profit organization Advocating Against Romance Scammers. Both have been working for safer platforms since 2016 with the same goals in mind: justice for victims and educating all online of the cybercrime known to tear people down emotionally, psychologically, and financially. They are now the organizers of World Romance Scam Prevention Day on October 3rd. Show Notes: [1:10] - Kathy and Bryan share their background and why they are passionate about advocating for victims of romance scams. [2:47] - Bryan was a victim of a romance scam, but not in the way you might think. Someone had been using his photo and posing as him. [4:10] - Unfortunately, Bryan’s name and photo are still being used by scammers. [6:36] - When someone’s profile image is taken, it is used over and over again. Getting one taken down is not going to end it. [8:22] - There are organized crime groups that use Bryan’s photos, but they believe that there are independent scammers using it as well. [9:55] - World Romance Scam Prevention Day is October 3rd, and this is the first year it is official. [12:59] - One of the myths about romance scams is the belief that people don’t actually fall for these things. [14:47] - Another myth is that this only targets older people, but even juveniles are being targeted specifically for sextortion. [18:01] - Romance scammers typically start to build a relationship slowly. They move the conversation outside a lot of social media apps. [19:49] - People who want to believe it's real, will believe that it's real. [20:44] - Bryan shares some common stories that scammers use in romance scams to get money from a victim. [22:03] - Although some take a lot of time to ask for money, others will test the waters early and ask for small amounts or even content they use to blackmail. [24:19] - Kathy suggests that mental health professionals come forward to provide education and support as well. [26:40] - Never turn your back on a friend or family member who has fallen victim to a romance scam. [27:24] - Learn what you can do to help support World Romance Scam Prevention Day. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28050324
info_outline
Stopping Financial Fraud with Giles Mason
09/20/2023
Stopping Financial Fraud with Giles Mason
Scammers try to take advantage of human politeness. Utilizing critical thinking and slowing down conversations with someone who claims to be an authority like a government agency or bank could be what prevents us from making a financial mistake. Today’s guest is Giles Mason. Giles is the Director of Campaigns at UK Finance. He is responsible for planning and delivering the organization’s communication activities to promote campaigns on behalf of the banking and finance industry. Show Notes: [0:50] - Giles shares his background and current role at UK Finance. [2:36] - In 2016, UK Finance launched Take Five to Stop Fraud. [4:03] - Many victims of fraud often think after they’ve responded to a scammer that they could tell that something wasn’t quite right. [5:36] - The biggest trend at the moment is purchase scams. [6:16] - The type of scam that normally sees the greatest fraud is impersonation scams. [9:08] - Scams that banks see are typically payment scams through their bank account. [10:10] - Once a payment is made, most of the time there’s nothing you can do about it. Banks will do what they can, but it’s not always possible. [12:38] - There are even scams that involve purchasing a home which are terrible because of the sheer amount of money involved. [14:04] - Hang up and call the number you know for certain is your bank. [17:13] - As humans, we want to be supportive and respect perceived authority. [18:38] - Scammers typically won’t have a good reaction to you saying that you will call the number you know, which is a sign that they are not who they say they are. [21:10] - Young people are more willing to share information about a scam. [23:35] - While Giles has not fallen victim to a scam, he has had multiple attempts. [25:41] - Giles describes some of the trends in scamming. [27:48] - Stop, challenge, and protect. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/28007100
info_outline
Buyer Beware with Marta Tellado
09/13/2023
Buyer Beware with Marta Tellado
The burden is on consumers to question the validity of online offers because privacy laws and standards are not yet well regulated. Consumer Reports is fighting to make changes in this arena. Today’s guest is Marta Tellado. Marta is President and CEO of Consumer Reports, the independent non-profit that works side by side with consumers to create a fair and just marketplace. She is a market driven leader with a passion for innovation, public-service, philanthropy, and helping organizations maximize and improve the world. Show Notes: [0:55] - Marta shares her background and her role as CEO of Consumer Reports. [2:19] - We’re at a pioneering moment in the consumer market. Regulation hasn’t transitioned into the digital marketplace. [4:04] - When online, we assume everything we do is safe. [5:52] - Now with AI, consumer awareness is even more important. [7:41] - As technology advances, so does the potential for scams. [9:27] - Be aware of the red flags. [11:33] - Consumer Reports has a ton of resources and information on scam protection. [13:17] - Everyone is a target and anyone can fall for a scam, including Marta. [15:51] - Marta shares the estimated amount of money lost to scams in 2022 and the increase we are seeing. [17:45] - Instead of connecting your peer-to-peer payment accounts to your bank account, connect them to your credit card where you have more protection. [20:17] - Even when we select the “unsubscribe” button, we may be flagged as someone who is interacting with the scam content and further targeted. [22:58] - The rules and regulations aren’t keeping up with the rapid growth and development of technology. [24:55] - Marta describes the ways Consumer Reports works to educate consumers. [26:25] - It takes a really long time to get laws and regulations in place. [29:01] - We can’t see or feel the things that keep us safe or harm us online. [31:38] - Even if you feel that you don’t have anything that a scammer would want, be aware that any information is valuable to them. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27950712
info_outline
Scambaiting with Pierogi
09/06/2023
Scambaiting with Pierogi
