Episódios

  • Fear can cause people to hoard. Blockchain would allow transparency that could alleviate those fears. Understanding the trivergance of AI, IoT, and Blockchain can transform your thinking even for those resistant to change.

    Today’s guest is Don Tapscott. Don is one of the world’s leading authorities on the impact of technology on business and society having authored 16 widely read books, including the global bestseller Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World, now translated into 20 different languages. He is currently Co-Founder & Executive Chairman of the Blockchain Research Institute, an Adjunct Professor at INSEAD, recently a two-term Chancellor of Trent University in Ontario and Member of The Order of Canada.

    Show Notes: [1:22] - Don shares his professional background, career, and work as an author. [2:55] - The Blockchain Research Institute researches how industries are affected by blockchain technology. [4:41] - Don and Chris think back to the earlier days of the internet. [7:02] - This new generation of technology represents a new paradigm. [8:04] - What is happening in Congress at the moment that could change everything about the industry? [11:35] - New paradigms create a crisis in leadership. Don’s life work has been to find leaders who embrace the shift. [13:12] - We view this current time as the second era of the internet. What is different from the previous era? [14:23] - We are moving from an internet of information to an internet of value. [15:21] - People hoard out of fear and this impacts supply chains. [17:09] - Blockchain can be a solution for health records. Many people consider it a problem due to lack of understanding. [18:25] - Blockchain gives people the control to manage their transparency. [20:29] - It takes time for us as a society to figure things out. What is the future of blockchain? [22:19] - Don is speaking at an event about the vision of how industries will be changed by blockchain. [24:43] - Don references years past when CEOs didn’t type because that was a secretary’s job. It took time to change and it will take time to make these changes as well. [26:06] - There are industries that will be very resistant to change. [26:51] - On the Blockchain Research Institute’s website, there are reports on various industries.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Don Tapscott Web Page Men In Suits Music Web Page Blockchain Research Institute Web Page Don Tapscott on Facebook Don Tapscott on Twitter Don Tapscott on Instagram Don Tapschott on LinkedIn Books by Don Tapscott
  • At some point in our life we will encounter a cyber intrusion, either through somewhere we have done business or because we are targeted as an individual. It is important to know how to prevent identity theft as well as how to respond if you’ve already been compromised.

    Today’s guest is Adam Levin. As a graduate of Stanford University and the University of Michigan School of Law, Adam Levin is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance. He is an author and the former director of the New Jersey Division of Consumer Affairs. Levin is the chairman and founder of Cyber Scout and co-founded Credit.com. He has been featured in the New York TImes, Associated Press, Wall Street Journal, The Los Angeles Times, USA Today, and The Chicago Tribune. In addition to that, he has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC, MSN, and many others.

    Show Notes: [1:14] - Adam shares his background and education in law and politics. [2:29] - In 2003, Adam created an Identity Theft company that later became a global business called Cyber Scout. [4:49] - Adam believes that security breaches are a certainty of life these days. [6:35] - While hacking has been around for a long time, Adam shares how he got into the business of identity theft protection. [8:36] - Over time, insurance companies have come to be support in identity theft. [10:01] - Chris shares a scenario of a friend that had their identity stolen. [12:23] - Many victims feel like they were in the wrong when in reality they may not have done anything wrong at all. [13:56] - In recent years, the IRS has been a lot more proactive. [16:02] - What is Adam’s definition of identity theft? [19:01] - Adam explains why you should be vetting your vendor as well. [21:13] - There are four kinds of threat actors - state sponsored, for-profit, cause-related, and “because I can.” [23:29] - Social engineering is the most successful method of identity theft. [25:42] - Adam wrote the book Swiped and explains that there needs to be a new framework around mitigating the threat of identity theft. [26:32] - How do we minimize your risk of exposure? This is very difficult. [27:46] - Two factor authorization is extremely helpful in protection. [28:41] - Always verify that the person you’re speaking to is who you think they are. [30:12] - How can you monitor everything on your accounts and reports? [31:37] - One of the ways credit card numbers are sold on the dark web is by zip code which causes many banks to miss fraudulent use. [32:51] - The third “M” is to manage the damage. What can you do after an incident? [34:05] - Identity theft protection programs are relatively inexpensive. [37:01] - You can set the threshold for when you are notified. But you should choose to be notified of any purchase, even the really small ones. [38:50] - How do banks know when there’s a fraudulent charge? [40:38] - There are features where you can lock the use of your card before having to change account numbers. [42:33] - The best protector of your portfolios, including your identity, is you the consumer. [44:37] - Adam describes his new podcast called What the Hack. [50:23] - Remember that many people are not who they claim to be.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Adam Levin Web Page What the Hack Podcast with Adam Levin Adam Levin on Twitter Cyber Scout Web Page Cyber Scout on Twitter
  • Estão a faltar episódios?

    Clique aqui para atualizar o feed.

  • We can sabotage ourselves by the way we prioritize our day by not differentiating between the urgency of emails and getting distracted or manipulated by the media. Today’s guest is David Kadavy. David is the author of the books Mind Management, Not Time Management, The Heart to Start, Design for Hackers, and multiple short reads. David is a self-published coach and the host of the podcast Love Your Work. David has spoken in multiple countries and has been featured in The Overserver, The Huffington Post, Upworthy, and Life Hacker.

    Show Notes: [1:02] - Welcome to the show, David! David explains what he does in the writing field. [2:50] - Chris admits he is a master procrastinator and tends to spend his time doing tasks that are not as important as others. [3:45] - David explains how he divides things up by mental state. [5:57] - A way to avoid emails that don’t need attention right away, David uses a program called Boomerang. [7:38] - David demonstrates how open loops apply to click-bait. [8:56] - The looming possibility of urgent emails can waste energy. [10:10] - David keeps his phone on do not disturb and uses the favorites feature. [12:22] - The news and media can be a huge distraction. [13:10] - If the media captures your attention, it is not a mistake. We are attracted to negativity. [15:47] - You don’t need to know everything that is going on every single moment of every single day. But it is hard not to get sucked in. [18:10] - The immediate availability to communication creates urgency that hijacks your attention. [19:30] - The first person that should get your attention is yourself. [21:00] - As you start prioritizing different things, people may stop demanding your attention immediately. [22:23] - David lives in Columbia and the cultural values are much different there than in the United States. [25:19] - People in different countries may look at time differently as well. [28:33] - People also tend to change how they think about time. [30:03] - If there is a specific set of steps to complete a task, AI can do it. But human creativity is missing. [32:27] - David describes a typical writing day for him and how he manages his mind. [35:01] - David explains the science behind why morning grogginess is actually a prime state to be in for creativity. [38:29] - While resting, free association gets a chance to manifest. [41:15] - Arguing viewpoints on social media has become a priority for a lot of people. [44:50] - There’s so much fighting for our attention. [45:55] - David shares the titles and brief description of his books linked below. [48:01] - kdv.co is shared as an opportunity to download a free writing toolkit.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest David Kadavy Web Page David Kadavy on Twitter 100-Word Writing Habit Books by Author David Kadavy Love Your Work Podcast David Kadavy’s Writing Tools
  • Gifted pick-pocketers can use social engineering skills to choose their victims. Many times as we travel, we may not realize that our body language makes us an easy target.

    Today’s guest is Chris Kirsch. Chris is the CRO and co-founder of Rumble. With a background in product marketing and technical mindset, he has helped formulate go-to marketing strategies at PGP, Rapid7, and Veracode. In 2017, he earned the black badge for winning the social engineering capture the flag competition at DEFCON. He has a passion for InfoSec, OSINT, and is a volunteer advisor for the National Child Protection Task Force.

