Logo
    Search

    Podcast Summary

    • The dangerous game of kite-fighting and its unexpected consequencesSeemingly harmless activities like kite-fighting can have severe consequences, highlighting the importance of being aware of potential dangers and taking precautions to prevent accidents.

      Kite-fighting, a popular activity in India, involves using sharpened kite strings to knock down opponents' kites. This intense battle takes place on the rooftops of populated cities, where skilled kite-fighters aim to cut the strings of their rivals. To make their strings sharp and scratchy, some kite-fighters coat them in wax or little pieces of glass. However, this thrilling activity has serious consequences. The razor-sharp strings pose a danger to motorcyclists and cyclists, potentially causing severe injuries or even death. To prevent accidents, motorcyclists install small bars on the front of their bikes to catch the strings and protect themselves. This unexpected downwind effect serves as a reminder that seemingly harmless activities can have unforeseen and potentially life-threatening consequences.

    • The dangerous consequences of online connections gone wrongBe cautious of the people we associate with online and offline, prioritize safety, trustworthiness, and honesty in our relationships, and be aware of potential corruption within the justice system.

      The consequences of the dark side of the internet can extend beyond cybercrime. This story highlights the real-life impact of online connections gone wrong. The phone call between Raj and Jagga reveals the dangerous consequences of getting involved with the wrong crowd, even in a seemingly innocent situation like a birthday party. It emphasizes the importance of being cautious and aware of the people we associate with online and offline. Additionally, it raises awareness about the need for proper legal representation and the potential corruption within the justice system. This cautionary tale serves as a reminder to prioritize safety, trustworthiness, and honesty in our relationships, both online and offline.

    • Protecting Yourself from ScammersBe cautious when receiving unexpected calls or messages asking for money, even if they appear urgent or emotionally charged. Verify the caller's identity and seek additional proof or confirmation before taking any action. Stay alert and protect yourself from falling victim to scams.

      Scammers often pose as someone you know and trust to manipulate you into sending them money. It is important to be cautious and skeptical when receiving unexpected calls or messages asking for financial assistance, even if they seem urgent or emotionally charged. Take the time to verify the caller's identity before taking any action. In cases like these, do not hesitate to ask for additional proof or contact other family members or friends to confirm the situation. Scammers often exploit people's emotions and vulnerabilities, so it is crucial to stay alert and protect yourself from falling victim to their schemes.

    • The dangers of evolving scamming techniques and the importance of staying vigilantImpersonation scams using advanced technology can lead to financial losses, highlighting the need to be cautious and seek support from family in difficult situations.

      Scamming techniques are constantly evolving and becoming more sophisticated. This story highlights the dangers of impersonation scams, where scammers use advanced technology, such as AI voice cloning, to trick their victims. Tarun and his family were caught off guard by the scammer's convincing impersonation and suffered financial losses as a result. It's important for everyone to be aware of these scams and to stay vigilant when receiving unexpected calls or requests for money. Additionally, this incident showcases the importance of family solidarity and trust. Tarun's cousin, despite being tricked, chose to help him without hesitation, emphasizing the value of familial support in difficult situations.

    • Exploiting Trust and Manipulating Emotions: Scammers Targeting the Punjabi CommunityStay skeptical and cautious when someone tries to isolate you or asks you to keep secrets. Stay informed about scams and maintain open communication within our families and communities to protect ourselves.

      Scammers are taking advantage of the close-knit nature of the Punjabi community, both in India and Pakistan. Many people in Punjab have relatives living abroad, making it easier for scammers to establish a sense of trust and credibility. They exploit the cultural bonds and use emotional manipulation tactics, such as not wanting the target to tell their parents or asking them to keep a secret. It's crucial to be skeptical and cautious when someone tries to isolate you or urges you not to involve others. Additionally, scammers capitalize on the linguistic similarities between Punjabi languages spoken in both countries, further deceiving their targets. It is important to stay informed about such scams and maintain open communication within our families and communities to protect ourselves.

    • Scammers employ new tactics to solicit personal information and exploit victims and their loved ones, while authorities struggle to take effective action.Scammers are using deceptive tactics and exploiting personal connections to carry out scams, while law enforcement's limited resources hinder their ability to intervene effectively.

      Scammers are resorting to a new tactic of soliciting information from their targets in order to impersonate them and scam their friends and family. They offer a tempting deal, promising a percentage of the money they make from scamming the victims' loved ones. This win-win situation for the scammers creates a dangerous cycle of exploitation. Additionally, scammers often gather personal details from social media or through connections with the victims' family and friends. Despite victims reporting these scams to the police, little action is taken due to limited resources and other priorities. This lack of intervention further encourages scammers to continue their activities unchecked.

    • The Importance of Protecting Our Digital PrivacyWe need to be more mindful about the personal information we share online and take proactive steps to safeguard our digital privacy in today's interconnected world.

      Protecting our digital privacy is crucial in the digital age. This story highlights the ease with which scammers acquire personal information about their targets, often obtained voluntarily through our lax approach to data protection. The interviewee emphasizes how we unknowingly give away a vast amount of personal data online, from social media posts to data collected by various digital platforms. This information makes it incredibly easy for anyone to find out details about our lives. While there may be instances where leaks occur beyond our control, we must still take responsibility for safeguarding our digital lives. It is time for a major mind shift, raising awareness of the importance of protecting our data and actively implementing measures to maintain our digital privacy.

    • Taking Control of Our Digital PrivacyProtecting our digital privacy is our responsibility. By staying informed and taking proactive steps, such as being mindful of our online information and using secure communication channels, we can mitigate risks and maintain a sense of security.

      Our digital privacy is at risk, and we cannot rely solely on others to protect it for us. The data-brokerage industry and government laws have undermined our expectation of privacy, making it easier for our data to be collected and used against us. We must not underestimate our digital significance and the potential harm that can come from indiscriminate attacks. Scammers and criminals cast wide nets, targeting anyone they can, regardless of importance or status. To be self-advocates of our digital privacy, we need to take proactive steps to protect ourselves. This can include being mindful of what information we share online, staying informed about privacy laws and policies, using secure communication channels, and regularly updating our privacy settings and passwords. By taking control of our digital privacy, we can mitigate the risks and maintain a sense of security in the digital world.

    • Protecting Our Digital Privacy: Making Smarter Choices and Taking ActionBy being mindful of the companies and online services we use, prioritizing privacy, and advocating for our digital privacy, we can protect our identities and fight against potential scams.

      We should be mindful of the companies and online services we use. It's important to choose tools and services that don't collect our data. Consider switching to email providers and messaging apps that prioritize privacy and don't access or analyze the contents of our messages. By making smarter choices in our digital lives and being more cautious about sharing our data, we can protect our digital identities and make it harder for scammers to target us. Just as Susan B. Anthony had to break the law to fight for change, we need to take action to protect our digital privacy. The government and major tech companies won't prioritize our privacy, so it's up to us to advocate for it and make a change.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Enya Got Catfished

    Enya Got Catfished
    Enya got catfished by Bella Thorne,,, Drew is a conversational narcissist,,, and Shawn Mendez followed them around the grocery store. Our life is a dream? Follow Enya on Insta: @EnyaUmanzor Follow Drew on Insta: @DrewPhillips09 To listen to the podcast on YouTube: bit.ly/EmergencyIntercomPodYT Don’t forget to subscribe to the podcast for free wherever you're listening or by using this link: bit.ly/EmergencyIntercom If you like the show, telling a friend about it would be amazing! You can text, email, Tweet, or send this link to a friend: bit.ly/EmergencyIntercom Learn more about your ad choices. Visit megaphone.fm/adchoices

    Navigating the Maze of Government Scams

    Navigating the Maze of Government Scams

    In this episode of "Let's Talk About Scams," host Joyce Petrowski, founder of ROSE Resources/Outreach to Safeguard the Elderly, delves into the intricate world of government scams. Joyce  breaks down how scammers impersonate various government organizations like the IRS, Social Security, and Medicare to exploit unsuspecting individuals. She emphasizes the evolution of these scams, highlighting tactics like threatening arrest warrants and the misuse of personal information. Offering practical advice and preventative measures, Joyce guides you through the landscape of these frauds, underscoring the importance of skepticism, verification, and awareness in protecting oneself against such deceitful practices.

    Key Episode Takeaways

    • Understanding the evolution of government scams, particularly IRS impersonation.
    • Recognizing and responding to Social Security and Medicare scams.
    • Importance of verifying unexpected contact from government offices.
    • Tips for protecting personal information and preventing fraud.
    • Encouragement to share this knowledge with loved ones to increase awareness.

    Remember to stay vigilant and question unexpected contacts. Share this episode with your loved ones to spread awareness about these scams. Don't forget to subscribe for more insightful episodes like this! Visit www.RoseAdvocacy.org for additional resources and newsletters to safeguard against scams.

    Disclaimer: The information contained in this podcast is intended for informational purposes only and is not a substitute for individual professional/legal advice. The podcast information was carefully compiled from vetted sources and references; however, R.O.S.E. Resources/Outreach to Safeguard the Elderly cannot guarantee that you will not fall victim to a scam.