Scammers have used our systems against us, like shipping, rental cars, and rental homes. They’ve learned how to stay off the radar and, in order to stop money laundering, we need to address fraud one step at a time. Today’s guest is Pierogi. Pierogi protects the innocent and vulnerable from internet scammers through his channel Scammer Payback. He exposes these criminals and helps victims through his technology and cybersecurity knowledge. Show Notes: [1:07] - Pierogi shares his background and how he got into cybersecurity. [4:25] - His drive to help people and get back at scammers is why he started Scammers Payback. [6:03] - Scammers can get access to a bank account and ruin everything. [8:32] - Pierogi shares one of the projects he worked on that actually resulted in an arrest. [9:56] - Scammers know how to stay under the radar. [11:31] - Those involved in organized crime consider their victims as customers. [14:32] - Pierogi describes how a well-trained scammer can cater their manipulation to each individual situation. [17:26] - It’s a numbers game. At some point, a scammer is going to connect with someone. [19:04] - Scammers can learn so much about you on the internet that makes their false claims that much more believable. [20:56] - A lot of the time, scammers know when to give up and move on. [22:18] - Never send a text message of any type of personal identification. [26:11] - Focus on the mental aspect of this. [27:52] - Employees at different stores that sell gift cards are on high alert and typically do not sell certain numbers of gift cards. [30:14] - In some cases, banks are even calling out possible red flags. [31:31] - Financial institutions can use technology to determine behaviors that are not normal for you to indicate possible fraud. [33:29] - Hackers are using known processes that are good but for bad purposes. [34:58] - Major corporations have a budget for cybersecurity but regular people don’t. [36:28] - Phone carriers are trying to do more to prevent scam calls. [38:03] - While playing different roles, Pierogi shares that he actually “married” a scammer. He shares some of the craziest things scammers have done. [39:32] - Pierogi is also learning different languages so he can learn more about where scammers are located. [41:39] - A lot of the experiences of the victims and how scammers talk about them makes Pierogi emotional. [44:40] - These experiences are sometimes hard to listen to. [46:28] - A lot of people say they’ll know immediately if they are talking to a scammer, but it isn’t that simple. [48:54] - If we know this information, we need to talk about it to others and educate. [51:16] - Scammers are very good at what they do. We portray them as silly, but they are very intelligent and convincing. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27899364
info_outline
Being Foolproof to Misinformation with Sander van der Linden
08/30/2023
Being Foolproof to Misinformation with Sander van der Linden
We’ve heard the polarizing narrative, “Either you’re with me or you’re my enemy.” Using this polarizing statement can allow people to fall prey to being manipulated. Today’s guest is Sander van der Linden. Dr. van der Linden is a professor of Social Psychology and Society and the Director of Cambridge Social Decision Making Lab in the Department of Psychology at the University of Cambridge. He is ranked among the top 1% of highly cited social scientists worldwide and has published over 150 research papers. He’s the author of . Show Notes: [1:01] - Sander describes what he does at Cambridge and why we began his work on this topic beginning ten years ago. [3:22] - The early days of the internet created an interest for Sander as he saw that anyone could pretend to be someone else. [5:01] - What exactly is misinformation? [6:29] - Disinformation is the spread of misinformation with harmful or deceitful intent. [8:37] - One form of disinformation is click-baited sensational headlines that seem harmless. [10:32] - Sander describes some of the key phrases within content that usually indicate mis- or disinformation. [13:11] - Even if information is accurate, content can be written manipulatively to evoke emotion, particularly rage. This is misleading. [15:01] - Most people don’t want to be a part of a flame war or in an echo chamber but the behavior is common. [16:45] - Social media algorithms seem to reward toxic behavior and amplify polarization that already exists. [20:31] - People are constantly being bombarded with information. [21:47] - Everyone is scattered in their own echo chambers because of fragmented social media. [23:49] - What should platforms be doing to help limit the spread of misinformation? What should individual people do to keep themselves safe? [26:01] - The brain needs a few experiences before developing a habit. [27:50] - Sander explains why most people don’t have the facts to actually defend what they believe to be accurate information. [29:56] - Sander has developed games that help users understand misinformation. [32:02] - Using the example of climate change and global warming, Sander demonstrates how people can be misled. [35:01] - False dichotomies are a real problem and politicians in particular use this strategy. [38:50] - The goal is to help others recognize manipulation online, not necessarily to change their mind. [41:41] - There are different types of scams and most are disinformation. [43:45] - Romance scams use these tactics. How can we inoculate people against this type of information? [47:37] - Deradicalization is extremely difficult. [49:20] - There’s a benefit to being somewhat skeptical. But how skeptical should you be? [52:03] - We want to be able to live our normal lives without fear, but there needs to be a healthy amount of skepticism. [55:18] - There are some crossovers between persuasion and manipulation. [60:42] - You can play the games Sander described at Inoculation Science. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27833397
info_outline
Why We Fall for Scams with Chris Chabris and Dan Simons
08/23/2023
Why We Fall for Scams with Chris Chabris and Dan Simons
Scammers, like magicians, use distractions and illusions to keep you from realizing what is really going on. They may choose to have you focus on something that is urgent hoping that you’ll make mistakes that you normally wouldn’t. Today’s guests are Chris Chabris and Dan Simons. Dr. Chabris is a Cognitive Scientist who has taught at Union College in Harvard University and is a fellow of The Association for Psychological Science. His research focuses on decision-making, attention, intelligence, and behavior genetics. Chris received his PhD in Psychology from Harvard University. Dr. Daniel Simons is a professor of Psychology at the University of Illinois, where he has the Visual Cognitive Laboratory. Dan received his PhD from Cornell University. His research explores the limits of awareness and memory, the reasons why we often are unaware of those limits, and the implications of such limits on our personal and professional lives. Show Notes: [1:18] - Dan and Chris share their background and what their current roles are in their industry. [3:27] - Why did Dan and Chris decide to write a book together? [6:12] - Stories of victims are engaging and interesting, but these stories don’t focus on why we are fooled. [8:53] - Chris and Dan share the story of a time they were almost scammed. [13:01] - Fictional stories in movies get some things right about what con artists