エピソード

  • Human Side of Fraud: Empathy, Education, & Evolution
    2025/06/25

    People used to think fraud was something that happened in the shadows, rare, distant, and mostly affecting big companies. But after talking to PJ Rohall, it’s clear that fraud is evolving fast, and it’s showing up in places most of us don’t even think to look.

    In this episode, I sit down with PJ Rohall, Head of Fraud Strategy and Education at SEON and co-founder of About Fraud. PJ’s work is all about staying ahead of scammers and helping businesses and individuals understand how fraud actually works. From synthetic identities and AI-powered scams to account takeovers and refund fraud, he breaks it all down in a way that’s both eye-opening and surprisingly accessible.

    We talk about how fraudsters think, what makes people vulnerable, and why collaboration is one of the best defenses we have. PJ shares practical tips, real-world examples, and some of the patterns he’s seeing that everyone should be aware of. Whether you run a business or just want to better protect yourself online, this conversation might change the way you think about trust, technology, and the digital world we live in.

    Show Notes:
    • [00:52] PJ Rohal is a co-founder of About Fraud and Fraud Fight Club, which is our in conference, in-person experience. He started that back in 2017, but his fraud prevention journey started back in 2011.
    • [02:45] He began studying finance and business. He had some mental health issues and was open to trying something different when he saw a job for a fraud analyst.
    • [06:22] His experience transferred really well into the entrepreneurial journey.
    • [11:13] It's in the best interest of everyone to collaborate and share tips and tricks when trying to prevent fraud.
    • [13:05] Everybody is open or vulnerable to being a victim of a scam. There shouldn't be a stigma around it.
    • [14:51] It's powerful to see even tech savvy people being victims of scams.
    • [17:20] How a contextually relevant scam could actually get you.
    • [21:16] It's PJ's dream to get outside of his bubble and help educate the community the best he can.
    • [23:43] Two-factor authentication codes have changed, because they give warnings and instructions for the consumer now.
    • [28:45] People with platforms could get the word out about the risk of scams.
    • [34:30] Getting fighting scams to the front and center is a challenge.
    • [36:57] Handling calls from people who've lost large amounts of money in a scam. Having a psychologist or people who understand human behavior would really help with this journey.
    • [40:39] Banks and financial institutions are starting to think differently about handling these issues.
    • [41:05] There's also a lot of technology on the market that's designed for scams.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • PJ Rohall - LinkedIn
    • SEON
    • About Fraud
    • Fraud Fight Club
    • PJ@about-fruad.com
    続きを読む 一部表示
    47 分
  • Identity Is The New Security Perimeter
    2025/06/18

    Sometimes it feels like every new technology we adopt comes with a new risk we didn’t see coming. From AI and data breaches to phishing scams and ransomware, it's clear we live in a time when cybersecurity isn’t just a tech issue, it’s a human issue.

    In this episode, I talk with Jeff Reich, Executive Director of the Identity Defined Security Alliance. Jeff has been in the cybersecurity world since the early days, with decades of experience helping organizations protect what matters most. His passion for identity security and risk management runs deep, and he brings a thoughtful perspective on how the industry has changed and what we need to do to keep up.

    We explore why identity is the real perimeter in today’s digital world, how businesses and individuals can be proactive rather than reactive, and what it really takes to build a security-first mindset. Jeff also shares why communication is just as important as tech when it comes to staying secure. Whether you're a cybersecurity professional or just someone trying to stay safe online, this conversation will leave you thinking differently about the role identity plays in your digital life.