    Show Notes: [1:05] - Welcome Chris! Chris shares his background. [2:20] - Chris co-founded Rumble, an asset discovery company to help clients secure their network. [3:48] - Pick-pocketers are masters of misdirection. [6:34] - Chris explains why he got into the social engineering side of DEFCON. [8:18] - When in Paris, Chris’s father was pick-pocketed which prompted him to start researching. [11:18] - After meeting a magician at a convention, Chris then became interested in open-source intelligence (OSINT). [11:51] - Chris defines the difference between the two schools of thought on pick-pocketing. [13:29] - Some pick-pocketers can steal without interacting with people while others utilize social interactions. [15:31] - Chris shares in more detail the story of his father being pick-pocketed. [17:38] - This experience showed Chris and his family a way that teams of people can work together to fool a target. [20:03] - There are some unusual laws that limit consequences for theft. [21:50] - Chris shares tips on where to place your wallet when traveling and demonstrates a scenario. [25:18] - Escalators are areas where pick-pocketing teams can be very successful. [28:17] - Placing your hand in your pocket to intentionally keep your belongings safe might actually make you a target. [30:31] - When something else is on your mind, you are an easy target. It is hard to always be aware. [33:19] - Chris uses an example of a phishing scam that demonstrates social engineers move you from rational thinking to emotional. [36:20] - Many people take these scams personally when in reality, scammers have no idea who you are. [38:27] - Chris references a documentary from the point of view of a social engineering target. [40:51] - Darren Brown on YouTube and Netflix has several videos and shows that demonstrate the psychology of many scams and manipulation. [43:59] - The sample you are seeing is what the person wants you to see. [45:12] - Chris gives actionable steps to take when feeling suspicious. [47:09] - Chris describes a time when he was able to use social engineering strategies that would have been shot down if the target had done something simple. [49:21] - For the “long con” scammers, Chris has advice about trust. [51:42] - Search for Kirsch Identity Fraud and you find free resources on identity theft.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chris Kirsch on LinkedIn Chris Kirsch on Twitter Rumble Network Discovery Web Page Rumble Discovery on Twitter
  • You cannot separate community and school safety from each other. They simply go hand in hand. We’ve seen adults displaying lack of impulse control on airplanes and as kids go back to school, we cannot underestimate the challenges that may arise. It’s important to be prepared to know how to respond.

    Today’s guest is Jason Stoddard. Jason is the Director of School Safety and Security for the Charles County Public Schools. He is responsible for sustaining a safe learning and work environment for over 27,000 students and nearly 4,000 staff members. He is a retired police commander with over 24 years in law enforcement.

    Show Notes: [0:51] - Jason describes his job and what he is responsible for. [1:40] - Because of everyone’s experience in school, everyone has their own opinion of what things should be like even though things have changed. [3:00] - In recent years, ransomware and hacking has been a threat to schools. [4:41] - School issues have not been seen as what they really are: community issues. [5:50] - Jason shares ways he builds relationships within the community for school safety. [7:10] - Handle With Care is a program that is implemented in Jason’s county. [8:52] - Instead of asking what’s wrong, ask the kid what has happened. [11:14] - We can never over communicate what is going on. Honest conversations are necessary. [12:53] - What could be the ramifications of early experiences with the criminal justice system? [14:40] - When the police arrest a child that could affect their safety, Jason shares that in his county, they are required to report it to him and his team. [16:01] - Jason’s county is also committed to working with law enforcement regarding gangs. [18:24] - There are some services that provide social media monitoring but there are some problems with using this. [20:48] - Kids need to feel comfortable bringing information forward. [21:17] - Jason believes that this school year is set up for tragedy. [23:22] - Any school system is built on layers. It can never be just one plan. [24:58] - How do we get kids to the services they need to help them with impulse control? [26:08] - School safety programs cannot force kids into mediation programs. [28:10] - When students are suspended, they are missing out on their education and sometimes can’t get caught up. This creates a cycle for more misbehavior. [31:15] - School systems see all the same problems everyone else sees but with the added kid component. [33:19] - Malware and ransomware are huge problems right now with the increase in virtual learning. [35:54] - Valuable information can be sold on the dark web. [37:27] - Swatting is where someone will call into 911 to get law enforcement to respond. [40:11] - Sometimes kids also hack to change their grades but are usually easily fixed. [41:00] - Teachers will also sometimes write their passwords on a post-it for students to see. [42:01] - Covid-19 continues to be incredibly challenging. [44:57] - Stay connected with what is going on locally, nationally, and from the CDC. [45:56] - The fact that this situation has been so polarizing has made policy very difficult to enforce. [49:53] - Jason explains some of the issues that arose through virtual learning last year. [50:55] - There are so many layers to security and a positive school climate is the key.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jason Stoddard on LinkedIn Charles County Public Schools Safety and Security Web Page
  • When seconds count and freezing isn’t an option and lives are at stake, how do you prepare to know what to do? Even our bodies have natural reactions. But what can you do to stay calm, level your breathing, and be alert?

    Today’s guest is Robert Montgomery. Robert was an operations officer in the CIA for 34 years and served in some of the most dangerous places in the world. He is also a former Marine and the founder of Guardwell Defense. Robert is an author and teaches training courses such as Combat for Women, Improvised Weapons, and Street Smarts for Students and Businesspeople designed to help anyone mitigate and deal with unexpected violence.

    Show Notes: [0:53] - Robert shares his background, experience, and how he shifted into training civilians for personal defense. [3:46] - Using security cameras that he can access on his phone, Robert shares the story of seeing people on his property while he was in Afghanistan. [7:29] - Through this experience, Robert realized why his wife was able to stay calm in the moment. [10:13] - Referencing Chris’s website and podcast, Robert explains the common scams that he has seen come up. [11:26] - “If you find yourself in a fair fight, you didn’t plan properly.” [12:27] - There is a correlation between your heart rate and ability to control fine motor skills. [14:12] - Controlling your breathing is the key to lowering your heart rate. [16:37] - Practicing breathing in non-stressful situations can help you in the moment. [18:18] - Chris shares a story that connects to the discussion on adrenaline and fear. [19:51] - You cannot be alert all the time. Being hyper alert can lead to PTSD and often does in members of the military. [23:23] - With situational awareness, you have to stay level headed and make decisions quickly. [24:51] - It is okay to “be rude” if you feel uncomfortable. [27:10] - There are many signals you may notice if approached by a predator. [28:13] - A common situation many people find themselves in is walking or jogging outside with headphones on. This affects their awareness. [31:46] - Situational awareness will mitigate many problems. [32:47] - Robert gives some tips on what to do when beginning to travel again, especially overseas. [35:21] - Maintaining a lower profile to lessen your chances to be targeted for crimes as a tourist can be challenging, but Robert gives advice. [36:28] - Edson Tiger offers an excellent online course for training for travel. [38:27] - Paper copies of things are important in case things are lost. [39:54] - Every citizen should learn the basics of first aid.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Seconds to Live or Die: Life-Saving Lessons from a Former CIA Officer by Robert Montgomery Guard Well Defense Home Page Edson Tiger Training for Travel Course
  • There are many ways your network can be accessed, not just remotely but physically. How equipped are you and your coworkers to prevent intrusions? Today’s guest is Jayson E. Street.

    Jayson is the author of Dissecting the Hack: The F0rb1dd3n Network Series. He is the DEFCON Groups Global Ambassador and the VP of InfoSec for SphereNY. He has also spoken at DEFCON, DerbyCon, GRRCon, and at several other cons and colleges on a variety of Information Security topics. Jayson was also featured in The National Geographic series Breakthrough Cyber Terror.