exploit, but real scenarios are not always so precise. [14:52] - We have the ability to focus on a select amount of the information in front of us. [16:39] - There are a lot of different techniques that scammers employ to put you under time pressure. [19:59] - Confirmation bias is the idea that you try to find evidence of what you believe. [21:04] - There are a lot of theories about why we are good at some things and not as good at others. [22:15] - It is logical to trust someone you know, but social media has created the opportunity to trust misinformation. [24:38] - Commitments are assumptions that we make and hold steadfastly to. [26:41] - It is easy to trust someone when you’ve committed to your perception of them. [28:33] - Ask yourself if there is anything you believe that could be proven wrong if you were given new information. [31:01] - External validation is a great source for seeing things you might have missed. [32:48] - There are scams in literally everything, even chess. [38:02] - Are scams increasing or is it awareness of scams that is increasing? [40:26] - All scams employ the same principles. They are always going to rely on the same tricks and tap into the same fears. [42:37] - Dan’s hope is that people will question the information they get and become less accepting. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27650748
info_outline
Securing IoT and Cyber Warfare with Mikko Hypponen
08/16/2023
Securing IoT and Cyber Warfare with Mikko Hypponen
Our home IoT devices are constantly being probed for weaknesses so that they can be compromised and used for broader nefarious purposes like cyber warfare. The Ukrainians may be considered some of the best in the world when it comes to defending against cyber warfare because they have been regularly attacked and have been defending their systems for years. Today’s guest is Mikko Hypponen. He has written for The New York Times, Wired, and Scientific American and has lectured at universities like Oxford, Stanford, and Cambridge. Mikko works as the Chief Research Officer for WithSecure and sits on the advisory board of Europol. Show Notes: [1:11] - Mikko shares his background as an old-school hacker. [2:46] - His mother advised Mikko to pursue this career in the 1980s. [5:23] - Smart devices like doorbells and refrigerators are not configured correctly because security makes the device more expensive. [7:50] - Mikko discusses regulation in Europe and how, most of the time, regulation fails. [9:03] - Many hackable devices wouldn’t be hackable if consumers read the manual. [11:13] - Most malware traffic used to be Windows based but is now Linux based. [12:26] - Many people don’t think that there’s any data that can be stolen from IoT devices, but they are surprisingly powerful. [14:16] - Mikko explains some recent attacks. [15:43] - Medical devices are just as vulnerable as any other IoT device. [17:41] - What is a honeypot? [19:02] - Mikko shares that he has been a victim himself with his credit card number stolen twice. [20:14] - Even experts make mistakes. [21:26] - If you believe you have been hacked or think you are being scammed, take a step back. [23:06] - Mikko describes some of his experience living so near Russia and monitoring cyber warfare. [25:07] - Spying and espionage is a big problem in countries bordering Russia. [30:06] - With invasions in 2022, Ukraine improved many systems. [31:20] - Mikko makes a prediction on what will come next that sounds like Science Fiction, just like cyber war sounded like before. [32:18] - What are Mikko’s thoughts on AI? Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27579579
info_outline
Behavioral Analysis From an FBI Expert with Robin Dreeke
08/09/2023
Behavioral Analysis From an FBI Expert with Robin Dreeke
Our non-verbal communication is as much or more important than what we verbally communicate. We may display mannerisms that our gut instincts pick up as just off, but a trained FBI Behavioral Analysis can pick up on these signs faster than you might expect. Today’s guest is Robin Dreeke. Robin is an accomplished executive coach, bestselling author, and professional speaker with an impressive background. As a Marine Corps officer and retired FBI Special Agent, he served as Chief of the Counterintelligence Behavior Analysis Program where he honed his skills on recruiting spies and behavioral assessment. Robin has translated his expertise into his unique interpersonal communication strategies that focus on recruiting allies in business. Show Notes: [1:23] - Robin shares his background and previous roles in the Marine Corps and FBI. [2:45] - Robin has not been a victim of a scam, but there have been many attempts and close calls. [6:02] - We establish normal patterns of behavior and tempo. [7:52] - Be wary of things that deviate from normal patterns of behavior. [10:19] - If we’re trying to find something wrong, we miss a lot. [14:07] - Robin explains why he looks for openness, honesty, and transparency in a nice even tempo. [15:42] - Underneath “why” is the “what” and the “how.” [17:30] - Vulnerability is the willingness to show your shame. [20:17] - Words are extremely powerful. [22:24] - The more time spent with someone, you will be able to learn their natural tempo and behavior patterns. [24:34] - The techniques Robin talks about aren’t just applicable to criminal interviews, but even just personal conversations. [26:07] - Master manipulators are on a timeline. Usually they’re not patient. [28:52] - Sales people can also use these techniques to push the tempo out of your comfort zone. [31:31] - Robin only vets people based on in-person interactions now. [33:12] - Robin compares reality to shows like Criminal Minds. [35:43] - The actions that people will take are predictable. [37:52] - Some people have the tendency to find something wrong with everyone and everything. [40:08] - Focus on having a great conversation with other people. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27558204
info_outline
7 Flags of MLM with Roberta Blevins
08/02/2023
7 Flags of MLM with Roberta Blevins
