Episodi

  • Smishing texts have increased over 60% in just one year. With scammers spoofing caller ID, how can you trust any communication coming onto your phone? Today’s guest is Giulia Porter. Giulia is the Vice President of RoboKiller, the app that eliminates 99% of spam calls. Since 2017, Giulia has been leading RoboKiller’s vision to create a world without spam calls. And now more recently with spam texts, they’ve introduced Text Killer.

    Show Notes: [1:04] - Giulia shares her background and why she was led to a career with cyber security. [2:24] - Caller ID spoofing is when a scammer changes what number comes up on your phone when they call. There is also neighbor spoofing. [4:30] - Technology has allowed scammers to call from any number, including your own. [5:54] - Scammers try to stay ahead of trends. [6:30] - Stir/Shaken is a framework designed to help stop spam call problems. [8:12] - Most United States phone providers did implement this. [10:10] - Giulia explains how this framework works and some of the pitfalls it has. [12:08] - As of May, we are at about 6.5 billion estimated spam calls in the United States per day. About 35-40% of those use caller ID spoofing. [13:19] - Spam texts are on the rise having experienced a 60% increase in one year. [15:01] - Text Killer tries to distinguish between spam and unwanted texts. [16:21] - Giulia describes a court case against Facebook that changed the landscape of notification texts. [18:01] - Some people have a “burner phone” with a separate number that they use for accounts that require a phone number. [21:03] - Giulia shares some of the scams that were trending in the last couple of years and what scammers were targeting. [22:20] - In 2022, there has been an increase in illicit spam texts. [24:27] - Don’t tap links in texts or reply to them. Delete the text. [26:18] - Thinking about your phone number in a more serious way is a way to be more aware of how many people have access to it. [27:56] - Chris shares something you can do about your personally identifiable information online. [29:20] - RoboKiller and Text Killer use AI and machine learning to analyze calls and texts to stop them from reaching you. [30:50] - You can talk to your carrier to find what protection they offer. [32:01] - Another concern is lobbyists paying providers to have select campaign texts to come through. [33:13] - You can report spam texts and notify your carrier. [34:52] - How does Robo and Text Killer make sure the numbers and texts that are blocked are accurate? [38:12] - RoboKiller has to work with different providers and that creates challenges when they all function slightly differently. [40:38] - The next wave of scams are through apps like WhatsApp and Messenger. [43:12] - Organizations need to also consider how much they lose to scams posing as them. [45:12] - RoboKiller is available online as well in the app store on iPhones and Android. There are free services and premium.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest RoboKiller Website
  • Can understanding someone’s digital footprint really make it easier for it to predict what they’ll be doing using AI? Today’s guest is Daniel Hulme. Daniel has a PhD in Computational Complexity and works in the field of AI, applied technology, and ethics. He is the CEO and founder of Satalia, a Tedx speaker, and educator at Singularity University.

    Show Notes: [0:50] - Daniel has already been interested in how humans behave and describes how he got into AI. [2:05] - AI gets grouped into technology but there are a lot of different types of AI. [3:50] - The ultimate goal of AI is to have computers make decisions and learn from the decisions, but that’s not commonplace right now. [5:31] - Someone’s digital footprint can be used to learn a lot about them. [6:51] - The challenges that we are facing with AI are not ethical challenges, they are safety issues. [8:29] - AI is super complex and is becoming more difficult to test. [10:03] - AI’s learning isn’t usually the problem. It’s the framework put in place. [11:36] - Machine learning is a generalization of the world which can create biases. [14:26] - Building explainable systems is incredibly important. [16:20] - Daniel gives an example of how AI can use data but why human decisions are still important. [18:16] - It’s much more cost effective to have simple solutions than complex ones. [20:35] - What is the effect of building a super intelligence? We don’t know. Daniel explains the singularities involved. [21:45] - These technologies are replacing people in completing some tasks. This is arguably a good or bad thing, depending on how you think about it. [23:47] - There are different safeguards against each of these singularities. [24:56] - Daniel shares what he thinks will be the solution. [28:07] - Who is going to make this “glorious future”? [29:36] - As AI takes the roles of employees in some companies, Daniel believes it will balance out again. [32:01] - There are jobs that may be impacted more than others. [33:46] - Something else that Daniel thinks may happen is a new economic structure. [35:12] - The highest cost for many organizations is human labor. [36:42] - There’s a possible paradigm shift that will have to change the way we think about work and money. [39:30] - Daniel is optimistic that we’re headed in the right direction.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Satalia Website Daniel Hulme on Twitter Daniel Hulme on LinkedIn
  • Episodi mancanti?

    Fai clic qui per aggiornare il feed.

  • Advertisements can manipulate us and depict a product that doesn’t actually work. The challenge is knowing if the technology does what they say it does. Today’s guest is Ken from Computer Clan. Ken, or commonly known as Crazy Ken, has been running the Computer Clan YouTube channel since September of 2007. He posts tech videos about rare and retro tech, new tech, and even has a series about scammy tech products. Whether you are a tech whiz or a beginner, it doesn’t matter. Ken will bring the knowledge, science, entertainment, and even debunk a few scams along the way.

