Powered by RND

Easy Prey

Chris Parker
Easy Prey
Último episodio

Episodios disponibles

5 de 296
  • Post Scam Guidebook
    Fraud usually gets talked about in numbers like how much money was stolen, how many people were affected, how many cases got filed. But behind every one of those numbers is a person who's been blindsided, manipulated, or left trying to rebuild trust in others and in themselves. This episode shifts the focus back to those human stories and the fight to protect them. My guest, Freddie Massimi, has spent more than a decade helping scam victims find both financial and emotional recovery, bringing empathy and understanding to a field that too often feels cold and procedural. As a certified financial crimes investigator and program manager at The Knoble, Freddie has made it his mission to bridge the gap between institutions and individuals. He shares the heartbreaking and hopeful moments that define his work including one phone call that saved a life. Along with how that experience changed the way he thinks about what true fraud prevention really means. Freddie also opens up about The Knoble's Post-Scam Victimization Guide, a collaborative, trauma-informed resource designed to help victims regain control of their lives and prevent re-victimization. From crypto scams to romance cons, he explains how these schemes keep evolving, why empathy is still one of the best tools we have, and how every fraud fighter can make a difference simply by listening and responding with humanity. Show Notes: [00:40] Freddie shares his background as a certified financial crimes investigator and program manager at The Knoble. [01:40] A look back at Freddie's early path into criminal justice and how empathy shaped his fraud-fighting approach. [03:07] The story of a Tennessee widow who lost $300,000 in a pig-butchering crypto scam. [04:30] Freddie's emotional account of saving a victim's life and how it reframed his mission to protect others. [07:42] The rise of collaborative fraud-fighter networks and Freddie's work leading The Knoble's post-scam initiatives. [08:11] How The Knoble unites financial institutions, law enforcement, and NGOs to address "human crime." [08:58] Development of the Post-Scam Victimization Guide, a trauma-informed resource for banks and fraud teams. [10:39] How financial crime has evolved from simple check scams to complex digital exploitation and trafficking. [13:01] The need for faster, more transparent information sharing between banks and law enforcement. [14:04] What makes the Post-Scam Guide different including actionable steps, empathy-driven language, and real-world tools. [15:00] Sextortion cases, Gavin's Law, and how shame and silence compound the harm. [18:30] Practical tools in the guide, including hotline numbers, QR codes, and scripts for supporting victims. [20:20] How to talk to romance scam victims with compassion including using questions that spark reality checks, not judgment. [22:00] Why shame keeps scams underreported and how trauma-informed communication changes outcomes. [23:19] The role of technology in scams: remote access, malware, and how scammers exploit smartphones and computers. [24:36] Shoutout to Kitboga for his cybersecurity tools and awareness campaigns against scam call centers. [25:22] Why elderly victims remain the most vulnerable and how education can empower prevention. [27:24] The double victimization cycle like when scammers return pretending to recover lost money. [30:00] Freddie's real-world example of helping a victim secure their accounts and recover identity. [32:50] How banks can adjust fraud detection systems to catch hidden patterns of exploitation. [34:30] Spotting red flags in gift card purchases and why speaking up can literally save lives. [36:31] Freddie's advice for anyone who suspects they're being scammed: stop all contact and secure your accounts. [37:06] The importance of documenting everything and reporting through IC3.gov and law enforcement. [38:30] Emotional recovery and community support are just as vital as financial recovery. [41:00] The biggest mistake victims make after being scammed is staying silent out of shame or fear. [41:40] Freddie's story about protecting his own grandmother from IRS and WhatsApp scams. [43:00] Common text-message scams and why you should never reply, even with "wrong number." [44:48] How to access The Knoble's free, vetted Post-Scam Victimization Guide. [45:30] Where to connect with Freddie and The Knoble's wider fraud-fighter network. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest The Knoble Freddy Massimi - LinkedIn
    --------  
    46:00
  • Can You Trust Anything Online