Many people have ended up in an MLM because they wanted to help a friend out. But it is important to understand the red flags of how they can motivate and manipulate. Today’s guest is Roberta Blevins. Roberta is an anti-MLM advocate who starred in the Amazon Prime documentary Lula Rich and speaks out on social media against MLMs, scams, frauds, and cults and is the host of the podcast Life After MLM. Show Notes: [0:45] - Roberta shares her background and what she does now. [2:20] - In 2015, Roberta heard about LulaRoe and was initially very excited. [3:34] - She wasn’t making any more than she had been making in the job she left, but was working a lot more. [4:40] - Roberta realized that it wasn’t the right way to run a business and it took a toll on her and her family’s mental health. [6:17] - Pressure and pushback against questions are major red flags. [7:28] - Avoid being alone and being led to a second location when talking to someone. [8:28] - Roberta explains how different MLMs operate under a pay-to-play model. [10:05] - The only way to make money is to hit qualifying monthly quotas that are a big challenge to accomplish. [11:58] - What is the difference between a pyramid scheme and an MLM? [14:43] - MLMs tend to invade every area of your life. [16:10] - Many people have a fake-it-till-you-make-it approach which is misleading people to be recruited. [19:26] - Social media plays into this fabricated lifestyle. [21:42] - MLMs exploit personal relationships. [22:54] - Roberta shares how “icky” it felt to keep a “dirt list”. [24:38] - There are stories of some people signing up their children in order to meet their recruitment quota. [26:30] - Roberta explains the history of MLMs and how they started. [29:21] - MLMs aren’t going anywhere, but Roberta wants to see regulation in an unregulated space. [31:48] - Roberta shares about some of the background work she is doing to help create dialogue about regulation. [34:12] - Social media has strengthened MLMs and has gotten more people to sign up. [35:53] - In some MLMs, more than half of the sellers are making no money. [37:26] - Numbers don’t lie. If you are spending or making money, you should track it. [38:51] - Track any amount of time you spend on the business. [41:07] - Roberta outlines a strategy if you are in an MLM and deciding if it is the right fit for you. [44:30] - Have someone who is unbiased listen to you. Be that person for someone else. [46:35] - A company should be able to stand up to scrutiny. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27495498
info_outline
Reading and Understanding Behavior with Chase Hughes
07/26/2023
Reading and Understanding Behavior with Chase Hughes
A scalpel in the hand of a surgeon can be an amazing instrument. But the same tool in the hand of a person choosing to do harm is dangerous. The knowledge on how to read someone’s behavior is the same thing, either beneficial or detrimental, based on the person’s intentions. Today’s guest is Chase Hughes. Chase is a retired US Navy Chief and is the leading military and intelligence behavior expert with 20 years of creating the most advanced behavior skill courses and tactics available worldwide. He is a Harvard educated neuroscientist, keynote speaker, and the author of two bestselling books. He teaches elite groups of government agencies on behavior science skills, including behavior profiling, non-verbal analysis, deception detection, interrogation, and advanced behavioral investigation. Show Notes: [1:08] - Chase shares his background as a US Navy Chief and his current work in educating others on behavior science skills. [2:45] - Chase tells the story of losing a friend as inspiration to grow his knowledge. [4:51] - Hidden stress signals are universal. [7:04] - At a certain point of understanding behaviors, Chase sees a world that is hidden right in front of everyone. [8:06] - In learning behaviors, focus on learning one at a time until you notice them in your day-to-day life. [10:03] - When it comes to psychopaths, there are certain behaviors that are hard to spot. [12:01] - Chase does an activity with Chris to demonstrate eye movement. [15:18] - When it comes to interrogation and questioning, these eye movements are very telling. [17:13] - Women are naturally very good at reading behavior. [18:02] - We learn to lie first with our face. [20:10] - What is a detail mountain and a detail valley? [23:07] - There is a reason we fall so hard for con artists and cult leader personalities. [25:10] - All kinds of influence follow this exact model every time: Perception, Context, Permission. [27:58] - The second thing that Chase teaches is how to access the mammalian brain. [30:36] - Anything we feel emotion about is memorized. [33:21] - The more we learn about this, the better we are at avoiding being manipulated. [34:58] - These tactics are also tools for good parenting. What is the end goal of these tools? [37:10] - Chase discusses some examples of the models he teaches. [39:41] - When it comes to confidence, people look at situations through a hierarchy lens. [41:10] - Chase shares the titles of his books and what they are about. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27338157
info_outline
Ever-Changing Cyber Crime with Raj Samani
07/19/2023
Ever-Changing Cyber Crime with Raj Samani
It can be difficult to quantify the impact of good CISO or IT professionals. Protecting the network, infrastructure, and data is a constant effort and they’ve got to get it right 100% of the time. But the criminals breaking in only need to get it right once. Today’s guest is Raj Samani. Raj is the Chief Scientist for the cyber security firm Rapid7. He has assisted multiple law enforcement agencies in cybercrime cases and is a special advisor to the European Cybercrime Centre in The Hague. Raj has been recognized for his contributions to the computer security industry through numerous awards and has co-authored several books and has been a technical editor in others. Show Notes: [1:01] - Raj explains what he does for the cyber security firm, Rapid7, and how he got into the field. [3:40] - In the beginning of his career, cyber security was more of a hobby. [6:07] - There is a level of transparency, but Raj explains how things have to be absolutely certain before releasing information. [7:32] - Raj introduces the topic of cyber security as a service. [9:11] - Without the means to physically interrogate, it is hard to confirm theories about what is happening and who is doing it. [12:01] - “The sooner we collectively as an industry start to provide more transparency, I think the better we’ll be.” [13:57] - We see CISOs let go when a breach takes place. It is immature as an industry since there are no metrics to measure success. [16:54] - Raj shares the experience of the explosion of Covid-19 related scams. [20:40] - As security professionals, the job is never done. [21:51] - Raj compares educating your children of online safety to wearing a seatbelt in your car. [24:10] - The odds are certainly in favor of the cyber criminals. [26:48] - Raj explains the estimation of money saved by preventing attacks, but also explains that there’s no true way to measure this. [28:20] - If we aren’t reporting incidents, the government isn’t going to do anything because we can’t prove the impact. [30:29] - Because it is a global issue, international law enforcement collaboration is crucial. [34:17] - Now that cybercrime is so lucrative, they can actually pay for marketing and make their content much more believable than a simple email with a link. [36:30] - It is a constant case of cat and mouse. [40:32] - Raj does not use the word “hacker” to describe the individuals behind attacks. They are criminals. [42:18] - Raj highly recommends the book . Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27284319