    Show Notes:
    • [00:54] Jeff Reich is the Executive Director of the Identity-Defined Security Alliance, a nonprofit focused on raising the level of awareness of identity and identity security.
    • [01:52] Jeff began studying physics and astrophysics in school. He even taught in a planetarium. He also went into law enforcement.
    • [03:10] He went into security and was planning on working at EDS, but he ended up at ARCO. He then moved to Dell computers and a financial services company. He started the security program at Rackspace and was also a research director at the University of Texas, San Antonio.
    • [03:49] He is now enjoying the nonprofit space.
    • [04:43] Not becoming a victim of a scam comes down to situational awareness. If you're receiving something from someone you don't know, assume it's hostile.
    • [06:33] Jeff tells the story about when he was working at a hosting company, and he noticed clusters of servers turning from green to red and then back to green.
    • [07:42] It turned out scammers were taking over customers' websites. It ended up being ransomware.
    • [16:03] Be very aware of fake invoices and spoofed emails and scam phone calls.
    • [20:18] They recently had identity management day 2025. They had a lot of presentations on what existential identity might mean to a certain individual or corporation.
    • [21:57] People can protect themselves by using different email accounts.
    • [24:34] Tips on protecting yourself when someone is impersonating you.
    • [27:21] The future of identity should have big advances going forward that will involve AI.
    • [31:40] Improved authenticator apps and DNA-based identity are in our futures.
    • [36:22] Hackers are stealing credentials and logging into companies not breaking in.
    • [39:01] Our identity needs to be protected more than an account number.
    • [40:01] Clean house and get separate accounts for important things like banking.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Jeff Reich - Identity Defined Security Alliance
    • Identity Defined Security Alliance
    • Jeff Reich - LinkedIn
    • Jeff@IDSAlliance.org
    続きを読む 一部表示
    41 分
  • Your Car Is Spying On You What It’s Collecting and Who It’s Telling
    2025/06/11
    I used to think of my car as just a tool to get from point A to point B. But after this conversation, I can’t help but see it as something else entirely, a powerful data collection device that knows far more about me than I realized. From where I go and who I text to how I drive and even what’s on my phone, today’s vehicles are gathering a staggering amount of personal information. In this episode, I talk with Andrea Amico, the founder of Privacy4Cars. Andrea is one of the leading voices in automotive data privacy and someone who’s spent years uncovering the hidden ways cars collect, store, and share our information. He breaks down how connected cars work, what’s actually being tracked, and why it matters not just for your privacy, but for your safety and finances too. We get into everything from rental car risks and data left behind when you sell a car, to how automakers and third parties might be profiting off your data without your knowledge. If you’ve ever paired your phone with a vehicle or assumed your texts disappear when you disconnect, this episode is going to change the way you think about driving and how to take back control. Show Notes: [01:28] Andrea started Privacy4Cars because cars collect a lot of data. There were zero protections for privacy and security. He's dedicated to turning your car into a more private space and giving you more choice, understanding, and control.[02:25] We talk about when cars started collecting data. OnStar started about 25 years ago. Things really began to evolve when Bluetooth and navigation became common.[03:12] Things really exploded with modern telematics which is like putting a cell phone inside your car that calls home all the time. The average car collects around 25 GB of data per day.[04:08] We talk about the type of data that is collected by cars from GPS to having your phone collected and the car even knowing your weight.[05:26] The sensors in your car know exactly how you drive.[06:46] Informed consumers are better off. These data collecting policies are usually hidden in the car manufacturers privacy policies.[08:46] You can find your car's privacy policy at Vehicle Privacy Report.[10:21] The goal is to make the car manufacturer's behavior visible to consumers, because that's the way to drive better company behavior.[11:26] When you rent a car and when you sell a car, your car is like a giant unencrypted hard drive that contains your data.[12:06] We should wipe the data in our cars the same way we wipe the data in our phones when we replace them.[13:05] You can find a tool to help remove data from your car at Privacy4Cars.[14:21] We talk about what rental cars get from your connected phone. [17:24] Found data can be used in targeted spear phishing attacks.[19:18] Most cars since 2017 have a SIM card. If a prior owner consented to data collection, that data is still being collected when you take over the car.[22:15] Ford estimated that they would make $2,000 per car per year from data services.[24:17] It's common for cars to even have a camera that looks at you. In a few years it might be common for vehicles to monitor for things like intoxication.[26:56] Organizations creating standards like the Future of Privacy Forum.[29:09] Cars have an EDR electronic data recorder. It's like a black box for when an accident happens.[34:05] Delete data when you buy, rent, or sell a car. Opt out if you can.[36:33] Think about your car just like your computers and your phone.[37:15] Andrea shares a story about how an ex-spouse was able to duplicate her key. The dealer wanted $1,000 to reset her car.[40:23] Parting advice includes looking up your car's VIN at Vehicle Privacy Report. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web PageFacebook Pagewhatismyipaddress.comEasy Prey on InstagramEasy Prey on TwitterEasy Prey on LinkedInEasy Prey on YouTubeEasy Prey on PinterestAndrea Amico - Privacy4CarsPrivacy4CarsVehicle Privacy Report Andrea Amico - LinkedInFuture of Privacy ForumEndpoints-On-Wheels – Protecting Company And Employee Data In Cars. Ciso Mitigation Strategies For Fleets, Rentals, And Personnel-Owned Vehicles
    続きを読む 一部表示
    43 分
  • Why Everyone’s A Target
    2025/06/04

    Some scams are so convincing, they’re almost impossible to spot. With phishing emails that look like they’re from your bank, deep fake videos that mimic real people, and AI-generated messages that feel personal, it’s getting harder to know what’s real and what’s a trap.