    You think you'd never fall for a scam until you meet someone like Kitboga. He's a software engineer who's turned his curiosity about online fraud into a full-time mission to outsmart scammers and protect the people they target. His YouTube channel, The Kitboga Show, has millions of followers and nearly a billion views, thanks to his mix of humor, empathy, and clever ways of exposing how scams really work. In our conversation, Kit opens up about how this all started, what it's really like to spend hours pretending to be a scam victim, and how organized crime has turned fraud into a massive global business. He shares what's changed over the years and why those old "red flags" don't always work anymore and how new tools like deepfakes and AI have made deception harder to spot than ever. Kit also talks about his newest project, Serif Secure, a free tool he created to help people clean and protect their computers after a scam attempt. He's honest, thoughtful, and a little funny even when the subject is dark. By the end, you'll see just how much one person can do to fight back. Show Notes: [01:15] Kit explains how he got into "scam baiting" and why protecting victims became personal. [03:05] He shares how streaming scam calls to friends unexpectedly turned into a viral mission. [06:07] Kit recounts nearly falling for a Discord impersonation scam himself. [09:17] We discuss how deepfakes and AI are changing what a "red flag" looks like online. [11:31] Scammers now use real services like PayPal and DocuSign to appear legitimate. [13:11] Kit explains how long-term investment and "pig-butchering" scams draw people in slowly. [15:51] Fraudsters are now going after 401(k)s and retirement funds instead of small cash grabs. [17:00] We examine how fake phone numbers and online ads make verification harder than ever. [19:56] Kit talks about the emotional toll of scam-baiting and why he sometimes needs a break. [21:51] We reflect on why decades-old scams, like Nigerian letters, still thrive today. [23:57] The scale of organized fraud is compared to global industries worth trillions. [25:41] Kit admits scams will never truly disappear—only evolve with new technology. [26:44] We learn how his team uses automation to detect and map out scam networks. [30:24] Kit describes juggling live streaming with scam calls and the role humor plays in coping. [33:37] He explains why scammers' aggression still works and what it reveals about victims. [37:00] Kit shares moving stories of victims, including a widower deceived in a romance scam. [40:00] We explore how scams erode self-trust and make victims doubt their own judgment. [42:13] Kit talks about working with law enforcement and the need for stronger collaboration. [44:10] We hear about Serif Secure, his anti-scam software designed to protect users' devices. [47:04] The software now proactively blocks remote access tools and phishing websites. [48:14] Kit warns about "scam recovery" frauds and the cruel trick that targets victims twice. [49:30] We wrap with practical advice on skepticism, security, and staying a step ahead of scammers. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Kitboga - YouTube Seraph Secure Kitboga Kitboga - Instagram The Scamcast with Kitboga
    --------  
    53:31
  • Real Time Fraud Detection
    Everywhere you turn, someone's trying to fake something like an image, a voice, or even an entire identity. With AI tools now in almost anyone's hands, it takes minutes, not days, to create a convincing fake. That's changed the game for both sides. The fraudsters have new weapons, and the rest of us are scrambling to keep up. The real question now isn't just how to stop scams, but how to know who or what to trust online. My guest today, Bala Kumar, spends his days on the front lines of that battle. He's the Chief Product and Technology Officer at Jumio, a company working to make digital identity verification faster, smarter, and safer. Bala has more than twenty years in the industry, including leadership roles at TransUnion, and he's seen firsthand how the race between innovation and exploitation never really ends. It just keeps speeding up. In our conversation, Bala shares how generative AI has supercharged the fraud world, what makes identity such a fragile link in digital trust, and why biometrics may finally offer a way forward. We also dig into the psychology behind online risk, how convenience often wins over caution, and what small habits can help people protect themselves in an age where deception looks more real than ever. Show Notes: [01:04] Bala Kumar has a background in product management and fraud prevention from TransUnion to Jumio. [01:59] He describes how fraudsters constantly evolve, forcing companies to anticipate attacks instead of just reacting. [03:56] The quality of manipulated images has skyrocketed, making real vs. fake nearly indistinguishable. [05:17] Jumio's systems catch most fake IDs, but Bala admits even advanced systems must keep auditing for missed fraud. [07:16] Regular audits and rapid response cycles help