info_outline
What NOT to Do When Wiretapping the Government with Bryan Seely
07/12/2023
What NOT to Do When Wiretapping the Government with Bryan Seely
Today’s guest is Bryan Seely, a world famous cyber security expert, ethical hacker, author, keynote speaker, and former US Marine. He is known for intercepting calls to the US Secret Service and FBI. We chat about why and how he did it and surprisingly why he didn’t go to jail. Show Notes: [0:48] - Bryan shares his background, what he does now, and what he is famous for. [2:10] - To show how easily hacked and manipulated Google Maps was, Bryan changed the names of locations which didn’t get their attention. [4:03] - At the time, the FBI didn’t know that Bryan wiretapped them. Bryan explains how this was an issue and how he let them know. [6:14] - They didn’t believe him and he explains how he proved it and what the major problems with their communications were. [8:03] - At no point was Bryan arrested, but he had to show how he managed to wiretap them. [10:00] - Bryan managed to record 40 calls. [11:26] - Because he had no ill intent, he told them what he was doing and how he did it to help prevent it happening by others, Bryan was not charged. [13:24] - Technically, Bryan didn’t do anything that wasn’t possible for anyone else to do. He didn’t hack a system, but rather saw a logic flaw. [15:51] - There wasn’t technically anything wrong. It was just designed in a way that could easily be exploited. [18:50] - The cost of just letting people know about a breach is high. [20:44] - Bryan believes that companies should be honest about breaches and what they will do to fix the problem. [23:41] - We don’t intentionally broadcast our information or location, but it is easy to guess in many cases. [24:57] - There are little things that we do that we think are protecting us but are actually giving out more information than we should. [27:26] - Bryan shares some tips in keeping you protected, like turning off Bluetooth and wifi on your phone. [28:36] - Anyone can create a wifi network and name it anything, like Starbucks Wifi or Free Airport Wifi to make it easy to have people connect. [30:47] - Teach your kids how to be safe. [31:42] - Bryan primarily uses authenticator apps for MFA, but any kind is helpful. [35:20] - Bryan is currently writing another book and loves meeting people who have done great things for cyber security education. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27232158
info_outline
The Human Side of Cyber Security with Jessica Barker
07/05/2023
The Human Side of Cyber Security with Jessica Barker
The cyber security circle of information will always have some human involvement and raising awareness in how systems were designed, developed, used, and abused is critical. Today’s guest is Dr. Jessica Barker. Jessica is an award winning leader in the human side of cyber security and has delivered face to face awareness sessions to over 50,000 people. She is a best selling author, international keynote speaker, media commentator, and serves on numerous boards, including the UK government’s Cyber Security Advisory Board. Show Notes: [1:00] - Jessica shares her background and her passion for educating people on cyber security. [2:34] - When it comes to personal experience, Jessica has not been a victim of a scam, but she has come close. [3:49] - Being vigilant is helpful but the right phish at the right time can catch any of us. [5:01] - Take a step back and talk to someone else. Seeing someone else’s perspective is helpful. [6:43] - There’s a fine line between scam indicators and marketing. [8:51] - There are always people involved. Jessica explains the elements of the human side of cyber security. [10:24] - There is an assumption that the younger generation don’t care about cyber security, but it’s not accurate. [13:14] - The majority of clients that Cygenta works with are corporate clients. [14:33] - Every organization has a security culture already, but what kind is it? [16:46] - Many departments within a company avoid cyber security and the security team and it creates an adversarial relationship and culture. [19:15] - Measuring the success of cyber security is a challenge. [20:57] - We need to consider our language when explaining cyber security attacks. [22:57] - Jessica’s work primarily focuses on prevention. [28:20] - Chris shares the experience of seeing a problem but not knowing where it was coming from. [29:50] - It’s important to mitigate risk while also not being so worried all the time. [30:57] - We all need education to help with critical thinking. [33:14] - Education also boosts people’s confidence. [34:27] - It is important to have strong organizational values and the ability to tap into people’s individual values. [36:01] - Cygenta has a free resource online called . Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27200142
info_outline
Diet Culture and Wellness Traps with Christy Harrison
06/28/2023
Diet Culture and Wellness Traps with Christy Harrison
With the appearance of health taking focus in today’s culture, many are persuaded to try extreme trends to achieve quick weight and health results. Conventional healthcare may not always have the answers we’re looking for but it’s important to not let our fears and concerns be exploited for someone else’s profit. Today’s guest is Christy Harrison. Christy and a Registered Dietician Nutritionist, Certified Intuitive Eating Counselor, and a journalist who has been covering food, nutrition, and health for more than 20 years. She is the author of two books, and and the producer and host of the podcasts and which has helped tens of thousands of people around the world think critically about diet and wellness and culture and develop a more peaceful relationship with food. Show Notes: [1:05] - Christy shares her background and what she specializes in as a Dietician Nutritionist. [2:19] - Christy describes her past experiences with disordered eating and combined her perspective with her journalism career. [5:15] - Through her own recovery, she discovered her passion for helping others at a large scale. [6:21] - This is not a substitute for physical or mental health advice. [7:20] - There is a long history of how our current societal focus on weight and body shape has evolved. [11:18] - As society developed an anti-fat approach, diets became trendy and scammy weight loss products became prevalent. [13:07] - There’s a lot of motivation for scammers to make money in the health and wellness space as it is a huge industry. [14:22] - Christy shares some history on the first diet book and how we are currently seeing similar trends again. [17:03] - Watch out for anything that purports a product to be a cure-all. [19:16] - While there are problems with mainstream healthcare, anyone who turns fear into a sales pitch is a red flag. [22:02] - A lot of people in ads, especially on social media, are