Obtenez 3 mois à 0,99 $/mois

OFFRE D'UNE DURÉE LIMITÉE
Page de couverture de Easy Prey

Easy Prey

Easy Prey

Auteur(s): Chris Parker
Écouter gratuitement

À propos de cet audio

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim. Politique True Crime
Épisodes
  • Child Predator Tactics
    Oct 15 2025

    Kids spend more time online than ever, and for the most part it feels normal. They’re gaming, watching videos, and chatting with friends. But hidden in those same spaces are adults who know how to pose as kids, build trust, and push conversations into dangerous territory. Parents might think it couldn’t happen to their child, yet detectives see how quickly an “innocent” interaction can turn into grooming or extortion.

    That’s the world Detective Seth Cockerham works in every day. He’s been in law enforcement in Texas for close to a decade, and the last few years have been dedicated to investigating crimes against children. He talks about these cases with both the eye of an investigator and the heart of a parent, because he knows what it’s like to raise kids in a world where technology isn’t going away.

    Seth explains how predators move kids off kid-friendly apps into spaces parents can’t easily monitor, what behaviors should make families pay attention, and why kids often keep things to themselves. He also shares what has worked in his own home like parental control tools, early conversations about boundaries, and making sure his daughters know they can come to him about anything. At the end of the day, his message is simple: if your child says something feels wrong, take it seriously.

    Show Notes:
    • [01:07] Seth explains his path into law enforcement and how he moved into child crime investigations.
    • [02:24] Why drowning and neglect cases motivated him to take a deeper role in protecting kids.
    • [04:05] The personal impact of working child abuse cases and balancing it as a parent.
    • [05:30] How predators go where kids are online, from YouTube to gaming platforms with chat features.
    • [07:00] Grooming tactics predators use, often pretending to be the same age to build trust.
    • [07:40] Grooming can escalate in hours or take weeks, with predators moving kids to apps like Snapchat.
    • [10:39] AI filters sometimes detect inappropriate content, but predators still find ways around it.
    • [11:52] Behavioral changes are often the first signs kids are being exploited or manipulated online.
    • [14:10] Why some kids go to police instead of parents and how Seth builds trust with families.
    • [16:47] Most child abuse cases involve someone the child already knows; online cases are often strangers.
    • [18:20] International predators make prosecutions harder, especially in sextortion cases.
    • [21:08] Managing families’ expectations when investigations take longer than TV shows portray.
    • [23:55] Fastest time Seth has moved from a report to an arrest in an online case.
    • [24:14] Common traits of perpetrators, often highly tech-savvy with strong knowledge of systems.
    • [26:46] The parental control tools Seth uses at home, including the Bark phone for his kids.
    • [29:30] How to reset boundaries with older kids and use resources like NetSmartz for education.
    • [32:37] Seth’s advice to kids: never send selfies to strangers, don’t believe threats, tell a trusted adult.
    • [33:39] His warning about sextortion: paying money never works, it only leads to more demands.
    • [36:20] Resources for victims include counseling through advocacy centers and photo removal tools.
    • [37:20] Seth’s key takeaway: listen to your kids and take their concerns seriously.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Bark
    • National Center for Missing and Exploited Children
    • NetSmartz
    Voir plus Voir moins
    38 min
  • Identity Trafficking
    Oct 8 2025
    Some people are willing to hand over their identities for cash, while organized fraudsters are lining up to buy them. What used to be a matter of stolen credit cards has turned into a global marketplace where personal details fuel large-scale fraud. Now with AI, automation, and deepfakes making impersonation easier than ever, it’s becoming much more difficult to protect identities. To understand how we got here and what can be done, I spoke with Ofer Friedman, Chief Business Development Officer at AU10TIX. Ofer has spent more than 15 years in the identity verification and compliance world, working with companies like PayPal, Google, Uber, and Saxo Bank. He’s seen the evolution from basic ID checks to today’s sophisticated fraud-as-a-service platforms, where attackers can buy stolen data cheaply, sometimes for just a few dozen dollars, and use it to launch real-time, undetectable attacks. Ofer explains why traditional approaches like uploading a photo of your ID are no longer enough, and why privacy, in practice, is already gone. He walks through the “minefield strategy” of fraud prevention, where businesses must layer multiple defenses like device, network, and behavioral indicators. We also talk about the rise of digital IDs, the coming challenge of quantum computing, and why regulators and service providers, not consumers, are now the ones who must shoulder the responsibility of protecting identities. Show Notes: [01:00] Ofer explains his role in forecasting fraud trends and designing solutions, drawing from years in identity verification and compliance.[03:32] The conversation turns to people selling their identities, with fraudsters buying because impersonation is easier than ever.[05:18] Ofer describes how sales happen in encrypted channels like Telegram or Discord, often targeting desperate individuals.[07:07] He calls these sellers “identity mules,” noting they only receive a few dozen dollars per transaction.[08:20] With billions of stolen data points in circulation, there’s more identity data than people, making personal data cheap and plentiful.[09:00] Regulations require minimal information, often just basic ID details and a selfie, which makes fraud easier to attempt.[11:00] Deepfakes and injection attacks undermine even live ID checks, giving rise to fraud-as-a-service platforms that automate attacks.[13:00] New age verification laws in the US and UK highlight the growing tension between privacy and regulation.[15:53] Ofer outlines the “minefield strategy,” where layered defenses (ID, device, network, behavior) are needed since no single tool is sufficient.[18:46] The discussion shifts to how fraud is global, not just American, and why digital IDs may offer better protection though not without flaws.[21:45] Fraud is evolving quickly with automation, enabling fraudsters to launch massive, randomized attacks.[29:03] Ofer explains the three lines of defense: live checks, collateral risk factors, and behavioral monitoring.[31:40] He stresses that privacy is effectively dead, as the balance between privacy and security always favors security.[34:47] Consumer education won’t stop fraud—technology and companies must take the lead in identity protection.[39:14] Identity verification and cybersecurity are merging into one process that scrutinizes users everywhere online.[45:34] The rise of agentic AI could reduce friction in transactions, but desensitization means people accept more scrutiny over time.[47:24] Ofer argues regulations need to evolve, calling for service providers to be rated and held to higher standards.[50:36] He reflects that we’re moving into a new era where deepfakes and impersonation will affect not just finances but media, politics, and trust itself.[52:05] Ofer closes with advice on evaluating identity verification vendors, emphasizing layered defenses and transparency. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestAU10TIXOfer Friedman - LinkedIn
    Voir plus Voir moins
    54 min
  • Technology, Trust & Time
    Oct 1 2025
    Technology is moving faster than our ability to process its impact, forcing us to question trust, motivation, and the value of our time. Few people have had a closer view of those shifts than Esther Dyson. With a background in economics from Harvard, Esther built a career as a journalist, author, commentator, investor, and philanthropist, with a unique ability to spot patterns across industries and challenge assumptions before they become mainstream. She is the executive founder of Wellville, a ten-year nonprofit project dedicated to improving equitable well-being in communities across the United States. Beyond her nonprofit work, Esther has been an active angel investor in healthcare, open government, digital technology, biotechnology, and even outer space. She’s currently focusing on health and technology startups, especially the ones that actually care about human connection instead of just making everything faster and more efficient. When we chatted, Esther made this really compelling point about AI. She thinks we're asking the wrong question when we debate whether artificial intelligence is good or bad. What really matters, she argues, is how we choose to interact with it. We dove into some tough ethical questions about how quickly we're adopting these technologies, this concept she calls "information diabetes," and why being upfront about who's funding what and why is absolutely crucial if we want to trust anything anymore. Show Notes: [01:44] Esther describes her career path from journalism to independent investing and healthcare projects.[02:52] She explains why Wellville had a set end date and connects it to her upcoming book on time and mortality.[04:08] Esther gives her perspective on AI, tracing its evolution from expert systems to neural networks and LLMs.[06:17] She stresses the importance of asking who benefits from AI and being aware of hidden motives.[12:44] The conversation turns to ethical challenges, biased research, and the idea of “information diabetes.”[15:37] Esther reflects on how wealth and influence can make it difficult to get honest feedback.[18:09] She warns that AI speeds everything up, making it easier to do both good and harm.[20:14] Discussion shifts to the value of work, relationships, and finding meaning beyond efficiency.[25:45] Esther emphasizes negotiation, balance, and how ads and AI should benefit everyone involved.[27:28] She highlights areas where AI could be most beneficial, such as healthcare, education, and reducing paperwork.[29:26] Esther argues that AI companies using public data should help fund essential workers and services.[31:08] She voices skepticism of universal basic income and stresses the need for human support and connection.[34:55] Esther says AI is far from sentience and accountability lies with the humans controlling it.[36:46] She explains why AI wouldn’t want to kill humans but might rely on them for energy and resources.[37:33] The discussion turns to addiction, instant gratification, and the importance of valuing time wisely.[41:02] Esther compares GDP to body weight and calls for looking deeper at its components and meaning.[42:19] She explains why she values learning from failures as much as from successful investments.[43:18] Esther closes with advice: ask good questions, stay curious, and never underestimate the power of a smile. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestWellvilleEsther Dyson - LinkedInThe Beans Scarcity: The New Science of Having Less and How It Defines Our Lives Analogia: The Emergence of Technology Beyond Programmable Control
    Voir plus Voir moins
    45 min
Pas encore de commentaire