Jumio identify attack spikes within 24–48 hours. [09:40] Generative AI has dramatically increased the speed and volume of fraud attempts across industries. [11:33] Jumio uses cross-transaction risk analysis to detect emerging fraud patterns and shut down attacks quickly. [13:00] Fraudsters move from one platform to another, always searching for weaker defenses and faster wins. [15:10] Bala explains how fraud prevention has expanded beyond banking into gaming, dating, and gig platforms. [16:38] Consumers crave low friction, which ironically makes them more vulnerable to scams. [17:20] Instant gratification culture pressures companies to reduce security steps, fueling greater risk. [19:52] New AI-driven fraud tactics include injected camera feeds and highly realistic deep fakes. [20:12] Old tricks like "send me a selfie with proof" no longer work—deepfakes can now mimic anything. [22:22] Bala sees biometrics as the next major safeguard for digital identity and real-time verification. [23:12] Facial recognition has become mainstream, paving the way for secure and low-friction identity checks. [26:19] Jumio is already deploying biometric check-ins for events and hotel registrations with great success. [27:30] Account recovery and payout systems now use liveness and device checks to confirm identity safely. [30:09] Bala critiques outdated knowledge-based questions like "What's your favorite food?" as unreliable security. [31:12] Consumers lack visibility into which apps use strong verification or multi-factor authentication. [33:56] He calls for an independent rating system to rank apps based on security and identity protection. [37:53] Bala urges users to question why companies ask for personal data like SSNs or ZIP codes. [39:29] Even a ZIP code and last name can expose personal records, highlighting the need for awareness. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Jumio Bala Kumar - LinkedIn
    --------  
    40:30
  • Child Predator Tactics
    Kids spend more time online than ever, and for the most part it feels normal. They're gaming, watching videos, and chatting with friends. But hidden in those same spaces are adults who know how to pose as kids, build trust, and push conversations into dangerous territory. Parents might think it couldn't happen to their child, yet detectives see how quickly an "innocent" interaction can turn into grooming or extortion. That's the world Detective Seth Cockerham works in every day. He's been in law enforcement in Texas for close to a decade, and the last few years have been dedicated to investigating crimes against children. He talks about these cases with both the eye of an investigator and the heart of a parent, because he knows what it's like to raise kids in a world where technology isn't going away. Seth explains how predators move kids off kid-friendly apps into spaces parents can't easily monitor, what behaviors should make families pay attention, and why kids often keep things to themselves. He also shares what has worked in his own home like parental control tools, early conversations about boundaries, and making sure his daughters know they can come to him about anything. At the end of the day, his message is simple: if your child says something feels wrong, take it seriously. Show Notes: [01:07] Seth explains his path into law enforcement and how he moved into child crime investigations. [02:24] Why drowning and neglect cases motivated him to take a deeper role in protecting kids. [04:05] The personal impact of working child abuse cases and balancing it as a parent. [05:30] How predators go where kids are online, from YouTube to gaming platforms with chat features. [07:00] Grooming tactics predators use, often pretending to be the same age to build trust. [07:40] Grooming can escalate in hours or take weeks, with predators moving kids to apps like Snapchat. [10:39] AI filters sometimes detect inappropriate content, but predators still find ways around it. [11:52] Behavioral changes are often the first signs kids are being exploited or manipulated online. [14:10] Why some kids go to police instead of parents and how Seth builds trust with families. [16:47] Most child abuse cases involve someone the child already knows; online cases are often strangers. [18:20] International predators make prosecutions harder, especially in sextortion cases. [21:08] Managing families' expectations when investigations take longer than TV shows portray. [23:55] Fastest time Seth has moved from a report to an arrest in an online case. [24:14] Common traits of perpetrators, often highly tech-savvy with strong knowledge of systems. [26:46] The parental control tools Seth uses at home, including the Bark phone for his kids. [29:30] How to reset boundaries with older kids and use resources like NetSmartz for education. [32:37] Seth's advice to kids: never send selfies to strangers, don't believe threats, tell a trusted adult. [33:39] His warning about sextortion: paying money never works, it only leads to more demands. [36:20] Resources for victims include counseling through advocacy centers and photo removal tools. [37:20] Seth's key takeaway: listen to your kids and take their concerns seriously. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Bark National Center for Missing and Exploited Children NetSmartz