paid to promote a product that they probably have never tried. [23:14] - Be aware of the differences between real studies and anecdotal science-sounding claims. [26:32] - A problem with nutritional research is that it is mostly observational. [28:15] - It’s not all down to the individual. We can certainly do things to make ourselves less susceptible, but the system needs to change. [29:35] - Unless it is coming from your own medical provider who knows you and your needs, be skeptical of medical information. [32:17] - Before adopting a health and wellness practice, you should do research. [33:39] - Check in with yourself on any emotional pull you have. [35:34] - There are also claims from scammers who will say that you have to feel worse to feel better, which isn’t generally the case. [38:37] - Diet culture creates a yo-yo effect for a lot of people. [40:28] - Self efficacy is critical to mental health and dieting takes it away. They have a hugely negative psychological effect. [44:40] - Christy shares some things to consider before making changes to your diet. [46:42] - What are the things you have control over in your life? Don’t demonize yourself for the choices you make when there isn’t anything else you can choose. [47:56] - There isn’t one solution for every single person. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27144861
info_outline
New and Improved Nigerian Scams with Ronnie Tokazowski
06/21/2023
New and Improved Nigerian Scams with Ronnie Tokazowski
In this episode, we look at two sides of the Nigerian scam: The emotional, psychological, and financial damage done by scammers and the scammers we often look at as bad people doing bad things. But in some cultures, this is seen as an acceptable career option. Today’s guest is Ronnie Tokazowski. Ronnie has been fighting Nigerian fraud for the last seven years and has collaborated with both law enforcement and the private sector. He runs a mailing list which collaborates with victims in identifying critical pieces of information around how the fraud works as well as working with romance victims themselves. Show Notes: [0:53] - Ronnie shares his role as a Principal Threat Advisor and the work he does with Nigerian fraud. [2:10] - Seven years ago, Ronnie saw the increasing trend in Nigerian fraud and is trying to get ahead of it. [3:58] - Scammers operate in a way that is similar to pulling tools out of a toolbox. They know which strategies to use in different situations. [5:44] - Relationships have been built with victims over months or sometimes even years, especially in romance scams. [8:19] - Ronnie explains how emotions are targeted to build relationships with scammers. [10:36] - Business email cybercrime was the number one cybercrime for seven years ago. [11:41] - The more we talk about it, the more victims come forward to talk about their own experience and overcome the social stigma. [12:36] - While not a scam victim, Ronnie explains a scenario in which he questioned his decisions. [15:27] - There are people out there doing the work in Nigeria in getting scammers to leave the career. But it is a huge undertaking. [17:50] - A common scam is to reach out on social media and try to get the target off the platform to talk. [19:18] - Some scammers are victims of human trafficking doing the work against their will. [20:36] - Right now with pig butchering, the belief is that the groups are organized crime groups in China. [22:01] - Ronnie shares the experience in speaking with law enforcement in Nigeria. [23:57] - The connections to different scams are very intricate and sophisticated. [26:21] - In one experiment, gift cards were purchased to give to scammers to track what they did with them. [29:26] - Scammers collaborate together to find “clients” and share their list of victims to facilitate other crimes. [30:50] - Ronnie shares the story of a scammer who collaborated with multiple people and wound up being involved in tons of different types of scams. [33:12] - In Nigeria, there are a lot of tribal religions in play. [34:31] - Many scammers in Nigeria will go through rituals in their attempt to manifest wealth. [37:07] - One of the main motivations for scammers is their experience in poverty. [41:02] - What about government intervention? How is the Nigerian government handling the situation? [42:21] - In some countries, the government is also tied up in the scamming. [45:20] - Two factor authentication is critical to security. [46:26] - For businesses, there should be a process to ensure money is wired correctly when necessary. [48:10] - Ronnie doesn’t recommend investing in crypto right now especially if it sounds too good to be true. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27132231
info_outline
10 Types of Identity Crimes with Eva Velasquez
06/14/2023
10 Types of Identity Crimes with Eva Velasquez
Recovering from identity crimes can be daunting and take a toll on your entire life, not just financially and emotionally. Once someone gains access to one of your accounts, they can work to manipulate your friends and relatives as well. Today’s guest is Eva Velasquez. Eva is the President and CEO of The Identity Theft Resource Center. She previously served as the Vice President of Operation for the San Diego Better Business Bureau and for 21 years at the San Diego District Attorney’s Office. She is an author, public speaker, and a recognized expert who has been featured on CBS Mornings, NBC Nightly News, New York Times, NPR, and numerous other media outlets. Show Notes: [1:02] - Eva describes her role as CEO and President of The Identity Theft Resource Center and what the organization does. [2:11] - Eva began her career in law enforcement and learned firsthand how dismissive we are of victims of identity crimes. [4:26] - The great majority of these crimes go completely uninvestigated. [5:48] - Your energy is best spent on recovering what you’ve lost rather than trying to convict the perpetrator. [8:03] - Identity theft isn’t the only identity crime. [9:47] - Most scams and data breaches at this time can be considered an identity crime. [11:06] - The majority of identity crimes that are reported at The Identity Theft Resource Center are caused by social engineering. [13:42] - If you see some unusual activity or communication on social media from someone you know, let the real person know. [16:17] - Chris shares a strategy for family passwords to verify their identity. [18:11] - There are several different types of identity fraud. A lot of it is credit cards, but it could be other types of loans or accounts. [19:54] - Identity fraud is complicated to solve. [21:00] - Eva shares the story of a victim who was car jacked and has had non-stop identity theft issues. [22:24] - People who are victims of identity theft may even have major problems in getting jobs. [23:42] - The number of victims who have felt suicidal after identity theft has increased year over year. [25:37] - The Identity Theft Resource Center is like AAA roadside assistance. Reach out to them. [28:00] - Eva shares that this is her life’s mission. She would love a world where The Identity Theft Resource Center wasn’t needed. [29:22] - Password management needs to be improved. [31:03] - Multi-factor authorization is absolutely necessary. [33:28] - If you ever get a call from someone claiming to be from your bank, hang up and actually contact your bank using the number on your card. [34:42] - We need to flip our view of “annoying” security measures. [41:57] - Safeguard access to all the accounts you have, even email accounts. [43:16] - It can take anywhere between a day and ten years to resolve identity fraud. It is very situational. [46:03] - It may also be possible for something to appear solved but then it is in remission. [47:20] - There is no shame in asking for help. It is very complicated. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27054282