    Show Notes: [1:00] - Jayson explains how he hacks to help. [1:59] - People want to see how Jayson can get into their facility and rob them. [3:39] - Jayson shares how “being the bad guy” can get the information needed to educate users and clients on preventing more. [4:51] - Jayson has been known to rob banks and shares the story about how he robbed the wrong bank because he had to go to the bathroom. [7:24] - The devices Jayson uses emulate keyboards and code. [9:03] - Some employees for big companies like Microsoft have posted their badge on social media from which Jayson prints and uses as his own. [10:08] - How did Jayson get caught in robbing the wrong bank? [13:21] - He found out later that the bank he robbed by mistake wound up wiping their machines which cost them a lot of money even though Jayson’s procedure was harmless. [16:01] - Jayson has a 100% success rate which shows how employees trust anyone who looks official. [17:13] - What is the yellow method and why does Jayson use it? [18:18] - Jayson describes the facility that took the longest amount of time to get into in Jamaica. [20:17] - In one instance, Jayson did not go back to talk to the client after conducting the pen test for a charity. [22:30] - When these tests happen, it isn’t about winning and losing. Jayson makes sure he is caught so he can provide education and training. [25:08] - “The biggest thing that people can do to protect themselves is to listen to the voice in the back of your head saying that something is odd or unusual. Realize when you’re at work, part of your job and responsibility is to think that something bad may happen.” [26:25] - Companies need to give a proper avenue for employees to feel comfortable in reporting something strange. [28:39] - Jayson shares some of the techniques he uses that have a 100% success rate in penetrating the company’s network. [30:06] - At events, oftentimes there are company USB drives loaded with giveaway items. These could be dangerous to use. [31:39] - There is no way to completely eliminate threats. The important piece is how you respond to a threat. [33:10] - Network security is great, but physical security of a network is just as important. [35:01] - Jayson explains that the users of the programs in a network are the people that need to have the proper education. [37:45] - Jayson has a program where he gamifies security education. [39:50] - Many people don’t realize how easy it is for an official looking badge to be recreated. [41:41] - Jayson describes his most boring and simple robbery he completed in 15 seconds. [42:29] - What was Jayson’s most successful interaction? [43:51] - After obliterating a company one year, management took the lessons to heart, educated their team, and had him come back the next year. [46:19] - If pen testers are not rooting for the client, they are in the wrong business.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jayson E. Street Home Page Jayson E. Street on Darknet Diaries Podcast Jayson E. Street on Twitter Jayson E. Street on LinkedIn Dissecting the Hack: The F0rb1dd3n Network by Jayson E. Street
  • Children go missing, exploited, and trafficked everyday. It takes investigators, prosecutors, and private sector technology specialists to help them. Misinformation and TV portrayals can impact our resources that are directed to help.

    Today’s guest is Kevin Metcalf. Kevin is a former federal agent turned prosecutor and the founder of The National Child Protection Task Force which brings together recognized experts in the field such as strategic legal applications, open source intelligence, cellular mapping analysis, dark web investigations, and cryptocurrency to help law enforcement agencies everywhere. He has undergone training provided by the National Computer Forensics Institute, the National White Collar Crime Center, and the FBI Cellular Analysis Survey Team, among others. Kevin developed a system for working with cell phone related data in criminal cases that developed into a mobile device foundational course that focuses on the integration of legally-derived information with open source information. Kevin has also published a series of instructional books available on Amazon.

    Show Notes: [1:26] - Kevin shares his background and how starting the National Child Protection Task Force was not something he initially thought he’d do. [2:20] - As a single parent, Kevin left his job in law enforcement, went back to school, and became a prosecutor. [3:58] - As he was led into working in social media and cell phones, Kevin realized how often he was working on cases that had to do with children. [5:11] - Kevin describes the case that got him national attention and how it led to him working with experts that wanted to come together to help more kids. [7:01] - Chris notes the gap between law enforcement and the technology that is available. Kevin is trying to bridge that gap. [8:00] - How does Kevin deal with the “CSI Effect”? [9:57] - There is a lot of misinformation regarding human trafficking. [10:52] - It is very challenging to convict someone for human trafficking due to little information and the victim not being forthcoming with details out of fear. [12:19] - Most of the time they are able to convict for something else, like drugs or gun charges, which does at least get the person in jail without putting the victim through testifying again. [13:34] - There are a lot of psychological factors involved for victims even years afterwards. [14:55] - Kevin’s organization works with missing, exploited, and trafficked children. He explains the difference between exploitation and trafficking. [16:49] - Children who are missing and runaways are at higher risk of being exploited and trafficked. [17:51] - There is a huge problem with missing children investigation or lack thereof. Predators are aware of this and take advantage. [21:21] - There are so many problems with statistics that Kevin doesn’t know what questions to ask. [23:18] - Kevin feels that there are two categories for children, missing or not. [24:04] - Kevin lists some of the things that put children at risk, including parents trying to control everything. [27:35] - During the grooming process, predators are looking for the weaknesses in a parent-child relationship. Mental health issues also add another level of vulnerability. [31:10] - The NCPTF is composed of active duty law enforcement. Kevin explains following the rules of the jurisdiction they’re working in. [32:51] - Although there are some controversial tools used to investigate these cases, Kevin describes how to prevent breaches in privacy. [35:04] - “You have to understand the limitations of technology. If you don’t, you’re going to misuse it, screw up an investigation, and arrest the wrong person.” [36:19] - Kevin explains the algorithms used for facial recognition, especially using the face of a child. [38:43] - An investigator needs to follow up on every hit used with facial recognition. [39:59] - Kevin describes how the NCPTF hones their technology skills. [41:38] - Predators are using information willingly posted on social media to harm others. [42:51] - It is difficult to make politicians and policy makers understand how bad the situation is and what is needed to prosecute a predator. [45:00] - Newer privacy laws make it difficult to use technology to identify a human trafficker. [46:51] - Using these technological resources for minor infractions is a waste of time and money. They should be used for the major things. [49:27] - It is important to not tip predators off with what they are using to identify them. Sometimes photos and videos will allow investigators to determine their location. [51:14] - A lot of people don’t realize how easy it is to find their information.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Erica Stanford on LinkedIn National Child Protection Task Force Kevin Metcalf NCPTF Twitter NCPTF Twitter NCPTF Facebook
  • Transferring money through a third party can add substantial fees and using cryptocurrency bypasses those. However, does the emerging technology invite additional risks?

    Today’s guest is Erica Stanford. Erica is founder of the Crypto Curry Club, UK’s number one rated networking educational event for blockchain, digital currency, crypto payments AI, and tech for sustainability. She is the author of Crypto Wars: Faked Deaths, Missing Billions, and Industry Disruption. Erica is a public speaker, crypto currier, and conducts blockchain industry reviews.