    --------  
    37:44
  • Identity Trafficking
    Some people are willing to hand over their identities for cash, while organized fraudsters are lining up to buy them. What used to be a matter of stolen credit cards has turned into a global marketplace where personal details fuel large-scale fraud. Now with AI, automation, and deepfakes making impersonation easier than ever, it's becoming much more difficult to protect identities.  To understand how we got here and what can be done, I spoke with Ofer Friedman, Chief Business Development Officer at AU10TIX. Ofer has spent more than 15 years in the identity verification and compliance world, working with companies like PayPal, Google, Uber, and Saxo Bank. He's seen the evolution from basic ID checks to today's sophisticated fraud-as-a-service platforms, where attackers can buy stolen data cheaply, sometimes for just a few dozen dollars, and use it to launch real-time, undetectable attacks. Ofer explains why traditional approaches like uploading a photo of your ID are no longer enough, and why privacy, in practice, is already gone. He walks through the "minefield strategy" of fraud prevention, where businesses must layer multiple defenses like device, network, and behavioral indicators. We also talk about the rise of digital IDs, the coming challenge of quantum computing, and why regulators and service providers, not consumers, are now the ones who must shoulder the responsibility of protecting identities. Show Notes: [01:00] Ofer explains his role in forecasting fraud trends and designing solutions, drawing from years in identity verification and compliance. [03:32] The conversation turns to people selling their identities, with fraudsters buying because impersonation is easier than ever. [05:18] Ofer describes how sales happen in encrypted channels like Telegram or Discord, often targeting desperate individuals. [07:07] He calls these sellers "identity mules," noting they only receive a few dozen dollars per transaction. [08:20] With billions of stolen data points in circulation, there's more identity data than people, making personal data cheap and plentiful. [09:00] Regulations require minimal information, often just basic ID details and a selfie, which makes fraud easier to attempt. [11:00] Deepfakes and injection attacks undermine even live ID checks, giving rise to fraud-as-a-service platforms that automate attacks. [13:00] New age verification laws in the US and UK highlight the growing tension between privacy and regulation. [15:53] Ofer outlines the "minefield strategy," where layered defenses (ID, device, network, behavior) are needed since no single tool is sufficient. [18:46] The discussion shifts to how fraud is global, not just American, and why digital IDs may offer better protection though not without flaws. [21:45] Fraud is evolving quickly with automation, enabling fraudsters to launch massive, randomized attacks. [29:03] Ofer explains the three lines of defense: live checks, collateral risk factors, and behavioral monitoring. [31:40] He stresses that privacy is effectively dead, as the balance between privacy and security always favors security. [34:47] Consumer education won't stop fraud—technology and companies must take the lead in identity protection. [39:14] Identity verification and cybersecurity are merging into one process that scrutinizes users everywhere online. [45:34] The rise of agentic AI could reduce friction in transactions, but desensitization means people accept more scrutiny over time. [47:24] Ofer argues regulations need to evolve, calling for service providers to be rated and held to higher standards. [50:36] He reflects that we're moving into a new era where deepfakes and impersonation will affect not just finances but media, politics, and trust itself. [52:05] Ofer closes with advice on evaluating identity verification vendors, emphasizing layered defenses and transparency. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest AU10TIX Ofer Friedman - LinkedIn
    --------  
    53:49

Más podcasts de Noticias

Acerca de Easy Prey

Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
Sitio web del podcast

Escucha Easy Prey, Narcosistema con Anabel Hernández y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app

Easy Prey: Podcasts del grupo

Aplicaciones
Redes sociales
v7.23.11 | © 2007-2025 radio.de GmbH
Generated: 11/7/2025 - 8:52:26 AM