info_outline
The Science of Social Engineering with Chris Hadnagy
06/07/2023
The Science of Social Engineering with Chris Hadnagy
You may be shocked to know that master manipulators utilize special tactics to impact human behavior and emotions by more than just instilling a sense of urgency. The art of persuasion can be used for both good and evil. Today’s guest is Chris Hadnagy. Chris is the author of five books on the topic of social engineering. He is a professor of social engineering at the University of Arizona as well as the CEO of Social Engineer LLC, the Innocent Lives Foundation, and the Institute for Social Engineering. Show Notes: [0:57] - Chris shares his background and how he found himself in the field of social engineering and understanding human decision making. [2:38] - It is not the case that only stupid people fall for scams and phishing emails. [4:04] - There is good social engineering and Chris gives some examples. [5:47] - The release of oxytocin is researched to show that it is linked to trust. [7:58] - You can have oxytocin and dopamine separately but together they build a bond. [9:17] - Marketing and advertising land in the gray middle area of social engineering. Is it being used for good or bad? [11:14] - It is important to look at things through the lens of purpose. What is the intent behind it? [12:35] - All social engineering, good and bad, use the same principles. But malicious social engineering triggers different emotions, namely fear. [14:37] - Preying on fear is one way people are socially engineered, but Chris gives an example of how a company as large as Toyota was impacted by the sense of urgency. [17:12] - There are so many stories of social engineering that are extremely plausible and believable. [21:04] - The trend now is to use social media data and information to target people for spear phishing. [22:30] - If you feel any strong emotion after a request, it is a great time to pause and consider if you are being manipulated. [24:21] - If you ever fall for something, don’t let embarrassment make you sweep it under the rug. [27:31] - The idea of an authority figure is a principle to remember, but it doesn’t always work. [30:10] - In some countries, fear of authority isn’t present. But social engineers will look for the weaknesses to exploit in different environments. [31:16] - Voice phishing is currently on the rise. [33:21] - Chris shares about the uptick on LinkedIn requests that even targeted the US military. [35:28] - Although we will see some good from AI, Chris has many concerns. [37:33] - Chris describes some of the classes he teaches at the University of Arizona specifically about Social Engineering. [39:17] - You can take classes online from Chris on Social-Engineer.com. [40:21] - We need to understand social engineering to keep our children safe. Start having conversations early. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/27008742
info_outline
Preventing Email Attacks with Kiri Addison
05/31/2023
Preventing Email Attacks with Kiri Addison
Phishing emails are constantly evolving to take advantage of current trends, news, and holidays. Typically poor grammar or the time an email was sent could help you identify if it is authentic. But with AI, these obvious signs may soon disappear. Today’s guest is Kiri Addison. Kiri is the Detection and Efficacy Product Manager at Mimecast, working on security products to defend against new and evolving threats. Previously she was head of data science for threat intelligence and has worked in the public sector creating systems to detect and prevent cyber attacks and fraud. Show Notes: [0:59] - Kiri shares her background and what her role is at Mimecast. [3:03] - Email scams are still the number one attack method and they tend to follow trends, news, and holidays. [5:17] - Technology is improving and there is better protection of basic attacks, but with how fast threats evolve, there are still areas of improvement. [7:34] - Kiri shares some statistics on the improvement made after implementing phishing email training. [8:26] - With the use of ChatGPT, our usual red flags to look for will change. [10:12] - In the advice and training by Mimecast, they explain the impact on the end user. [12:08] - Kiri explains some of the different types of security measures available. [13:47] - A lot of companies only implement the training with their employees to check off the compliance. [16:50] - Be suspicious and take some time. Don’t feel pressured. [20:05] - Look for anything abnormal, even if it is something unusual from a sender you know. [21:44] - If you receive word from someone you know but it seems odd, contact the person directly to find out what’s going on. [23:10] - Mimecast works primarily with corporations and businesses, but there are some personal phishing email attempts. [24:44] - Some attacks combine safe sights with malicious links. [26:00] - Kiri describes some of the recent trends they are seeing. [28:58] - As AI evolves, it is going to become harder to protect. However, it all comes down to end user awareness. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/26852016
info_outline
The Balance Between Privacy and Protection with John Pizzuro
05/24/2023
The Balance Between Privacy and Protection with John Pizzuro