    In this episode, I sit down with Gabrielle Hempel, a security operations specialist at Exabeam and a current law student at Purdue University. Gabrielle brings a sharp perspective shaped by years in cybersecurity, a master’s in cybersecurity and global affairs from NYU, and hands-on experience navigating everything from vulnerability management to executive risk consulting. She even wrote her graduate thesis on critical infrastructure security.

    We talk about the new era of digital deception, why younger people are actually falling for scams more often, and how criminals are using AI and current events to build trust and bypass defenses. Gabrielle shares practical advice, personal stories, and a fresh way to think about digital safety that could help you spot the next scam before it costs you.

    Show Notes:
    • [01:09] Gabrielle has held quite a few jobs in cybersecurity. She's currently the Security Operations Strategist at Exabeam.
    • [01:40] She's involved with anything to do with the internal security operation.
    • [02:04] She majored in psychology and neuroscience. Working in Pharma and with medical devices led her to the path of cybersecurity.
    • [04:34] We learn about an incident that she was involved in. Her parents were attempting to file their taxes with TurboTax, but they were flagged as already filing. This led to a lot of shenanigans with the IRS.
    • [06:29] Most everyone has been a victim to some type of fraud or scam.
    • [07:20] Our information is out there. It's more about staying vigilant and keeping an eye on things.
    • [08:05] A lot of the current scams are blending with the cybercrime ecosystem.
    • [09:17] AI has made it easier for people to craft more convincing phishing emails.
    • [12:51] Are modern phishing emails getting through the spam filters more often?
    • [15:48] How it's not retirees being the people most frequently caught in scams.
    • [16:42] Why 20 to 29 year-olds frequently fall for scams. It could be because of their comfort with technology.
    • [21:12] Better education surrounding threats might be a good idea for young people.
    • [22:47] As scammers get more information about us, targeting will be easier.
    • [24:32] Big trends are voice cloning and deep fakes.
    • [27:51] Scams around shipping fees and tariffs are skyrocketing.
    • [29:15] Advice includes adopting zero trust with communication.
    • [33:10] If you're not expecting it. It's potentially suspect.
    • [34:45] Best practices include doing your due diligence, and if you feel like something may not be legitimate go around and check.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Gabrielle Hempel - LinkedIn
    • Exabeam
    • @gabsmashh on X
    続きを読む 一部表示
    39 分
  • Child Exploitation Cyber Investigations
    2025/05/28

    Technology is a double-edged sword. It can empower us, connect us, and solve problems, but it can also be used to exploit, manipulate, and harm. When it comes to protecting children online, that line gets especially thin. Digital forensics, AI-powered image classification, and global law enforcement collaboration are now essential tools for keeping families safe in a world that moves faster than most of us can keep up.

    Debbie Garner knows this world intimately. She’s a retired Special Agent in charge with the Georgia Bureau of Investigation and former commander of the state’s Internet Crimes Against Children Task Force. For years she led efforts to track down online predators and bring justice to survivors. These days she’s working in the private sector, serving on the boards of Raven and Revere Technologies, pushing for smarter tech solutions and stronger training to support those still on the front lines.

    In this episode we talk about the growing problem of online child exploitation, the reality of underfunded cybercrime units and the ways technology is being used to fight back. Whether you’re a parent, an educator or just someone who cares about kids online, you need to hear this.