    Show Notes: [1:02] - Erica shares what began her interest in cryptocurrency. [2:11] - After being mugged while overseas, Erica explains how she could only access money from a Western Union with high fees. [4:25] - This experience opened Erica’s eyes to how many people in the world live without access to money and she learned about cryptocurrency. [5:06] - The Crypto Curry Club started off as a way for Erica to meet other people in the industry through events. [7:17] - Cryptocurrency is digital currency; money that is secured by encryption and blockchain. [9:05] - Prior to crypto, going through a third party was the only way to make a digital exchange. Erica explains what could happen if the third party disappears. [10:50] - Erica explains how blockchain works. [11:56] - The best part of transferring money through cryptocurrency, it is usually free of charge with absolutely no fee. [12:59] - Some businesses would have a minimum transaction amount due to the price they pay in fees. Crypto bypasses that. [14:40] - It is digital money and very volatile. People have started taking advantage of this. [16:02] - There’s a lot of hype around cryptocurrency which means it can also get a lot of scammers creating their own currency. [18:22] - Even in cases where the cryptocurrency business is terrible, they still brought in millions of dollars because of the hype. [20:17] - There have been scams where celebrities have been hacked or a fake profile has been created stating to send them money and they’ll double it for you. [21:05] - Erica describes recent Ponzi Schemes, networking marketing, and multi-level marketing using cryptocurrency. [22:22] - Cryptocurrency is created through a process called mining. [24:31] - In a recent Ponzi Scheme, good people invested everything they had and lost it. Some people knew it was happening but many were victims. [26:09] - A cryptocurrency business recently shut down. Erica discusses red flags. [27:51] - Erica explains “staking.” [28:46] - Some red flags are claims of working with huge companies as customers and partnerships. Scammers can be very brazen. [30:00] - If you see one single thing that is fake or dishonest, you have to assume that there are more things that are untrue. [30:40] - Erica explains why she decided to write the book Crypto Wars. [31:53] - A huge scam that is still shockingly going on inspired Erica to get more information and start her research. [34:23] - That one event and the fact that Erica already had an audience and community, she was asked to write the book. [35:14] - Erica shares a discount code for the book when it is released this month. [36:11] - There have even been faked deaths and Erica tells the story of the scammer behind Quadriga. [38:40] - Some of these shocking stories are really happening and possible with cryptocurrency. [40:16] - There could be ways to track everything, but if someone has been planning a scam, Erica explains how they can get around that.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Erica Stanford on LinkedIn Crypto Wars: Faked Deaths, Missing Billions, and Industry Disruption by Erica Stanford Crypto Curry Club Home Page Crypto Curry Club on Facebook Crypto Curry Club on Instagram Crypto Curry Club on Twitter
  • Many people have gone or plan to go somewhere to seek deeper connection and enlightenment. But what are the dangers to be conscious of before taking such a trip? Today’s guest is Caroline Slaughter. Caroline is a filmmaker and global voiceover talent. Most recently, she was supervising producer on Racket: Inside the Gold Club which is ranked as one of 2020’s top true crime podcasts. Caroline’s multifaceted experience in the entertainment industry has prepared her for the role of curating auditory stories to provoke, impact, and entertain. She is the host of the popular Astray Podcast where she investigates those who pay the ultimate cost in search for spiritual awakening.

    Show Notes: [1:00] - Caroline shares how and why she started her Astray podcast. [2:41] - There’s an idea that this happens in India, but Caroline points out that people seek out enlightenment all over the world. [4:00] - During a difficult time, Caroline chose to go to Bali. She was prepared but a lot of people don’t go in with a plan. [6:18] - There seems to be a draw to Asian countries for this and Caroline suggests some reasons why. [7:19] - Caroline briefly tells the story of a guest on Astray Podcast who had a breakdown while on his journey and would have disappeared without his parents. [8:50] - The biggest problem is that many people who fall victim to scams and traps are looking outside themselves for answers. [10:22] - Caroline did some research on some of the reasons that could have caused psychotic breakdowns through drugs. [11:31] - Some who experience a psychotic break while on this quest for enlightenment, feel that it was meant to happen for their experience. [12:50] - People want a fast track to spirituality and it can be addictive. [14:40] - Mental illness plays a role in the need for a fast track to spirituality. [15:37] - Caroline defines and explains India Syndrome. [17:02] - Caroline tells the story of The Beatles seeking enlightenment and a theory surrounding John Lennon never leaving the place of trauma. [18:44] - India Syndrome can put you in a very fragile state if you don’t go prepared. [19:52] - We tend to let our guard down because of the authority the spiritual guides hold over us. [21:32] - You have to trust your inner guidance especially when you look outside yourself for guidance. [22:40] - It is tricky to vet the guides in other countries. It is easier to do in the United States; to find others who have worked with them. [23:55] - This industry is massive and brings in billions of dollars a year. [24:32] - Caroline explains why she thinks the industry needs to be regulated. [25:44] - Going with a buddy is key and bouncing ideas and plans off of friends is important to keep up the voice of reason. [27:42] - Don’t make major decisions when experiencing grief or trauma. [29:01] - We give away our own power when we hit rock bottom. [30:45] - There are tragic stories that Caroline shares through Astray of people who have vanished or been killed. [32:17] - The problem is not India Syndrome, it is “Seeker Syndrome.” [33:26] - What do you sacrifice for the risks you take? [35:18] - When seeing those traveling in a new country, there are those who will prey on someone new and unfamiliar.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Caroline Slaughter Home Page Astray Podcast Caroline Slaughter on Instagram
  • Education can help people to be prepared without paranoia, but how do you teach safety without causing fear? There are specific things to be aware of in an extraordinary situation like an active shooter that can fundamentally change the outcome.

    Today’s guest is Dr. Kathleen Kiernan. Dr. Kiernan is the founder and CEO of Kiernan Group Holdings, Chair of Emeritus and the Intelligence and National Security Alliance, and an adjunct faculty member of the Center for Homeland Defense and Security at the Naval Postgraduate School. As a 29-year veteran of Federal Law Enforcement, Dr. Kiernan serves as a subject matter expert in strategic thinking, strategy development, and facilitating critical incident management exercises for senior leaders across government and private sector organizations. She is the founder of Preparedness Without Paranoia which provides an opportunity to use a lifetime of service and earned experience at the extremes of human behavior to help others invest in their own security and preparedness. When they teach skills early, they can last a lifetime and can literally save lives.

    Show Notes: [1:21] - Dr. Kiernan has spent her entire life in or supporting law enforcement. Her experience has given her understanding of human behavior. [3:04] - Dr. Kiernan recommends the book called The Safety Trap by Spencer Coursen and shares a story from it to illustrate how children are not prepared by their parents. [4:39] - There’s not one single event that interested Dr. Kiernan about preparedness, but rather her multitude of experiences in law enforcement. [7:03] - Regarding an active shooter situation, there is a series of actions to take. [8:18] - Preparedness Without Paranoia educates children on these actions they can take in a way that is developmentally appropriate. [9:18] - Civics is not a class taught anymore. Preparedness Without Paranoia uses current and recent events to educate. [10:33] - The program is written by parents and educators for parents and educators of primary school aged children. [11:58] - Dr. Kiernan’s program teaches a preparedness mindset that applies to many different types of events. [13:01] - You are responsible for your own security. [14:20] - Communication is the first major teaching point for children in Preparedness Without Paranoia. [15:41] - Although active shooters are statistically rare but devastating, there are more common events in domestic violence and abuse that children learn to communicate about. [17:19] - To build trust with kids is to be part of their adventure. What are they into? [19:32] - Dr. Kiernan and Chris discuss preparedness kits and checklists and getting kids involved. [22:10] - Have the discussions of why each item goes into the preparedness kit and introduce the idea of going to a shelter in times of natural disasters. [24:06] - Dr. Kiernan shares a realization she made that preparedness can be simple. [27:30] - One of the most common and vexing to teach about is human and sex trafficking. [28:54] - Using the example of an Olympic athlete who spoke up about sexual abuse as a child. Communication is key. [30:27] - Some of the educational resources on Preparedness Without Paranoia’s website surround good decision making and thanking community heroes. [31:20] - Preparedness Without Paranoia runs on donations. All donations go directly to resource production. You can contribute HERE. [32:22] - In addition to donations, Preparedness Without Paranoia is in need of authors and illustrators. [33:18] - All resources are free and available on the website.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Preparedness Without Paranoia Home Page Kiernan Group Holdings Home Page Kiernan Group Holdings on Facebook Preparedness Without Paranoia on Instagram Kathleen Kiernan on LinkedIn
  • We often make the assumption that if something is the biggest or the oldest, it should be trusted or it wouldn’t have grown so large. But when it comes to cryptocurrency, this may not always be true.

    Today’s guest is Aaron Lammer. Aaron is the founder of Treats Media which produces original podcasts and work for clients. Original works include the critically-acclaimed mini-series Exit Scams and multiple seasons of Stoner and CoinTalk. Aaron is also the co-founder of Longform.com and host of the Longform Podcast.

    Show Notes: [1:16] - If you’ve heard about a large amount of cryptocurrency being lost, you have heard about hacking. But Aaron shares how it could be a false narrative. [2:56] - There’s not as much risk when internally stealing cryptocurrency. [4:04] - Aaron tells the story of Quadriga and its founder, Gerald Cotton. [5:03] - The estimated amount of cryptocurrency lost in 2018 was $250 million. But that money scales up over time. [6:21] - The people who were brought in to help with this case found a lot of things using the only clues they had: financial records. [7:36] - People who knew Gerald Cotton were convinced by him. Bitcoin also appeared more trustworthy than newer companies. [8:39] - Why do people trust the company that has been around the longest? [9:40] - Aaron explains how Cotton simulated fake volume. [11:05] - There is a lot of discrepancy on Cotton’s death, but regardless, Aaron explains how his fraud and Ponzi Scheme played out. [12:58] - When the exchange started to crash, Cotton likely feared being found out. [14:20] - For a long time, there was a lot of smoke and mirrors surrounding where the actual money was. [15:30] - There is an unaccounted for amount of money missing from the money taken by Cotton which has created doubt that he is deceased. [17:02] - Chris and Aaron discuss common themes in Ponzi Schemes. [19:24] - Just in the last week since recording this episode, there have been huge drops in cryptocurrency exchange. Aaron believes two of them are exit scams. [20:37] - Aaron shares a recent report about Afri-crypt and how he is suspicious of the figures. [22:19] - Often in Ponzi Schemes, there are inflated daily or monthly returns. [25:32] - The common theme is “otherworldly returns” that leads people down the path of falling victim to an exit scam. [26:47] - What is a safe way to invest in cryptocurrency exchange? [28:02] - There is a difference between “guaranteed” returns and returns over time. [30:20] - There is an issue with panic in cryptocurrency exchange. [31:58] - Aaron recommends going with larger companies regarding cryptocurrency and lists some red flags to look for. [33:27] - Any setting where it is obviously easy for someone to run away with tons of money is problematic. [34:39] - If you have a lot of investment in crypto, tell your partner and family how to access it in a will. [36:10] - Be careful and don’t put all your eggs in one basket. If something happens to one wallet, it isn’t catastrophic. [36:57] - Cryptocurrency is not necessary to invest in. It is risky.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Longform Podcast CoinTalk Podcast Exit Scam Podcast Exit Scam on Twitter Aaron Lammer on Twitter Aaron Lammer on LinkedIn
  • What does it look like to be resilient? Many of us have lost our edge after a year in our homes and many have become unprepared to handle the unexpected. Listen on to find out about five pillars of resilience from our guest’s book Raise Your Resiliency.

    Today’s guest is Kris Coleman. Kris has served with the CIA conducting threat and vulnerability assessments and for the FBI as a special agent. He is also an author and the founder and CEO of Red Five Security, which provides state of the art security and protective intelligence services.

    What are you prepared for and what can you do to be more resilient in any scenario?

    Show Notes: [0:54] - Kris shares his background and the many paths he has taken on his career which includes everything from minor security to protecting against terrorists. [2:44] - When Kris was hired by a private family to redo their entire security platform, he realized what Red Five should be. [4:31] - There are some misconceptions regarding what Kris does with Red Five Security. [6:24] - Some affluent families that Kris works with are very public facing and some never leave the house. Kris explains the spectrum his clients are on. [8:10] - “The more you can stay off the radar, the better off you’re going to be.” [9:18] - Kris takes a look at a client’s digital footprint and looks at some things that can be done to help keep below the radar. [10:01] - Kris shares common sense tips for security. For high profile clients, this can get tricky. [11:37] - Under stress, fine motor skills are hard to execute. [12:44] - Chris shares an experience about being in a different country and they did not have ambulances. [13:56] - Even when clients travel to another state within the US, it is crucial for Kris’s team to know the environment they’re headed to. [15:38] - Even the best neighborhoods can easily turn into a dangerous place. [16:37] - Chris illustrates this with a news story of a private party being misunderstood as a huge organized event. Even something seemingly harmless can turn. [17:58] - Kris shares a story about an extremely successful businessman feeling completely helpless. [19:26] - We need individual resiliency on a national scale. This need created Resiliency for Executives and Leaders (REAL). [20:41] - Once Kris has worked with executives and leaders, they have a whole new sense of confidence. [21:56] - REAL isn’t just for the wealthy. This program teaches people skills needed to be prepared for anything, especially natural disasters and storms. [24:11] - For business owners, is your business ready for anything? Kris shares that his company had a plan for a pandemic prior to Covid-19. [25:00] - Kris is the author of Raise Your Resiliency. He planned on writing a book about security, but Covid changed his direction. [25:56] - The three units that need to survive and thrive are the individual, the family, and the business. [26:31] - The Five Pillars of Resilience are: awareness, mindset, fitness, skills, and relationship. [27:54] - Regarding mindset, when it comes to resilience, you need to have a positive, growth, and survival mindset. [28:53] - Kris gives examples of a catastrophic mindset that many people had during the pandemic. Mindset and awareness are a choice. [29:24] - Fitness applies to physical, mental, and emotional strength in the three units (individual, family, and business). [30:14] - Kris lists many skills that a lot of people are not ready for, specifically now after a year of being stuck at home. [31:13] - The fifth pillar is relationships. This applies to your neighbors and community and not just your immediate family. [34:37] - In a lot of cases, things can be problematic for people in just a couple of hours due to lack of planning and preparedness. [37:40] - Things may sometimes feel redundant when preparing for anything. [38:33] - Your geographical location makes a difference in the type of things you need to prepare for. Take a risk assessment of your environment. [40:23] - Make the situation work for you when preparing for different events. Look at the likelihood of things to prepare for. [41:25] - Kris shares how the risk of civil unrest is higher in certain parts of the country over others. [43:03] - Prepare for an emergency and if something doesn’t happen, practice using it and restock it. Cycle the emergency food and supplies every few months.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Raise Your Resiliency: You, Your Family, and Your Business Can Achieve Resiliency in an Uncertain World by Kris Coleman Red Five Security Home Page Kris Coleman Red Five Security on LinkedIn
  • If you’ve ever had the feeling that someone is eavesdropping on your calls, reading your messages or emails, and even knows where you’ve been going, you just might be right. Abusers often utilize stalkerware to control and manipulate their targets. Being educated on what it is, how it got there, how to clean it off your devices, and where to go for help can make a world of difference.

    Today’s guest is Eva Galperin. Eva is the Director of Cybersecurity at The Electronic Frontier Foundation. She has worked in security and IT in Silicon Valley and earned degrees in Political Science and International Relations. She has applied the combination of her poli-sci and technical backgrounds to everything including organizing EFF’s TOR relay challenge to writing privacy and security training manuals. Those include Surveillance Self-Defense and The Digital First Aid Kit.

    Show Notes: [1:21] - On her way to law school, Eva began working for Electronic Frontier Foundation and decided not to leave. She has worked in nearly every department. [2:22] - Having worked in tech since a teen, Eva had a lot of experience with stalkerware. But she shares the reason why she was driven to research it further. [4:02] - Through her own research and trials, Eva found that anti-virus apps did not protect against stalkerware. [5:21] - Eva explains how abusers could react to stalkerware being removed from a device and leaves the decision up to the survivor on how and when to remove it. [6:30] - There are companies that are now paying more attention to stalkerware. Eva explains that this is a good thing, but also believes that it is because there has been an increase in the use of stalkerware. [7:24] - The most recent report of stalkerware being detected by antivirus programs indicates a range of 60-95% as compared to only 10% a few years ago. [8:33] - In cases of domestic abuse, an abuser has physical access to a device and can install stalkerware without the survivor even knowing. [10:10] - Spouses and partners having access to each other’s devices and knowing passwords is very common in modern relationships. [11:22] - Eva recommends stalkerware detection apps for Android and Apple. [13:01] - Chris and Eva discuss Windows and Mac OS stalkerware. [14:32] - What is the difference between account compromise and device compromise? Eva says the more common problem is account compromise. [16:01] - Eva recommends different and long passwords for each account you have as well as having two factor authorization turned on. She explains how this works. [18:09] - Eva’s advice for consumers is to meet them where they are. [19:13] - You should go into your account settings and look for the page that lists devices and IP addresses that have logged into your account if you feel something is going on. [21:32] - Personal trackers that are meant for people to keep track of their belongings are essentially a gift to stalkers. [23:11] - Regarding personal trackers, Eva shares that she has gotten some pushback on the abuse of these tools. [24:32] - Software that allows you to do this without notifying the user so that they do not know that they are being watched is in and of itself abusive. [26:01] - It is sad to see when people who have been abused feel that the only way they can take back power is to abuse as well. [27:33] - Resetting to factory settings for most forms of device compromise is sufficient but you also need to change your account passwords and disable iCloud backups. [28:51] - Eva loves open source for personal use, but as a general rule she doesn’t recommend it due to her security background. [29:52] - If your cameras are compromised, covering the camera is a viable security measure. Covering microphones is trickier. [30:43] - Chris and Eva discuss hackers hacking webcams, using blackmail photos, and sextortion emails. [33:01] - Sometimes the extortion emails can confuse people severely enough to believe the scam. [34:26] - Evan recommends the NNEDV and Operation Safe Escape for those looking for support. [36:17] - The U.S. National Domestic Violence Hotline is 1-800-799-7233

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Coalition Against Stalkerware - StopStalkerware.org National Network to End Domestic Violence (NNEDV) Operation Safe Escape Electronic Frontier Foundation Email: eva@eff.org Eva Galperin on Twitter
  • If you’ve ever felt the pressure to buy something because the website said there were just two left at that price or that the sale was ending soon, you’ve experienced just two of the many techniques using neuroscience to advertise online.

    Today’s guest is Roger Dooley. Roger is an author and international speaker. His books include Friction, one of the Best Business Books of 2019, and Brainfluence now in 11 languages. He writes the popular Neuromarketing Blog and Brainy Marketing at Forbes.com. He co-founded College Confidential, the leading college-bound website.

    Show Notes: [1:02] - Roger’s background began in engineering but he found his way into marketing. [2:32] - Neuromarketing is using the understanding of how our brains work to market better. Roger describes it in more detail as well. [3:47] - One of the major techniques using psychology in marketing is scarcity. [5:27] - Another technique is to use social proof. Roger uses travel sites as an example. [6:16] - Many large companies, specifically travel sites and hotels, hire psychologists for the purpose of marketing. [7:50] - There’s nothing wrong with using scarcity in marketing, but Roger and Chris discuss those who do not use this technique ethically. [10:03] - Chris shares a personal story of a sales job where his ethical selling and integrity created return customers. [14:04] - The first step in recognizing the legitimacy of scarcity techniques is to be aware that they exist. [14:27] - Roger discusses another technique called reciprocity. [15:47] - Always evaluate the legitimacy of product reviews. [16:33] - Authority is another technique used. Roger explains how the psychology behind this works. [17:50] - Through Covid, the authority technique was seen often. [19:30] - One area that Roger has been recently focused on is the area of friction. How does this work in the sales field? Amazon has been using it for a long time. [21:33] - Roger shares a story about how LinkedIn used the friction technique. [23:40] - Even news sites use the startup friction technique to gather subscribers. [25:18] - How do vendors use more friction to retain subscribers or customers? [28:10] - The return process can also be sketchy, but in the case of Amazon, making this process easy has created reciprocal trust. [33:07] - There are many rebate offers that can be abused that were very popularly used in the past. Roger explains how that worked and that it isn’t used as often anymore. [36:20] - When you express the same deal to someone as a loss or a gain, the loss looms bigger than the gain. Deals like this prey on loss aversion. [37:54] - There was some research done about random higher prices put onto specific items. [39:14] - Decoy marketing is very popular recently because of the surge in subscription services. [42:03] - Another form of decoy marketing is when there’s a better product offered at the same price of the lesser product. [42:52] - Always look for things that might be manipulative. [44:02] - Everyone is impacted by these techniques differently. Price sensitivity, urgency, and fear of missing out are traits that are affected differently. [45:12] - AI is used to better control personalized/customized offers. Roger explains the pros and cons. [47:28] - Generally speaking, engagement on video content is great. When AI suggested videos are accurate, things are great, but engagement can actually be weaponized. [49:18] - What happens when there’s too much engagement? [51:51] - Adding friction in the right places can be a good thing for businesses.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Roger Dooley Web Page Roger Dooley on Twitter Roger Dooley on LinkedIn Roger Dooley on Facebook Roger Dooley on Instagram Friction by Roger Dooley Brainfluence by Roger Dooley The Persuasion Slide by Roger Dooley
  • When you hear the word “hacker,” you envision someone breaking into a computer, but did you know that people can be hacked? The manipulation and persuasion of people can lead to someone gaining physical access to a location or even data being leaked.

    Today’s guest is Jenny Radcliffe. Jenny is the founder and director of Human Factor Security and is commonly known as the People Hacker. She’s a world-renowned social engineer hired to bypass security systems through a no-tech mixture of psychology, con-artistry, cunning, and guile. Jenny is also a podcaster, keynote speaker, talk show host, and panel chair.

    Show Notes: [0:58] - Jenny explains social engineering as no-tech hacking and how she became known as the People Hacker. [2:32] - Chris shares how a pen tester recently made a mistake and Jenny describes some of the mistakes she has made on that job. [3:56] - Laughing at previous mistakes, Jenny shares a memorable experience where she almost got caught in the act. [5:55] - In her experience, it is better to use psychology over breaking into a physical location. [7:01] - Jenny shares a story about breaking into a museum as the first time she felt drawn to this lifestyle and years later it was an industry she could work for. [10:30] - After a physical engagement and success in gathering the objects or data needed for the job, Jenny describes her adrenaline and celebration. [13:05] - Physical entry can seem very theatrical as we’ve all seen in action movies like James Bond. But ideally, Jenny says that evidence someone was there should not be left behind. [14:57] - Jenny sometimes leaves business cards in locations after she breaks into them and takes photos that she has saved. [16:50] - There is an element of social engineering with pen testing. [17:45] - Apparent authority is one of the top strategies used in social engineering. Jenny explains how Covid has made this even easier to dupe someone. [19:40] - Criminals and social engineers capitalize on fear, uncertainty, and doubt. [20:47] - During pen testing, a no-blame culture is crucial. Otherwise, people won’t report in times of actual penetration. [22:12] - Even if you don’t think you are being scammed, you should always tell someone the second you are told to keep quiet about something. [23:27] - Chris and Jenny discuss ransomware. In some cases, there is not an organization with a business model. [25:01] - There have recently been a lot of high-profile ransomware hacks. [26:17] - You have to try to remove the emotion for the victim so that payment is not made. It’s horrible but if the money is paid, they’ll come back. [28:55] - How are these large companies getting hacked? How are hackers getting through? [29:36] - Have all the tech security in place but be aware that one person could still make a mistake. [30:54] - The reason the cyber security industry is so huge is because, despite our best efforts, mistakes happen. [32:07] - You can’t guarantee avoidance as long as humans are involved. With proper training and the right amount of suspicion, all we can do is hope everyone will remember to report anything unusual. [34:18] - In a compliance-minded organization, something as simple as a sign that says not to do something, they don’t question it. [36:49] - Jenny shares a story of being caught and them not ever saying anything that she was seen. [39:23] - “This is not my problem.” Chris and Jenny chat about Hitchhiker’s Guide to the Galaxy and how some of the scenes apply to her job. [41:39] - Cyber security is something that defines how good a business is these days. [42:27] - When asked about things that go wrong during physical pen tests, Jenny says there are so many experiences that she tries to give a different answer to everyone who asks. [45:19] - Jenny shares the most boring physical pen test she experienced. [48:11] - Usually something goes wrong, so when something goes absolutely to plan, it is surprising for Jenny. [49:12] - Jenny shares the 4 things to do to stay safe. What are her red flags?

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Human Factor Security Web Page People Hacker on Twitter Human Factor Security Podcast Human Factor Security on YouTube
  • Standard sales scripts can make some people sound shady or pushy, but techniques of influence and persuasion are supposed to produce different results. How can you tell the difference between something shady or legitimate?

    Today’s guest is Paul Ross. Paul is an author, speaker, trainer, master hypnotist, and master practitioner of neuro linguistic programming. For over 30 years, Paul has been featured in leading media outlets including BBC, CNN, NBC, Rolling Stone, and more. His speeches and trainings have motivated tens of thousands of people to discover their power to design their own results through the power of persuasion and language.

    Show Notes: [1:00] - Paul introduces himself and a little about his book, Subtle Words That Sell. [2:21] - When asked about the worst sales techniques out there, Paul explains that the worst ones are the ones that can be identified. [3:07] - Sales tactics have had to change due to constant distractions. [4:31] - Paul explains what he teaches clients and students and although it sounds “crazy,” creating a state of trust and focus is crucial. [6:20] - Selling isn’t all about service. Paul emphasizes the power of suggestion. [7:50] - Paul shares how different media outlets use a variety of manipulated imagery to support their platform. [9:12] - Following your gut is advised when on the consumer end of things and the selling side. [10:11] - Even in the world of dating, there are so many suggestions on social media, movies, and music that suggest how people should behave. [12:43] - Paul encourages everyone to invest in themselves and explains the value of having coaches and mentors. [14:18] - Paul poses a question that illustrates the power of persuasion in sales. [15:13] - There is a missing element in self-improvement that Paul explains with examples. [18:47] - People tend to view new experiences through an old lens especially if possible rejection is involved. [19:43] - The brain can’t tell the difference between what you dwell on and what you rehearse. [21:30] - Sometimes what we think is a discipline problem, it's actually a bad learning strategy. [24:10] - Paul emphasizes that his model is his creation and is constantly evolving. [25:41] - Paul teaches certain questions on what you could have done differently. We are trained by our culture to look for our errors, but the key is to look for the things you’ve done right first. [26:34] - The three C’s are Compassion, Courage, and Clarity. [27:54] - “Persistence is a myth.” - Paul Ross [29:00] - What if you persist with your mistakes? [31:23] - Paul offers two free courses with the purchase of his book if purchased through this link.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Paul Ross Home Page Subtle Words That Sell by Paul Ross Paul Ross Speaker on Facebook Paul Ross on LinkedIn
  • Child exploitation is an incredibly sensitive and difficult topic. It is vital to understand what resources are available to help the victims find healing.

    Today’s guest is Dr. Deaneè Johnson. Dr. Johnson has been a key player in advancing the victim services field at the federal, state, and local levels for over twenty years. As an OVC Fellow, she has assisted with collaborating with the DOJ to identify a range of child exploitation programs available nationwide, illuminating the best practices. She was most recently the chief program officer at the National Center for Victims of Crime before building her own consulting business Ascent Connection and Consulting Solutions. She also serves on the National Steering Committee for the Vision 21 Linking Systems of Care for Children and Youth, the Advisory Board for Preparedness Without Paranoia, and the Charles County Board of Education Safety in Maryland.

    If you know or suspect child exploitation, sexual abuse, or any other kind of child victimization, contact the National Child Abuse Hotline at 1-800-422-4453. If you are looking for more resources as a victim of past child abuse, call Victim Connect at (855) 484-2846.

    Show Notes:

    [1:39] - Dr. Johnson began her interest in this field of child exploitation in 1999 as a volunteer mentor. During her undergrad courses, she was focused on child abuse. [2:27] - After Dr. Johnson received her degree in Criminal Justice, she started her Master’s in Counseling. She counseled adolescent youth that were victim of sexual abuse. [3:15] - Through her experience in counseling, Dr. Johnson felt that something was stirred inside her and she no longer felt that counseling was the direction she should take. [4:13] - Deaneè was given the opportunity to build a forensic interviewing program in a rural community in Texas. She got her masters and transferred her focus to forensic interviewing but still didn’t understand her drive. [5:19] - She put all her energy and education towards the children who were victimized sexually. [6:28] - Throughout her experiences, Deaneè had a memory pop up and realized that she did not have memories from her childhood other than images from photos. She had been a victim of sexual abuse. [7:49] - Deaneè decided to go for her doctorate in Child Development with the drive to apply it to child victimization. [9:13] - Any child can be a victim. No statistic is going to be solid because it is such an unreported crime. [10:34] - 1 in 4 girls and 1 in 10 boys will be sexually victimized before their 18th birthday. [11:03] - There is no specific population or demographic that has higher rates of victimization than others. [12:00] - There are ways to minimize the likelihood of child exploitation but Dr. Johnson does not like to use the word prevention. [13:23] - Dr. Johnson is a chairperson on the Advisory Board of Preparedness Without Paranoia. She explains the education they provide. [14:55] - We’re really uncomfortable talking about sex with kids in general and now add on talking about unwanted sex. That discomfort will show to our kids. [16:00] - If a child goes to their parents with a disclosure, we want to make sure the child knows that what they have to say is important and that keeps communication open. [17:27] - Believe the child who discloses. Whether or not the child is telling the truth is not the job of the parent at that moment. The job is to listen to your child and be there for them. [18:30] - If a child has been victimized once, it increases their likelihood of being victimized again. They need to have someone they can talk to about it. [19:50] - There are two different types of disclosures: active and non-active or accidental. [21:49] - Disclosure will vary child by child. [23:14] - Victimization from a family member that the child loves may not be something they think is inappropriate. [25:11] - Dr. Johnson defines grooming and examples of what this could look like. Grooming is a slow process and creates a false sense of trust. [26:38] - Grooming usually ends with threats if children disclose. It is a vicious cycle that continues with the kids feeling isolated and ashamed. [27:57] - The process of isolating a child or adolescent looks different in each situation and relationship. Dr. Johnson describes a story of an experience with a teenager she worked with. [30:01] - If you feel that there is something going on with a child you know, seeking help depends on the state you live in. Find out if you need to go to Child Protective Services and/or law enforcement. [32:09] - Dr. Johnson shares the contact information for the National Child Abuse Hotline and what they will assist with. [33:41] - She also shares the contact information for Victim Connect which is a resource for those who have been victimized in their own childhood. [34:19] - Many rape crisis centers offer counseling free of charge. Dr. Johnson shares other ways to get resources for healing in tribal communities. [36:41] - Dr. Johnson defines polyvictimization and how the cycle of abuse continues without intervention. [38:39] - There is a trajectory of polyvictimization that all starts with the early onset to exposure to violence, trauma, or childhood adversity. [40:36] - There is a higher likelihood that unaddressed trauma creates an adverse response. When you have individuals who do not have trauma addressed, their ability to cope and make good decisions decreases. [41:51] - The saying “hurt people will hurt people,” is somewhat true but not in every situation. Dr. Johnson describes it as unaddressed trauma and not the victimization itself that causes someone to hurt others.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Email Dr. Johnson: info@accsonline.org Ascent Connection and Consulting Solutions Website Preparedness Without Paranoia National Child Abuse Hotline Victim Connect Resource Center
  • Amazon is a huge enterprise that makes billions of dollars every year and grew 84% in 2020. Some scammers have capitalized on its success and have found ways to deceive Amazon’s customers for their own gain.

    Today’s guest is Shaahin Cheyene. Shaahin is an award-winning entrepreneur, investor, speaker, podcaster, writer, and filmmaker currently based in Los Angeles, California. He is the CEO and chairman of Accelerated Intelligence which is an Amazon marketing and advertising agency. He shares his passion for Amazon in his course Amazon Mastery and is also a featured mentor at the Founder Institute. Shaahin has been highlighted in many publications including Newsweek, The New York Times, Chicago Tribune, and The New York Post.

    Show Notes:

    [1:10] - Shaahin began in physical products while he was 16 years old. By the time he was 18, the company he was working with hit $1 billion. [2:17] - Shaahin explains the importance of distribution and compares it to the film industry. [3:59] - During the pandemic, Amazon increased revenue. Every time a company is “crushing it,” the scammers come out with something new. [4:58] - One of the interesting things about the Amazon platform is that anybody can sell on Amazon. Shaahin explains how the “buy box” works. [6:17] - Because any third party seller can sell on Amazon, some sellers will sell counterfeit or similar products to what is actually listed thinking that buyers won’t care. [8:01] - If it is under $10, most consumers will not return it and although they received an inferior product than they thought they would get, the third party seller still earns the revenue. [8:28] - Shaahin always recommends reading reviews on a product before buying and explains that it is about more than reading what people think of it. [9:54] - Outside buying from brick and mortar stores or from recognizable name brands online, Shaahin also advises to Google the name of the seller. [10:46] - One of the great things about Amazon is their return policy. Amazon will take any product back 99% of the time. You should always return something that does not meet expectations so Amazon gets the feedback. [11:40] - Chris shares an experience in which he bought a product that stopped working a year later and when talking to customer service discovered that the serial number did not match their company. [12:53] - Shaahin explains one of the Amazon buying hacks that can save buyers money. [14:02] - As a consumer, price is a big factor. You want to try to buy when you can from Amazon themselves for that return policy and register for your warranty immediately on high ticket items. [14:57] - Sometimes Amazon will refund you your money for your return without even requiring you to send the product back. [15:12] - Unfortunately there are a lot of savvy scammers that are onto scamming third party sellers. Shaahin describes what they do. [16:29] - If your return rate exceeds the amount of money Amazon will make, they will fire you as a customer. [17:22] - Shaahin explains how a refund on a product for one of his clients wound up at his house with a fake returned product inside the box. [19:11] - Chris and Shaahin agree that if a customer’s problem was fixed, they are more likely to not only buy again but to spread the word of a great experience than simply a satisfied customer. [20:00] - Shaahin’s company changed the smoking industry. He explains how a buyer with extended warranties was trying to scam the company. Shaahin flipped the issue into an opportunity. [22:57] - There’s a high cost to low price. [23:51] - The terms of service on Amazon says that you cannot do anything to solicit reviews for your products. In the early days, people would leave fake reviews. [25:21] - Over time, Amazon has installed super sophisticated security measures to clamp down on this issue. [26:37] - Shaahin explains how third party sellers can get reviews. [28:29] - There are a lot of companies that will sell consumers discounted products in exchange for honest reviews. This can be done through discount clubs. [30:26] - The problem in these online marketplaces is that unless everyone follows every single rule, sellers will need to do what others are doing in order to build a business. [32:11] - There’s so little incentive to leave organic reviews. Shaahin explains that a lot of the reviews are likely from resellers. [33:36] - Chris explains how he was able to do some digging to find out how a specific scam works. [36:03] - Shaahin and Chris discuss criminal activity and how people are out there who willingly take advantage of others and a lot have the mentality of people vs. corporations. [38:36] - Shaahin was recently featured on the cover of a magazine and he shares the story of the interview. [43:49] - There are scammers who claim to help you start your business on Amazon but can’t follow through. Shaahin offers an Amazon course where he hand picks his students and has a 100% success rate. [44:50] - eCommerce is a form of real estate and investing in it can create a stream of residual income. [47:01] - The difference between Shaahin’s course and Mastermind group and the courses of others is that Shaahin makes his money on Amazon. Other course creators are making their money on the course themselves. [49:46] - You can trace success trajectory and their past just by searching it nowadays. If you are unsure about the claims of a course creator or an Amazon seller, do some research on Google.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Shaahin Cheyene Home Page Shaahin Cheyene on Facebook Shaahin Cheyene on Twitter Shaahin Cheyene on Instagram Hack and Grow Rich Podcast Billion - How I Became King of the Pill Thrill Podcast Amazon Mastery Course
  • A “deep fake” typically refers to a video that has been edited to replace the person in the original video with someone else, commonly a public figure in a way that makes the video look entirely authentic. These are time consuming to make but can be very convincing.

    Today’s guest is Lonnie Waugh. Lonnie is a web developer, software engineer, and deep fake creator. He has been doing deep fake videos for years with a sense of humor traditionally using the OneDuality on Instagram, TikTok, and YouTube.

    Show Notes: [0:56] - Lonnie describes what a deep fake is and what he does for his YouTube channel to make things humorous. [1:52] - To accomplish this in the past, it was very extensive, but now can be done from home with the right equipment and software. [2:37] - The process to create something like this is very time consuming and Lonnie describes a frustration with rendering something and going back to edit. [3:32] - Lonnie outlines what this process looks like for him and why he chooses political conferences for a lot of his videos. [5:30] - In addition to finding all the movements needed for the face he’s using to replace the original, Lonnie also does some pre-processing. This isn’t necessary but he explains why he chooses to take the time to do it. [7:02] - The software used to do this is open source but not yet available for Mac. [8:18] - Because Lonnie has been doing this for so long, he knows what to look for to determine if the content is real or a deep fake, but points out that if you don’t know what to look for, it is easy to be fooled. [9:27] - Lonnie and Chris describe some of the little nuances and indicators that Lonnie can notice. [10:49] - Lonnie shares that he cannot monetize his YouTube channel because of the copyrighted content he uses so it is not worth his time to go back and fix some of the most minor indicators of it being fake. [11:12] - Lighting also makes things challenging and Lonnie shares an experience with a music video director not consulting a professional. [12:28] - Lonnie has created content for music videos and hopes to eventually create for commercials. [13:38] - Discussing the technical aspects of the process, Lonnie describes how many frames a creator should use and how the AI recognizes faces. [15:47] - There are different modes that creators can use. [16:23] - Because of copyrights, there are challenges to deep fakes when using obvious original videos. [17:21] - Politicians are typically in the public domain but celebrities and actors who have enough legal backing could find each video one by one and take them down. [17:57] - For those who are not celebrities or political figures, there’s likely not enough video content available for a deep fake to be made of them. Lonnie says it can be done with photos but thousands of photos would be needed. [18:51] - The quality of the video used is important as well. [19:47] - There is an app that can take photos and video and replace faces. To Lonnie they look good but are obviously not real. Some people may be fooled by them, though. [20:45] - At the moment it is not likely of someone creating a deep fake of someone with malicious intent unless there’s a lot of professionally done video content of them in all different kinds of lighting. [21:38] - Lonnie and Chris discuss the amount of work involved in creating a convincing deep fake of the average Joe. [22:29] - There is software that will use a single photo to impose onto a video but they are not convincing and are typically used for entertainment. [23:40] - In regards to romance scams, Chris shares that this could eventually be something used to create video content. [25:08] - Lonnie explains how another YouTuber has used clips to startle people. [26:09] - There is a lot of thought being put into this in the political world and will potentially be legislated in the future. [27:33] - While the technology can be abused, Lonnie has not yet seen it used in a dangerous way and says that the abuse of it is pretty predictable right now. [28:11] - Lonnie references a recent legal case that may have abused this type of technology.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest OneDuality on Instagram OneDuality on YouTube OneDuality on TikTok Schmoyoho on YouTube