    Show Notes: [0:51] - Computer Clan is one of the longest running tech focused YouTube channels. Ken shares the channel’s background. [2:28] - The channel is celebrating its 15th anniversary and now is Ken’s full time job. [3:06] - Ken shared how a tech product advertisement gave him the idea to debunk false advertisements in videos. [4:27] - When he was younger, Ken made a purchase and experienced the disappointment of advertisements that promise more than they offer. [7:38] - A big red flag to look for is the cheesy video ad that promises things that seem miraculous. [8:40] - Another ad feature that can be used ethically, but can also be abused are those fake countdown timers on websites. [9:47] - Review sections of a product are not always accurate. If you take a closer look, some of the comments are the same. [11:45] - If there is a bad experience, even if there isn’t a review, people do tell their friends. Be careful about perfect reviews. [12:37] - Ken shares a story about ads that steal video footage from other companies. [14:10] - There are a lot of ways to find stock footage, but many fake ads pull footage from copyrighted material. [16:57] - Some of the products might not be odd, but Ken says that some of the clickbait ads are strange. [18:21] - In the early days of Covid, people took advantage to create ads that claim more than is possible. [20:25] - Ken shares some products that he thought would be a scam that actually turned out to work fine, but the ads were misleading. [22:40] - During his videos, Ken even sometimes has a fire extinguisher handy. [24:19] - Urgency could be a red flag. [25:30] - Ken shares some of the products he is looking at to debunk the ad and the product. [27:20] - The educational element of the Computer Clan YouTube channel can show you that although not all products are fake, they may not be what you need.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Computer Clan’s New Upcoming Website Computer Clan YouTube Computer Clan on Twitter
  • Working from home has increased the ability for cyber criminals to exploit companies. Listen on for how to be sure that the email you received isn’t from someone impersonating someone else. Today’s guest is Eric O’Neill. Eric is a security expert and author that presents keynotes internationally about espionage, national security, cyber security, fraud, corporate diligence and defense, and of course, hacking. Eric has worked as an FBI counterterrorism and counterintelligence operative, national security attorney, and a corporate security consultant. He founded The Georgetown Group, a premier investigative and security business firm. Eric is also the national security strategist for Carbon Black, the leader in next gen endpoint security and serves on the general council for global communities and international security.

    Show Notes: [1:05] - Eric shares his background and how he got involved in cybersecurity. He describes his previous role in the FBI. [2:47] - Moving on after his career in the FBI, Eric currently wears many different hats in various roles. [4:58] - Using his interest in hacking, he was able to catch the biggest FBI spy in history. [6:48] - Everything changed about how we work since the pandemic. [7:46] - In many cases, people were working and kids were learning from mobile devices. We weren’t ready for this to happen. [9:09] - The massive increase in people working from home, increased the number of attacks. [10:25] - Eric shares some statistics of reported cyber attacks in the last couple of years. [11:38] - Romance scams are the second-highest attack trend since the start of the pandemic. [12:50] - One of the positives that came from this change to remote, is in hiring talent from around the world. [14:10] - Eric thinks we will see more scams of people impersonating CEOs or higher ups in a company. [16:27] - Passwords are useless without multi-factor authentication. [18:03] - SMS authentication isn’t great, but it's better than nothing. [19:53] - Eric shares how people can mine data they purchase from the dark web and how easy it could be. [22:48] - Cyber criminals want to take down an entire critical infrastructure. [24:42] - Criminals are getting much more clever in throwing people into chaos by attacking critical infrastructure. [25:32] - Eric believes that cyber attacks will be the method of attack in the next major war. [28:05] - He uses the example of the colonial pipeline to demonstrate what chaos these attacks can create. [30:10] - There is some speculation of possible attacks on critical infrastructure and the possibility of them maintaining presence. [33:19] - Chris shares the issues with power in his area. [35:25] - Jokingly but accurately, Eric shares that your children are great hackers. [38:42] - Some apps change the location of numbers for entering a PIN so people can’t pick up patterns. [40:54] - There are some medical devices that could be compromised. [42:50] - The average person doesn’t think about the ways someone can have malicious intent. [44:41] - Cyber espionage is definitely a problem, but cybercrime is what the average person needs to be aware of. [46:09] - Don’t click on links. Known vulnerabilities are the most commonly successful attack. [48:20] - The Dark Web is the third largest economy in the world.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Eric O’Neill’s Website Eric O’Neill on Twitter Eric O’Neill on LinkedIn
  • The thought of your computer getting a virus implies something biological, but the fear of infection is real. Are there prevention techniques that you need to be implementing now? Today’s guest is Ran Levi. Ran has been podcasting since 2007 and started with a podcast regarding history and technology. He is the co-founder of PI Media LTD, helping other people do podcasts. He is the editor and host of the popular podcast Malicious Life that tells the stories of the histories of cyber security with commentary by hackers, security experts, journalists, and politicians.

    Show Notes: [1:02] - Ran is a podcaster from Israel and he shares his background and podcast beginning. [2:18] - Through podcasting, Ran was asked to begin another podcast about cyber security which was a topic he was passionate about. [4:36] - Knowledge is important but the stories are the key to an impactful podcast. [5:56] - In the early days, pirating games and media was commonplace and through personal experience, Ran became very interested in the history of cyber security. [7:03] - Cyber security professionals are used to the idea of autonomous software, but for the public at large this is a weird idea. [8:50] - The terms used in cyber security suggest something biological and can be confusing. [10:45] - People have rediscovered how to create and replicate computer viruses hundreds of times over the decades. [12:54] - Computers and emotions intersect when it comes to scammers and viruses. [13:35] - Ran shares one of his favorite cyber security history stories from Israel. [14:48] - The feeling of anonymity is something very appealing about the internet. [16:08] - One of Ran’s favorite interviews was with Steve Wozniak. [18:25] - Some hackers decide to go commercial. [20:14] - Ran shares the wildest story revolving around the Equifax breach. [22:02] - AI has extreme potential and we haven’t seen its impact yet in cyber security. [23:31] - The human element is sometimes easy to detect a scam, but when AI learns to scam, things can get scary. [25:41] - Right now, the script or content from AI is written by people. [26:33] - You can easily gather a lot of information about almost anyone. [29:04] - Ran says never to trust an organization with your information. [30:06] - Working on his show and writing his book has created some level of cynicism. [31:20] - Things used to be a lot more “fun” online without being as fearful of being hacked. [32:28] - Scam calls are not as common in non-English speaking countries. [34:42] - Social media isn’t evil. But the scammers are using organizations like Facebook and others to help them gather the data they need to scam you. [36:47] - For many companies, client data is a liability. [40:05] - For every modern company, information is their lifeblood. [42:03] - Ran shares the story of, as a newer employee of a company, he was able to get into systems he shouldn’t have been able to access.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Ran Levi on Twitter Malicious Life Podcast
  • Reusing passwords makes it easier for threat actors to gain access to your accounts. They may not actually be using it to take money. They may be impersonating you to scam others in your network. Today’s guest is Joel Hollenbeck. Joel is a cyber security executive with over 25 years experience in multiple disciplines. He is the CTO at Check Point Software Technologies and leads a global team of cyber security experts dedicated to understanding the challenges that customers face and helping them stay ahead of the ever-evolving threat curve.