    Show Notes:
    • [00:58] Debbie shares her law enforcement background over 30 years. She even worked undercover buying crack!
    • [02:19] She spent the last 8 years of her career as the Supervisor Special Agent in charge of GBI's Child Exploitation and Computer Crimes Unit.
    • [02:45] Now that she's retired from law enforcement, she works in the private sector with technology companies.
    • [05:36] It's become her passion, even in retirement, to help those who are victims of exploitation.
    • [07:09] Most children are victimized by someone they know. There's also plenty of predators online.
    • [08:55] There are multiple organizations that work on child exploitation investigations.
    • [10:53] People in law enforcement do tend to prioritize these types of crimes.
    • [12:12] We talk about how the investigations begin.
    • [13:53] Cases have increased from 2400 tips a year to over 30,000.
    • [15:17] There's never enough technology to keep up with the increase.
    • [16:41] RAVEN is a lobbying group to request additional funding from Congress.
    • [18:33] With over 30,000 tips last year Georgia made over 450 arrests.
    • [22:13] There's now technology that will help find CSAM on phones. There are also some amazing investigations on the dark web.
    • [25:15] OSINT is helping investigate and it's a collaborative community.
    • [27:55] Channels to report exploitation. Start with the platform, then National Center for Missing and Exploited Children, and law enforcement.
    • [31:34] Don't put images on the internet. Websites like Take It Down can help with images of underage people and Take It Down can help adults.
    • [33:43] Always mention if the person is underage when you make a report.
    • [34:10] Talk to your kids and start early with age appropriate conversations about CSAM.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Debbie Garner - LinkedIn
    • Debbie@Hexordia.com
    • The Innocent Justice Foundation
    • Child Exploitation And Computer Crimes Unit
    • National Center for Missing and Exploited Children
    • StopNCII.org
    • Take It Down
    続きを読む 一部表示
    38 分
  • Reclaiming the Internet
    2025/05/21

    We may not always understand the evolution of the internet and how tech monopolies exist, but having digital freedom fighters is vital to making conscious change. Today's guest is Cory Doctorow. Cory is a science fiction author, activist, and journalist. He is the author of many books and most recently, Picks and Shovels, The Bezel, and The Lost Cause, a solar punk science fiction novel of hope amidst the climate change emergency.

    His most recent nonfiction book is the internet con How to Seize the Means of Corruption, a big tech disassembly manual. Other recent books include Red Team Blues, a science fiction crime thriller. In 2020, he was inducted into the Canadian Science Fiction and Fantasy Hall of Fame

    Cory talks about the slow decline of online platforms and has spent decades fighting for digital rights, fair tech policy and a better, freer internet. His work spans peer to peer networks to antitrust reform and his books—fiction and nonfiction—have become battle cries for tech reformers and digital freedom fighters around the world.

    In this episode we talk about how we got here, what Cory sees as the most urgent threats to digital freedom and the small cracks in the system that might finally let the light back in. From jailbreaking laws and app store monopolies to what comes after big tech’s dominance, Cory shares a roadmap for reclaiming the internet—not just as consumers but as citizens.

    Show Notes:
    • [00:59] Cory shares his background. He's a science fiction novelist, activist, and journalist. He worked with the Electronic Frontier Foundation for over 23 years.
    • [01:20] Cory has written more than 30 books. Most of them are science fiction novels. He's also co-owner and was co-editor for 19 years for the blog Boing Boing.
    • [02:43] Being born in 1971 with a computer scientist father meant they had teletype terminals in the house.
    • [04:01] Cory shares his interesting and pioneering internet and tech history.
    • [05:17] We learn about the origins of Cory's love for science fiction.
    • [07:21] Cory shares a story about how he was mentored by Judy Merril.
    • [09:08] Cory talks about the internet and the changes we've seen from modems and memory cards to FidoNet to now.
    • [15:09] Currently, he's as worried about the internet as he is excited about its potential.
    • [16:13] He's concerned about the internet becoming a powerful tool of surveillance and control.
    • [18:46] Possible paths forward or hill climbing and reevaluating.
    • [22:00] We discuss why printer ink is $10,000 a gallon. It's about laws protecting big tech.
    • [29:45] The hopeful optimistic view of the internet. We're close to making positive changes.
    • [32:31] Advice for consumers is to be a citizen.
    • [34:16] Cory talks about the Electronic Frontier Alliance or EFA.
    • [45:30] Talking about Cory's books and art.
    • [46:31] He says he writes when he's anxious. He talks about his book Red Team Blues. He wrote the last book first and realized that you can write in any order.
    • [49:01] Bizarre early computers and the storyline of the new.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Cory Doctorow - Pluralistic
    • Cory Doctorow’s Craphound
    • Books by Cory Doctorow
    • Cory Doctorow - Electronic Frontier Foundation
    • Boing Boing
    • Cory Doctorow - X
    続きを読む 一部表示
    53 分
  • