『Easy Prey』のカバーアート

Easy Prey

Easy Prey

著者: Chris Parker
無料で聴く

このコンテンツについて

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim. ノンフィクション犯罪 政治・政府
エピソード
  • Your Car Is Spying On You What It’s Collecting and Who It’s Telling
    2025/06/11
    I used to think of my car as just a tool to get from point A to point B. But after this conversation, I can’t help but see it as something else entirely, a powerful data collection device that knows far more about me than I realized. From where I go and who I text to how I drive and even what’s on my phone, today’s vehicles are gathering a staggering amount of personal information. In this episode, I talk with Andrea Amico, the founder of Privacy4Cars. Andrea is one of the leading voices in automotive data privacy and someone who’s spent years uncovering the hidden ways cars collect, store, and share our information. He breaks down how connected cars work, what’s actually being tracked, and why it matters not just for your privacy, but for your safety and finances too. We get into everything from rental car risks and data left behind when you sell a car, to how automakers and third parties might be profiting off your data without your knowledge. If you’ve ever paired your phone with a vehicle or assumed your texts disappear when you disconnect, this episode is going to change the way you think about driving and how to take back control. Show Notes: [01:28] Andrea started Privacy4Cars because cars collect a lot of data. There were zero protections for privacy and security. He's dedicated to turning your car into a more private space and giving you more choice, understanding, and control.[02:25] We talk about when cars started collecting data. OnStar started about 25 years ago. Things really began to evolve when Bluetooth and navigation became common.[03:12] Things really exploded with modern telematics which is like putting a cell phone inside your car that calls home all the time. The average car collects around 25 GB of data per day.[04:08] We talk about the type of data that is collected by cars from GPS to having your phone collected and the car even knowing your weight.[05:26] The sensors in your car know exactly how you drive.[06:46] Informed consumers are better off. These data collecting policies are usually hidden in the car manufacturers privacy policies.[08:46] You can find your car's privacy policy at Vehicle Privacy Report.[10:21] The goal is to make the car manufacturer's behavior visible to consumers, because that's the way to drive better company behavior.[11:26] When you rent a car and when you sell a car, your car is like a giant unencrypted hard drive that contains your data.[12:06] We should wipe the data in our cars the same way we wipe the data in our phones when we replace them.[13:05] You can find a tool to help remove data from your car at Privacy4Cars.[14:21] We talk about what rental cars get from your connected phone. [17:24] Found data can be used in targeted spear phishing attacks.[19:18] Most cars since 2017 have a SIM card. If a prior owner consented to data collection, that data is still being collected when you take over the car.[22:15] Ford estimated that they would make $2,000 per car per year from data services.[24:17] It's common for cars to even have a camera that looks at you. In a few years it might be common for vehicles to monitor for things like intoxication.[26:56] Organizations creating standards like the Future of Privacy Forum.[29:09] Cars have an EDR electronic data recorder. It's like a black box for when an accident happens.[34:05] Delete data when you buy, rent, or sell a car. Opt out if you can.[36:33] Think about your car just like your computers and your phone.[37:15] Andrea shares a story about how an ex-spouse was able to duplicate her key. The dealer wanted $1,000 to reset her car.[40:23] Parting advice includes looking up your car's VIN at Vehicle Privacy Report. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestAndrea Amico - Privacy4CarsPrivacy4CarsVehicle Privacy Report Andrea Amico - LinkedInFuture of Privacy ForumEndpoints-On-Wheels – Protecting Company And Employee Data In Cars. Ciso Mitigation Strategies For Fleets, Rentals, And Personnel-Owned Vehicles
    続きを読む 一部表示
    43 分
  • Why Everyone’s A Target
    2025/06/04

    Some scams are so convincing, they’re almost impossible to spot. With phishing emails that look like they’re from your bank, deep fake videos that mimic real people, and AI-generated messages that feel personal, it’s getting harder to know what’s real and what’s a trap.

    In this episode, I sit down with Gabrielle Hempel, a security operations specialist at Exabeam and a current law student at Purdue University. Gabrielle brings a sharp perspective shaped by years in cybersecurity, a master’s in cybersecurity and global affairs from NYU, and hands-on experience navigating everything from vulnerability management to executive risk consulting. She even wrote her graduate thesis on critical infrastructure security.

    We talk about the new era of digital deception, why younger people are actually falling for scams more often, and how criminals are using AI and current events to build trust and bypass defenses. Gabrielle shares practical advice, personal stories, and a fresh way to think about digital safety that could help you spot the next scam before it costs you.

    Show Notes:
    • [01:09] Gabrielle has held quite a few jobs in cybersecurity. She's currently the Security Operations Strategist at Exabeam.
    • [01:40] She's involved with anything to do with the internal security operation.
    • [02:04] She majored in psychology and neuroscience. Working in Pharma and with medical devices led her to the path of cybersecurity.
    • [04:34] We learn about an incident that she was involved in. Her parents were attempting to file their taxes with TurboTax, but they were flagged as already filing. This led to a lot of shenanigans with the IRS.
    • [06:29] Most everyone has been a victim to some type of fraud or scam.
    • [07:20] Our information is out there. It's more about staying vigilant and keeping an eye on things.
    • [08:05] A lot of the current scams are blending with the cybercrime ecosystem.
    • [09:17] AI has made it easier for people to craft more convincing phishing emails.
    • [12:51] Are modern phishing emails getting through the spam filters more often?
    • [15:48] How it's not retirees being the people most frequently caught in scams.
    • [16:42] Why 20 to 29 year-olds frequently fall for scams. It could be because of their comfort with technology.
    • [21:12] Better education surrounding threats might be a good idea for young people.
    • [22:47] As scammers get more information about us, targeting will be easier.
    • [24:32] Big trends are voice cloning and deep fakes.
    • [27:51] Scams around shipping fees and tariffs are skyrocketing.
    • [29:15] Advice includes adopting zero trust with communication.
    • [33:10] If you're not expecting it. It's potentially suspect.
    • [34:45] Best practices include doing your due diligence, and if you feel like something may not be legitimate go around and check.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Gabrielle Hempel - LinkedIn
    • Exabeam
    • @gabsmashh on X
    続きを読む 一部表示
    39 分
  • Child Exploitation Cyber Investigations
    2025/05/28

    Technology is a double-edged sword. It can empower us, connect us, and solve problems, but it can also be used to exploit, manipulate, and harm. When it comes to protecting children online, that line gets especially thin. Digital forensics, AI-powered image classification, and global law enforcement collaboration are now essential tools for keeping families safe in a world that moves faster than most of us can keep up.

    Debbie Garner knows this world intimately. She’s a retired Special Agent in charge with the Georgia Bureau of Investigation and former commander of the state’s Internet Crimes Against Children Task Force. For years she led efforts to track down online predators and bring justice to survivors. These days she’s working in the private sector, serving on the boards of Raven and Revere Technologies, pushing for smarter tech solutions and stronger training to support those still on the front lines.

    In this episode we talk about the growing problem of online child exploitation, the reality of underfunded cybercrime units and the ways technology is being used to fight back. Whether you’re a parent, an educator or just someone who cares about kids online, you need to hear this.

    Show Notes:
    • [00:58] Debbie shares her law enforcement background over 30 years. She even worked undercover buying crack!
    • [02:19] She spent the last 8 years of her career as the Supervisor Special Agent in charge of GBI's Child Exploitation and Computer Crimes Unit.
    • [02:45] Now that she's retired from law enforcement, she works in the private sector with technology companies.
    • [05:36] It's become her passion, even in retirement, to help those who are victims of exploitation.
    • [07:09] Most children are victimized by someone they know. There's also plenty of predators online.
    • [08:55] There are multiple organizations that work on child exploitation investigations.
    • [10:53] People in law enforcement do tend to prioritize these types of crimes.
    • [12:12] We talk about how the investigations begin.
    • [13:53] Cases have increased from 2400 tips a year to over 30,000.
    • [15:17] There's never enough technology to keep up with the increase.
    • [16:41] RAVEN is a lobbying group to request additional funding from Congress.
    • [18:33] With over 30,000 tips last year Georgia made over 450 arrests.
    • [22:13] There's now technology that will help find CSAM on phones. There are also some amazing investigations on the dark web.
    • [25:15] OSINT is helping investigate and it's a collaborative community.
    • [27:55] Channels to report exploitation. Start with the platform, then National Center for Missing and Exploited Children, and law enforcement.
    • [31:34] Don't put images on the internet. Websites like Take It Down can help with images of underage people and Take It Down can help adults.
    • [33:43] Always mention if the person is underage when you make a report.
    • [34:10] Talk to your kids and start early with age appropriate conversations about CSAM.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Debbie Garner - LinkedIn
    • Debbie@Hexordia.com
    • The Innocent Justice Foundation
    • Child Exploitation And Computer Crimes Unit
    • National Center for Missing and Exploited Children
    • StopNCII.org
    • Take It Down
    続きを読む 一部表示
    38 分

Easy Preyに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。