    Show Notes: [1:01] - Joel shares his background and his current role. [2:38] - Joel has teenagers at home and describes the challenges of communicating threats including one that wound up being an attack. [5:06] - His credit card company alerted him of fraud and he looked further into it. [6:29] - Threat actors have to constantly change up their tactics. [7:53] - The latest report shows that the number one brand that scammers are using is LinkedIn. They are trying to harvest accounts to get in under the radar. [9:06] - Brands themselves need to also be aware to keep their customers safe. [10:36] - Every major holiday, shopping event, or global event creates new opportunities for phishing attempts. [12:09] - Joel shares some of the information threat actors gather. [14:33] - A great many people don’t trust SMS messages. [16:30] - The reuse of passwords has been proven to be a huge mistake. [18:37] - Chris shares an experience with a password reset issue. [20:28] - Social media companies do not have a public facing customer service line. [22:46] - On the other end of the spectrum, there is the issue of being overwhelmed by multi-factor authentication. [24:18] - Product links on social media are also something to be wary of. [25:37] - Think of it as a risk assessment and know that sometimes it will feel very cynical. [26:59] - You don’t know if the person on the other end of a message is from the person you actually trust. [28:48] - Threat actors strive to gain access to high value accounts. [30:42] - Some LinkedIn or other social media account hacks, they will be used for simple phishing attacks. But some will be used for something very sophisticated. [33:06] - Awareness of these issues is critically important to try to stay ahead of scammers.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Joel Hollenbeck on LinkedIn Check Point Security Website
  • All security is personal. It’s important for each individual to understand the risk of predators so we can protect ourselves, our data, and our finances. Today’s guest is Robert Siciliano. Robert is a security expert and private investigator, number 1 Amazon best-selling author of five books, and an architect of the CSI Protection Certification, a cyber-social identity and personal protection security awareness training program. He is a frequent speaker and media commentator and the CEO of Safr.me. Robert has been featured on CNN, Fox News, and in The Wall Street Journal.

    Show Notes: [1:02] - Robert shares his background and career, beginning with self-defense training in the 90’s. [2:40] - At the start, Robert operated his business through a catalog and through live training. Once he offered credit card payments, he was hacked. [3:58] - There will always be a criminal element out there looking for a target. [5:01] - All security is personal, including both physical and virtual. [5:55] - Chris shares an experience of owning an online bookstore. [7:32] - Regardless of the value, there are people who are motivated to steal anything. [9:27] - Some people have the mentality that they don’t have anything valuable to steal. Humans are born with the innate ability to trust. [11:31] - It is also human nature to lie. [12:52] - It is getting easier and easier for people to make fake social media profiles that are very believable. [14:52] - Every time someone reaches out to you, be suspicious. It’s not paranoia. [16:55] - There are signs in communicating with others that may indicate that they are trying to do you harm. [18:20] - Most people are not doing even the basics of security. [19:30] - Some people believe that taking precaution is living in fear. [21:47] - Robert describes denial and why people live that way. [24:17] - Robert’s career is built on selling the concept of security. [25:32] - There is no such thing as a safe neighborhood. [26:52] - Once we get the basics down, we can make advances in security. [28:35] - Most cyber security awareness training only includes content about phishing. This is to meet compliance but doesn’t solve many problems. [30:18] - Security awareness makes it important to individuals. [32:12] - For many organizations and security companies, they treat security as business. [34:40] - Teaching security through fear is not effective. [36:00] - It is important to have uncomfortable conversations regarding security with your family from time to time. [37:16] - Robert explains the future impact of the Equifax data breach if security strategies have not changed for an individual. [40:25] - Robert has frozen his credit since 2008. [42:53] - The “Grandma Test” is asking yourself if something is manageable by everyone. [45:36] - Robert uses the example of wearing a seatbelt as decades long to make it the norm. [47:12] - CSI Protection is a 6 hour course that Robert offers that includes interaction with experts. [49:03] - These courses are geared towards those in the service industry.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Safr.me Protect Now LLC Website
  • There’s always risk when using technology, but your perception of the exposure will determine how active you are at minimizing the danger. Today’s guest is Stephen Cobb. Stephen is a best-selling author and award winning technologist with over 30 years experience in digital security and data privacy. He has authored more than a dozen textbooks on PC and LAN security as well as software usage. As a CISSP since 1996, he co-founded two successful security startups and earned a Master’s in security and risk management. Stephen now researches harm caused by the abuse of digital technology.

    Show Notes: [1:02] - Stephen shares his background and how he wound up in the world of cyber security. [3:17] - In the earlier days of his career, he learned the niche of the risks of technology. [6:13] - Privacy violations were becoming a HIPPA category. [9:14] - Stephen shares more about the companies he worked for and his experience in cyber security. [10:44] - Stephen continues researching risk perception. [12:01] - Understanding the limits of technology and human behavior have helped guide his research. [13:02] - Covid was a very eye opening experience in that it revealed who was willing to exploit and who was willing to come together. [14:26] - The new ideas of solving problems are coming out of smaller companies. [15:41] - Growth of security is evolving but is it keeping up with the use and diversity of technology? [17:23] - Different countries have a different approach to tracking cyber crime. [19:05] - The data isn’t accurate as much cyber crime goes unreported. [20:23] - Stephen believes the amount of monetary loss from cyber crime can be doubled in individual wellbeing. [21:41] - The effect of being targeted has led to health problems. [24:30] - Some countries are doing a better job cracking down on cyber crime, but many kinds of scams, particularly romance scams, continue to go unreported. [25:50] - Crypto currency has been abused since it’s onset. [26:51] - Tech support scams are also going strong. [27:25] - Crypto scams are cumulative. They don’t replace a scam, they add to existing ones. [31:48] - People aren’t thinking about what a mess that malware will create in upcoming technology. [34:08] - Cyber crime is now organized crime. [37:04] - Stephen describes his experience showing NPR the industry of the Dark Web. [38:52] - People continue to be shocked and amazed by how organized the industry of cyber crime is. [40:10] - There has been a drop in enthusiasm and trust in technology companies from the general public. [44:10] - When we push technology on people who do not have a lot of experience with it, security becomes complicated and it becomes an ethical dilemma. [46:39] - Nothing has been done to make these ethical issues become morally reprimanded. [48:10] - Cyber crime is a huge challenge that is a relatively recent phenomenon. [50:40] - Although foreign scammers cannot be arrested in your country, Stephen still thinks they should be sought after. [52:08] - We need growing economies and full employment in all countries.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Stephen Cobb’s Website Stephen Cobb’s Twitter
  • Corporate spies are regularly hired by competitors to help poach employees with the best ideas. Listen on to know if it is happening at your company and how to prevent it. Robert Kerbeck is the founder of Malibu Writers Circle and his essays have been featured in numerous magazines and newspapers including Los Angeles Times, San Francisco Chronicle, and Los Angeles Times Magazine with one story adapted in the award winning film Reconnected. His newest memoir Ruse: Lying the American Dream From Hollywood to Wall Street is a look at the world of corporate espionage and his career as a corporate spy.

    Show Notes: [1:08] - Robert never thought he would become an infamous corporate spy. He shares his background and what led him there. [3:42] - He was hired and realized it was not the ordinary marketing job he thought it would be. [4:46] - The job was determined to be in a “gray area” legally. [6:00] - A lot of Robert’s job was over the phone trying to get information out of employees. [7:04] - Eventually, Robert would imitate major executives over the phone. [8:48] - A lot of the information gathered at the time was employment information. [10:07] - Some employees are not listed as team members to avoid being poached. [11:11] - Although so much data is available publicly online now, there are still pieces of valuable information that corporate spies can use. [12:49] - Corporate plans are valuable to competitors. [13:58] - In Robert’s case, blackmail wasn’t utilized, but rather poaching talent. [15:54] - Robert describes some of the information that he was gathering. He viewed himself as an actor. [17:38] - Sometimes the more outlandish something seems, in a strange way, it becomes more believable. [19:24] - In order to target the right person and use the right strategies, Robert had to do a lot of research on the companies he was contacting. [20:53] - There are certain areas in a firm where people aren’t following company protocol. [22:17] - In the corporate world, there are qualities that create a toxic culture. [24:53] - There should be training in place to ensure that employees do not reveal information if they do not know the person. [26:18] - Once someone has access to an organizational chart, not only employee names are available. [29:02] - The more time spent trying to break a company for the information desired, a corporate spy is gathering small pieces of data. [31:23] - There are scams that are designed to target people who have previously been a victim of a scam. [32:04] - Robert explains that he never used these skills in his personal life. [33:12] - In 2008, jobs were harder to find and Robert left his career as a corporate spy. [35:41] - Robert describes his experience in Corporate America. [37:27] - Through his experiences, Robert says it was very nerve wracking to attend corporate events as somebody else. [38:46] - Find Robert’s new book on his website.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Robert Kerbeck’s Website Robert Kerbeck on Instagram Robert Kerbeck on Twitter
  • If you are addressing the blindspots in your online security, you cannot prevent the costly impact of lost or hacked data. Today’s guest is Ralph Russo. Ralph retired from the New York Police Department after over 20 years and served as the commanding officer of an organized crime control task force of local, state, and federal law enforcement. He is currently the Director of Tulane University’s School of Professional Advanced Information Technology where he has taught in both homeland security and information technology programs. Ralph holds a bachelor’s of Business Administration and a master’s degree in Information Technology. As an entrepreneur he has co-owned two startup technology firms.

    Show Notes: [1:01] - Ralph shares his current role at Tulane University and shares his interest in information technology. [2:15] - As more people become dependent on online systems, the more valuable it becomes. [3:50] - As an educator, Ralph engages students in the growing field of cybersecurity. [4:42] - Ralph describes qualities of great cybersecurity students. [6:32] - Cybersecurity can be compared to traditional security. [8:48] - Using traditional security as an example, Ralph says that a single door just isn’t enough. [9:41] - “It is so much harder to secure something when you have to retrofit it rather than designing it for security.” [12:02] - In some ways it is harder to bring older companies that work more traditionally on board with updated cybersecurity. [13:12] - Ralph believes there is a misunderstanding that small and medium sized businesses may not believe they are a target. [14:22] - Sometimes the target is not money, it’s data. [15:53] - Now, there is cybersecurity insurance offered which Ralph believes is a good thing. [17:01] - In the near future, Ralph believes that if you do not have the most updated software, you will be denied access. [18:40] - At Tulane University, the program is designed to have graduates provide value to cybersecurity immediately. [20:44] - The separation of tech and cybersecurity from a company’s team is over. [22:35] - From a leader’s perspective, a data breach is also a loss of money. [23:31] - If you lose your company’s server, can you afford to be down for a week? Likely not. [25:08] - In the cloud does not always mean secure. [27:40] - Hacking is now being done by massive criminal organizations. [29:21] - Malware is coming from every direction. [32:27] - Responsible disclosure is extremely important. [34:05] - Your backup should not be in the same place as your primary location for stored data. [35:45] - Ralph shares his ideas on what cybersecurity governance will look like in the future. [37:33] - There are daily news stories of cyberattacks. Ralph shares an example. [39:33] - Phishing is still a huge problem, but awareness is being raised constantly to help. [41:06] - Cybercrime undermines a lot of the good that technology does. It reduces trust and introduces fear and confusion. [43:40] - Courses and resources are available no matter where you are.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Tulane University Information Technology Program
  • Data entry may seem boring, but you never know the story behind the information being entered and the patterns that emerge. Some data has distinctive characteristics that point towards fraudulent activities. Today’s guest is Leah Wietholter. Leah is the CEO and founder of Workman Forensics as well as the host of the Investigation Game Podcast. After working for the FBI, she has served as the Senior Certified Fraud Examiner in Tulsa and she currently volunteers as a treasurer for the Tulsa Crime Stoppers. With over 15 years of experience and more than 100 cases worked, Leah has honed her industry expertise to create the Data Sleuth Process, a scalable data-first approach to forensic accounting engagement and fraud investigations.

    Show Notes: [1:03] - Welcome to the show, Leah! Leah shares her background and current role as founder of Workman Forensics. [2:08] - What sets Workman Forensics apart is their creative team and Investigation Games. [4:26] - Forensics accounting started becoming more common, but Leah shares how she became a part of the FBI accounting team. [6:13] - While in the FBI, she was heavily involved in data entry and also testified for grandy jury after Hurricane Katrina. [7:58] - Many times, fraud is determined simply by entering data and seeing patterns. [9:25] - Leah explains a tool developed by Workman Forensics to see anomalies within data that indicate fraud. [11:41] - By building up from this information, categories for fraud risk can easily be seen. [13:18] - Business owners need to know what money enters the business, what form of payment, who touches the money, and what money leaves the business. [14:29] - Pay close attention to your payroll reports. [16:04] - You need to also know what is normal for your business, then always look for things that look off. [17:31] - Chris shares an unusual statement he received and why it looked odd. [19:08] - People committing embezzlement typically pay themselves in even dollar amounts. [20:57] - Indicators allow investigators a more defined set of data to look at more closely. [22:46] - If the person in charge of your bookkeeping isn’t reconciling, you have a problem. Leah explains what reconciling is. [24:57] - You don’t always know how much money you have if you aren’t reconciling. [25:56] - Most scams have a lifespan of 18 months, but in these types of financial fraud cases, Leah says they last several years. [26:58] - When it comes to financial fraud, Leah says it can’t always be prevented but it is important to detect it quickly. [28:21] - When money comes into your business, a certain amount is already called for. The money stolen is the profit. [30:11] - You can limit access to accounts through your bank. [32:14] - Leah shares the story of the craziest case she worked on. [36:12] - In this case, someone was using their own legitimate business to launder money through fake vendors. [37:25] - Many people think that if a large sum is stolen that the money can be found somewhere, but in most cases, it has been spent. [40:18] - In Tulsa, where Leah is located, there are a lot of casinos but the majority of the embezzlement cases she has worked on are by people with shopping addictions. [42:31] - One of the suspicious behaviors for high risk is being loved by management but not by others. [44:24] - The feeling of betrayal is the most emotionally charged in these events. [45:13] - As the owner, make it a process to check things every month. [46:50] - A red flag could be if bookkeepers or accountants are defensive when you want to check things.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Workman Forensics Website The Investigation Game Podcast The Investigation Game
  • In 2020 and 2021, the scam that impacted the largest number of people was done through online purchases. Either you or someone you know may very well have been scammed. Today’s guest is Melissa Trumpower. Melissa Trumpower is the Executive Director of the BBB Institute for Marketplace Trust, the Educational Foundation of the Better Business Bureau. Melissa is the co-author of several research reports, including the BBB Scam Tracker Risk Report, the BBB Online Purchase and Employment and Small Business Scam Reports. She has more than 30 years of leadership experience working with not-for-profit, has a bachelor’s degree from Cornell University and a master’s from John Hopkins University.

    Show Notes: [1:01] - Welcome to the show, Melissa! Melissa shares her current role with BBB and the mission of the organization. [2:05] - Scam trackers from the BBB were created in 2015 to be really intentional and specific to track data on threats. [3:30] - Melissa explains why she was drawn to this position with BBB. [5:09] - Due to Covid, more people were online in 2020 and 2021 and online purchasing scams were the riskiest. [6:25] - The BBB utilizes a risk index that looks at more than just the most prevalent of scams. [7:23] - Online purchase scams don’t involve a lot of money per individual target, but they are riskiest because of how many of them are extremely believable. [8:37] - Online purchase scams are simple. You purchase an item from a website or an ad and you never receive the item. [9:45] - Be aware that you can come across fake websites in your web searches as well. [10:46] - Melissa shares things to look for in sites that you have never purchased from before. [11:56] - Don’t do anything rash especially if you feel like something is off. [13:03] - The method of payment can be a red flag. [14:21] - Crypto is also increasingly used in online purchase scams. [16:43] - Be very careful even when sending crypto to someone you know and be certain you are sending it to the right person. [17:04] - Employment scams are another top scam for the third year in a row. [19:24] - Employment scams average a loss of over $900 per target. [20:38] - Some job listings, especially on Craigslist, tend to be very vague and promising. [22:55] - The other two top scams are home improvement scams and investment scams. [24:24] - If you are investing money, do the research before making decisions. Melissa gives examples of what you can do to ensure safety. [27:25] - Scammers do sometimes also pose as legitimate companies. [28:02] - Don’t believe everything you see or read. Be cautious. [29:28] - Another element BBB is looking at is the non-financial impact of scams. [30:42] - The highest scam for susceptibility is the moving scam. [32:29] - Consumers often read reviews and it is nearly impossible to tell the difference between a real or fake review.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest BBB Scam Tracker BBB Marketplace Trust
  • Many use the internet considering it more like a walk in the park rather than realizing it is more like a trip down a dark alley. Today’s guest is Stuart Madnick. Professor Madnick has been a faculty member at MIT since 1972. He has served as the head of MIT’s IT group for more than 20 years. During that time, the group has been consistently rated number 1 in the nation among schools for information technology programs. Dr. Madnick is a prolific writer and author or co-author of over 380 books, articles, or technical reports and textbooks. He has a degree in Electronic Engineering, Management, and Computer Science from MIT. He has been a visiting professor at Harvard University and six additional countries.

    Show Notes: [1:10] - Dr. Madnick shares his background and current role at MIT. [2:53] - There were examples of cybersecurity attacks predating the internet through floppy disks. [4:02] - In the late 90s and early 2000s, the internet experienced a boom of users. [5:50] - In other industries, safety is a priority. [6:53] - Everything, even toothbrushes, have computers in them. [8:30] - Most know of the common scams, but there are people who still fall victim to them. [9:18] - Some of the really poorly written scam emails are intentionally created this way to find the most gullible. [10:15] - Dr. Madnick describes spear phishing and the rise in these cases. [11:30] - In some cases, only a couple hundred dollars could be enough for a scammer and they add up quickly. [13:03] - Don’t feel bad if you are hit by a believable scam. [14:11] - Most people do not consider what to do to minimize damage. [16:56] - If something bad happens to your computer and/or your data, what is your plan? [18:54] - Dr. Madnick shares some corporate examples of cyberattacks. [20:23] - We constantly have several subconscious decisions that we don’t consider the consequences of. [22:16] - Maintaining certificates and security is a tedious and manual task. [23:51] - Data is tracked by how attacks were successful rather than how many were unsuccessful. [26:10] - Larger companies are starting to give more attention to cybersecurity but the progress is very slow. [28:31] - Cybersecurity can be considered a catastrophe. [29:30] - What does a cyber catastrophe look like? [31:40] - Outages and malfunctions are possible and in catastrophes, a solution can take weeks or more. [33:22] - It may not be likely that a catastrophe will happen, but it is possible, and we are unprepared. [36:12] - You can’t avoid all risks, but you can minimize the damage done. [39:31] - Cybersecurity tends to be a low priority. [41:17] - What is a “zero-click vulnerability?” [43:12] - Cybersecurity education is outdated in most schools. [44:43] - You can put a better lock on your front door, but if you put your key under the mat, are you any more secure?

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Cybersecurity at MIT
  • Everyone is at risk when they’re online. But there are simple security measures that you can implement that will make it more difficult to be hacked. Today’s guest is Lisa Plaggemier. Lisa is the Interim Executive Director for the National Cybersecurity Alliance. She has held executive roles with Ford Motor Company, InfoSec, and Media Pro. She is also a frequent speaker at major events and is a thought leader for innovative security trainings and awareness programs.

    Show Notes: [1:05] - The National Cybersecurity Alliance has a mission to enable a more secure interconnected world. [1:45] - Lisa was working in sales and marketing with Ford Motor Company, but shares an experience that changed her career trajectory. [4:27] - Lisa created a series of videos that became popular with viewers. [5:58] - Security professionals are well intentioned, but when educating people who are not technologists, you want to give just enough to stay interested. [7:21] - People use technology to enhance their lives. The internet was never built to be secure. [9:30] - Doing things securely doesn’t always mean that the user should be frustrated. [11:04] - With keeping track of passwords, Lisa reveals the common misconception of password management sites. [12:28] - Another problem is with business accounts and corporations where employees think the company handles security. [14:23] - Unfortunately, there are some sites that don’t make using a password manager easy. [15:31] - It really isn’t necessary to change your password every 90 days as was previously important to do. [16:46] - It is important for people to research a company and their possible security breaches before doing business. [17:57] - Part of many sites are requiring two factor authentication as a part of the setup process. [19:27] - What if everyone did two factor authentication? [21:46] - Lisa shares some stereotypes of hackers and phishing emails. But they aren’t like that anymore. Hacking has become very sophisticated. [24:42] - Advertising and stock images feed this stereotype. [26:24] - Organized crime is structured just like a professional organization. [28:40] - People involved with organized crime look at what they are doing as just their job. [30:04] - Lisa’s prediction in cybersecurity will get worse before it gets better. [31:54] - In the security world, security professionals are improving their ability to educate the populace. [33:52] - If we don’t report things, trends will not be noticed. [35:31] - Always keep your software and apps updated. Updates are usually security driven. [36:47] - The language barrier between employees of a company and the IT department is something that needs to be bridged. [39:31] - There are a lot of free resources available on the National Cybersecurity Alliance’s website.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Lisa Plaggemier on LinkedIn National Cybersecurity Alliance Website
  • It is easy for people to create fake online profiles and say or do whatever they want as a cyberbully. They often don’t think through the possible consequences of their actions. Today’s guest is Tina Meier. Tina is the Executive Director of The Megan Meier Foundation. Her life was forever changed on October 16, 2006 when Tina’s 13 year old daughter Megan Taylor Meier took her own life after being cyberbullied by an adult neighbor posing as a fictitious boy named Josh Evans. Her belief is that if there is even just one child that struggles with bullying, cyberbullying, or self-harm, that is one too many and we must be there to help and support them. Show Notes: [1:08] - Megan struggled with self-worth and self-esteem. Tina shares Megan’s story of meeting a boy on MySpace. [3:50] - The things that were being said online were not true and Megan began defending herself. She felt like her mother was not on her side. [4:52] - Megan took her own life. [5:45] - After Megan’s passing, the boy’s MySpace account was deleted. It turned out that it was a fake account created by the neighbor. [7:03] - It is hard to fathom that an adult was behind this, however Tina does not believe that Megan would take her own life. [8:27] - The FBI investigated and determined who was behind the fake account. [9:50] - The court case was a first of its kind and Tina explains the process and results. [11:15] - Tina took her focus to beginning the Megan Meier Foundation to help other kids. [13:34] - In the early 2000s, there were really no restrictions or laws in place to help protect people. [16:02] - When your child is young, talk to them about the rules and make sure they understand. [17:32] - For adolescents, share stories like Megan’s story. [19:20] - Who will your child feel comfortable coming to in a time of crisis? [20:15] - Be aware of behavior changes. [21:21] - Check in with teachers and school staff to see if behavior changes take place at school, too. [23:24] - Listen to your child and validate their feelings. [24:45] - There’s the concern of the other party knowing you’ve taken a screenshot. Tina advises getting another device and blocking them. [26:12] - Kids are smart and don’t want to see their parents upset so they pretend to be okay. [27:18] - If your child has expressed thoughts of self-harm, stay calm. [29:17] - When they’re young, parents tend to want to fix everything for them and protect them. [31:40] - Technology has made things easier for kids to create fake accounts. Schools can only do so much. [33:31] - Bullying and cyberbullying are so complex because there are no quick fixes. [35:30] - Learn social media platforms to see how kids are interacting on them. Tina shares several helpful links. [37:31] - Some parents feel like they need to hack into their child’s social media account, but Tina explains that all you are doing is panicking. [39:31] - As a parent, you will make mistakes. [40:57] - The Megan Meier Foundation has tons of resources and their support does not cost anything.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Megan Meier Foundation Megan Meier Foundation Facebook Megan Meier Foundation Instagram Tina Meier on LinkedIn
  • When buying from Amazon, you might think that all products come directly from the manufacturer to Amazon warehouses. But that is not always the case. Learn how to spot potential counterfeit products and protect yourself and your brand on Amazon.

    Today’s guest is David Cooper. David is the CEO and founder of IPSecure, which is an innovative new way to protect your intellectual property on Amazon, control your sales channel, and ensure every purchase of your product on Amazon is a positive and reputable shopping experience. He has spent 20 years building and deploying brand protection solutions for hundreds of global brands such as the NFL, J&J, Apple, and Rolex.

    Show Notes: [1:00] - David shares his background and information on his company IPSecure. [3:02] - eCommerce is huge, but is still only a fraction of the size of total retail. [4:42] - Solutions in this space are almost always legal. [6:35] - Finding counterfeiters has no impact but companies tend to measure how many are found. IPSecure measures everyone. [9:28] - You can’t quantify how much risk was avoided. [11:01] - When a counterfeiter is taken down, more pop up. [12:30] - Brand protection is something David advises to add for customers. [14:12] - There are some universal signs of counterfeit products, but there are also some signs that are specific to Amazon. [15:43] - Amazon has a specific algorithm that chooses who sees what products. Check the store’s profile. [17:32] - It is easy to be deceived on a marketplace site. David illustrates this with a Samsung camera purchase that was a parallel import. [19:42] - There is nothing wrong with buying and reselling something, but there is a gray market problem. [21:21] - These legal solutions are very expensive. [23:02] - Amazon is proactive in some areas, but generally speaking, they do not monitor products belonging to specific brands. [24:16] - For most brands, selling on Amazon is necessary. [25:19] - Even if a brand pulls out of Amazon, their products are likely still being sold on Amazon and that could be a liability. [28:49] - Instead of focusing on taking down other profiles and sellers, IPSecure focuses on building your own brand to be a successful one. [30:45] - While challenging, Amazon does more than any other company to help brands with this concern. [32:32] - People are much more aware of these concerns as Amazon has grown. [34:18] - Congress is taking a look at how Amazon runs, but there have been many distractions from these issues with the current world climate. [34:19] - It is very complex with a lot of moving parts. IPSecure integrates well with a lot of different platforms. [37:52] - Smaller businesses cannot afford to lose a sale to a counterfeiter and likely cannot hire a lawyer. [40:41] - David shares the story of a client whose business exploded after their product was on a reality show. Counterfeiters popped up very quickly. [43:33] - As a trademark owner, you are responsible for monitoring. [46:12] - Brand protection can actually increase revenue.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest IPSecure Website David Cooper on LinkedIn
  • The CDC states that since the Covid-19 pandemic began, one in every three children has been diagnosed with a mental health disorder such as anxiety or ADHD. It is more important than ever to learn how and to teach techniques to help reduce stress and anxiety.

    Today’s guest is Dr. Michele Borba. Dr. Borba is an internationally renowned educator and award-winning author of 24 books. She is a motivational speaker having spoken in 19 countries on 5 continents and has served as a consultant to hundreds of schools and corporations like Sesame Street, Harvard, The US Air Force Academy, and the Royal Crown Prince of Abu Dhabi. Dr. Borba is an NBC contributor who has been on countless shows including Today, Dateline, Dr. Oz, Anderson Cooper, CNN, and more. Her work is featured in Time, Washington Post, Newsweek, Boston Globe, US News and World Report, and many others.

    Show Notes: [1:30] - Dr. Borba started her career as a special education teacher and has learned how resilient kids truly are. [4:03] - We can’t point the finger at one specific cause. We need to focus on what to do about it. [5:07] - Dr. Borba describes a study done over the course of 40 years. [6:25] - What are the things we need to teach to help manage anxiety or prevent it? [8:35] - Connect with teachers. Kids act differently at school than they do at home. [9:33] - Teachers see trends in behaviors in their class. [10:16] - A major change in society is that getting mental health services is more acceptable. [11:23] - Give kids a range of ideas to help your children. [13:12] - When you suggest a hobby, it isn’t a sport or activity that you have to add to the agenda. It is something they choose to do. [14:37] - Hobbies, pets, music, etc. can be tools that work for some kids. [15:29] - Everyone has a different stress sign. [16:18] - Dr. Borba shares a breathing technique great for both kids and adults. [18:21] - By learning these strategies, kids can build muscle memory. [20:21] - Thrivers have the tools to pull from to deal with stress. [21:44] - Your voice and family mantra can become your child’s inner voice. [23:00] - Volunteering helps build hope and empathy. [25:03] - There are many ways to build empathy but be intentional. [26:34] - Teach emotional literacy. [27:50] - Many social skills are in dormant mode right now. [29:03] - Kids can also feed off the stress of their parents. [30:18] - Our society tends to focus on performance which can add levels of stress. [33:32] - Kids are becoming ruder and civility needs to be retaught. [36:10] - Empathy is a super power and is the glue that holds society together.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest MicheleBorba.com Books by Dr. Michele Borba Michele Borba on Instagram Dr. Michele Borba on LinkedIn
  • We are living in a world where AI can do many of the things people have been doing, thus creating an opportunity for us to create and do something new. Not understanding this transition can leave us unnecessarily exposed to risk. Today’s guest is Howard Getson. Howard is the President and CEO at Capitalogix. He runs an algorithm hedge fund and the data science company that powers it. Capitalogix created a revolutionary financial technology platform that uses adaptive AI to maximize performance with real time insights. His prior company, Intelligent Control which he founded in 1991, was an Inc. 500 company and won an IBM award for Best Business Application. Howard is currently on the advisory counsel over a bio ethics and research institute.

    Show Notes: [1:16] - Welcome to the show, Howard! He shares his background and what he does currently with Capitalogix. [3:00] - People are interested in things like AI and automation because they want to amplify intelligence. [4:26] - This technology gives entrepreneurs amazing opportunities to provide value. [5:20] - How did AOL change the technology landscape? People are good at knowing something is about to change. [6:40] - Think about 3 pieces of technology that already exist that you know are going to change the landscape in the next few years. [7:57] - It’s not a question about something being created but rather what implications it has. [9:43] - Even though we knew the internet would be big, we didn’t think about the consequences or the role they themselves would play. [11:05] - You don’t have to be the person to create the technology, but how can you find opportunities in the future? [12:14] - What happens when AI gets smarter than us? Howard says it already is. [14:04] - Howard shares a personal story that demonstrates how technology has gotten so good so fast that scams are moving quickly. [16:44] - As we get these technologies, it frees people up to do more. [18:40] - What impact do these technologies have on false information? [19:24] - Technology is going to learn how to lie as a strategy. [21:04] - Data is the biggest problem AI sees right now. [22:47] - You want AI to create new opportunities not to relieve you of things you do so you can do nothing. [23:46] - Howard doesn’t try to predict technology, but rather human behavior. [25:22] - It’s not about what it does, but rather what it makes possible. [27:20] - Current technology then becomes a prototype for something new. [28:35] - With AI, the result is exponential results. There are 3 key drivers to make that happen. [30:36] - Data science is about finding a profound truth hidden by noise. Discover is an important verb. [32:49] - Build, scale, and refine. [34:25] - Knowing something worked is different from knowing it is currently working. [36:33] - Text “AI” to 972-992-1100 for a presentation on the methodology. [37:50] - Howard believes that everyone will be able to leverage AI in the next 25 years. [39:18] - We live in a world that gets faster and better everyday.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Capitalogix Website Howard Getson on LinkedIn Howard Getson on Twitter
  • Too often people seek training after they’ve had an encounter or violent situation. Criminals look to exploit us for one thing that we all possess. Listen on to find out what that is. Today’s guest is Tim Larkin. Tim is the founder and creator of Target Focus Training and is well known for self-defense and close combat training. During the last 20 years, he has trained not only law enforcement, the US Navy Seals, Army Special Forces, and the US Border Patrol, but also corporate clientele from around the world. He is an author and a public speaker in over 40 countries. Show Notes: [0:52] - Tim describes his background and how he found himself passionate about combat and combat training. [2:43] - Initially, Tim’s goal was to become a Navy Seal. [3:39] - Tim’s eardrum was busted during a dive with the Navy Seals, and he lost control of his body. This injury changed his career trajectory. [6:02] - Because of his extensive training in hand-to-hand combat, Tim became involved in a different program. [7:50] - At the time of 9/11, Tim began working with civilians. [9:02] - You should always be proactive. [10:58] - Mentally, the injury was devastating for Tim. [13:29] - None of the experiences he has had would have happened if he had the traditional Seal career he planned on. [16:26] - Once someone experiences something challenging, they then become proactive to make it not happen again. [17:49] - The biggest threat is the smartphone. [19:18] - To demonstrate this danger, Tim shares the story of a bus robbery. You can watch the video here. [21:49] - Behavior with your phone becomes second nature. [23:04] - We spend our downtime on the smartphone, but Tim always keeps one ear out. [26:03] - There are tons of positives about smartphone technology, but in public, it can be used against you. [27:46] - Tim shows how to detect a possible predator with a personal anecdote. [30:41] - We can’t pick out predators. It is impossible to tell as they blend in. [32:15] - Tim interacts with everyone assuming they are violent to ensure safety. [33:26] - As a society, we can get away with a lot of different types of social interactions, but anything you do or say can trigger someone else. [35:33] - If you understand the predator's role, everything is backed up by the possibility of violence. [38:10] - Highly recommended is Robert Green’s book Law of Human Nature. [39:59] - Study human behavior and you’ll learn about others and yourself. [42:00] - When is it okay to use the tool of violence? When you are devoid of choice. [43:15] - Women tend to me more in tuned to non-verbal cues than men. [44:36] - The more you learn about human nature, you have these tools you can reference. [46:10] - Tim gives some examples of when violence is the answer. [48:29] - When your life's on the line, you need to have tools at the ready. [50:03] - There are parts of the body that you simply cannot protect. The goal is to take the brain out of the equation. [52:00] - For criminals, violence is their currency. [53:51] - Tim explains what cause state is. [56:12] - Your brain is incredible and if you give it permission, it will solve problems.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Tim Larkin on YouTube Tim Larkin’s Website Target Focus Training Tim Larkin on Instagram
  • Money is not the only reason somebody can be taken hostage. It’s important to know the other motives for how and why targets are selected. Today’s guest is Rachel Briggs. Rachel has spent the last two decades as a writer, analyst, and strategist working with corporations, governments, and international NGOs developing security. She was the first director of Hostage International and the founding executive director of Hostage US. Rachel co-chairs the European commission's group that is working on tackling online extremism. The report she wrote, “The Business of Resilience,” has become the blueprint for corporate security management. Show Notes: [1:03] - Rachel shares her background and how a personal experience of a family member being taken hostage impacted her future. [2:50] - One type of hostage situation is political hostage taking. [3:49] - Economical hostage cases are what happens most often. [4:30] - Hostage diplomacy is a third type that creates negotiation pressure. [5:19] - Latin America is more of a hotspot for kidnapping and Rachel points out Colombia and Mexico as predominant locations. [6:26] - Political kidnapping is most common in Middle Eastern and African countries. [7:24] - Common targets are those who are the ones who run towards danger such as journalists. [8:50] - Rachel describes another type of target that applied to her family member who was taken in the 90s. [11:27] - People on vacation being picked up as a hostage are not as common, but it isn’t unheard of. [13:01] - The experience of being held against your will is never a pleasant experience, but the way you are treated varies. [15:00] - Hostage takers operate as a business in some situations. [18:07] - The statistics of hostage taking are very underreported. [20:33] - These crimes prey on the desperation to get a person home. [22:21] - Stopping the payment of ransoms is not the answer to stopping kidnappings. [24:05] - There are many different ways to make an exchange of money for ransom. [25:33] - It is rare and dangerous, but sometimes a hostage escapes their situation or is rescued by military operations. [27:21] - There are resources that list dangerous locations. [28:45] - Insurance for kidnapping and hostage is available. [30:59] - After the events in Syria in 2014, groups have been created to provide this insurance to freelance journalists. [32:33] - Every situation is different, but Rachel describes the commonalities in how families cope. [35:37] - There are issues that families experience that we don’t think about being a problem. [37:42] - There are now strategies being implemented in large corporations. [39:18] - What is virtual kidnapping? [42:27] - The psychological impact can be long lasting and significant. [43:22] - While underreported, kidnapping and hostage taking are more common than we think. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest ClarityFactory Website Rachel Briggs on Twitter