Age appropriate conversations need to be taking place with children on how technology is being used to groom them. Unfortunately, many are already addicted to the dopamine fix and their relationships with a device can numb them to being preyed upon. Today’s guest is John Pizzuro. John serves as CEO of Raven, a lobbying and advocacy group that focuses on protecting children from exploitation. John was a former commander of the New Jersey Internet Crimes Against Children task force and has created a framework for other countries to use to investigate child exploitation. Show Notes: [0:57] - John shares his background in ICAC and current role as CEO of Raven. [3:08] - With the changes of technology and the availability of it in every household, behavior has changed along with it. [5:01] - Using the internet at home makes the internet feel like a safe place. [6:16] - People manipulate others through language. [7:21] - It is simple to get hooked because of the dopamine fix met with social media. [8:49] - Do social media companies do enough? John says they don’t do anything and they don’t have the ability to moderate. [11:01] - AI is not yet fully understood. How can it be used for good or bad? [13:13] - There has to be a balance between privacy and protection. This is true for everything. [14:15] - Today, we are so polarized and the result is that a solution will not be found. [15:45] - Parents need to have real conversations with their children and the earlier the better. Open communication is important. [17:54] - It’s not talked about openly enough because it is scary to talk about child exploitation. [21:30] - Device addiction is a real problem and generally speaking, there’s a need for instant gratification that distracts us from real relationships. [23:10] - There are communities where people share techniques for grooming and they are extremely popular on the dark web. [24:53] - John shares some terrifying statistics. [26:25] - There are task forces working together to protect children from child exploitation. [28:30] - The task to go through digital evidence is time and resource consuming. [29:28] - What is needed in the US is age appropriate child protection legislation. [31:03] - John explains some of the challenges in current legislation. [32:17] - Do we hold all these tech companies liable? [33:40] - The larger the bill, the more things that people will have a problem with. [36:02] - If we can articulate things the right way, this legislation can make a huge difference. [38:06] - Child advocacy centers are impactful but their funding gets cut. [39:16] - The challenge with research is that researchers move from project to project. And action must be a result of theories. [40:25] - John shares ways you can impact this cause and who to talk to. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/26784363
info_outline
Intersection of AI and Cybersecurity with Paul Valente
05/17/2023
Intersection of AI and Cybersecurity with Paul Valente
AI creates opportunities as well as challenges. We may need to become more skeptical about what we see and hear knowing that images and words can be generated without transparency of its creation. Today’s guest is Paul Valente. Paul is the CEO and co-founder of VISO Trust, a former CISO of Restoration Hardware, Lending Club, and ASAPP with over 20 years of technology, financial services, ecommerce, and information security innovation. Paul holds several industry designations, including Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM) and ISO 27001 Lead Implementer. Show Notes: [1:02] - Paul shares his background and what he does now in his career. [3:23] - One of the key learning opportunities for Paul was being a victim and being involved in scams and cyberattacks. [5:28] - It’s getting harder and harder now to tell something’s legitimacy with the ability to use AI to generate content for scamming. [7:54] - As a consumer, when you work with a company and share your data, you are sharing it with the whole ecosystem. [10:16] - It is very hard for security to be managed when there is so much data. [11:58] - Surveys sometimes give a false sense of security. [14:21] - At VISO, they remove the friction in order to make the process scale. There are so many third parties and vendors. Focus on real information. [17:02] - Security is not a solved problem. There are always imperfections. [19:07] - There’s a variety of different responses to cybersecurity breaches. [20:46] - Companies who are transparent about breaches tend to be seen as good companies. It’s how you handle it and take steps to communicate. [23:27] - We’ve been trained to look for errors but today, with the use of generative AI, it is easier for scammers to create perfect messages. [25:30] - We need to learn ways to improve our ability to discern real content from fake content. [26:46] - AI also creates unique opportunities. [29:47] - We still tend to have the idea of AI being a sentient being based on science fiction. So what is AI? [31:12] - It’s all about shrinking the problem space. [33:17] - AI growth and what is called the Cyber Kill Chain will happen incrementally. [34:55] - Be aware of where you are communicating. You will need to look hard when it comes to social engineering. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/26679777
info_outline
Financial Vulnerability and Social Isolation with Marti DeLiema, PhD
05/10/2023
Financial Vulnerability and Social Isolation with Marti DeLiema, PhD
If you experience any high pressure tactics or urgency that someone needs you to make a financial decision fast, take a pause and realize that you might be talking to a scammer. Today’s guest is Professor Marti DeLiema. Marti is an Assistant Professor and Gerontologist at the University of Minnesota. Her work focuses on identifying the extent and cost of financial fraud in the US as well as factors related to financial victimization of the aging. Show Notes: [0:48] - Marti shares her background and as a gerontologist, her focus on the aging. [3:02] - When doing her research, Marti discovered that fraud is not limited to the elderly. [4:16] - Why are older adults more likely to be targeted? [5:50] - Executive functioning skills decline earlier than other abilities. [7:30] - Social isolation can take form in a few different ways. [9:47] - People who are grieving a loss are even more susceptible to scams. [11:38] - Underreporting is a really big problem in the research and it is common among older adults and older victims. [14:26] - Marti recommends reporting scams to the Federal Trade Commission. [15:38] - To help prevent potential issues, start to think about who in your family or close circle can help make financial decisions. [17:08] - Bringing people in actually makes you more in control. [19:02] - There is a societal stigma about being a victim of a scam and it prevents older adults from sharing the situation for help. [20:20] - There is a huge shift in our population in our demographics and the largest wealth transfer coming. [22:09] - The world is very complex right now, especially when it comes to communication, technology, and finances. [24:10] - Financial institutions can help prevent scams through strong customer service and education. [26:36] - Marti shares an experience overhearing a retail manager explaining why he wouldn’t let an elderly customer purchase any more gift cards. [28:50] - Scammers will warn victims that they will be asked specific questions about their gift card purchase. Thanks for joining us on Easy Prey. Be sure to and leave a nice review. Links and Resources:
/episode/index/show/easyprey/id/26617560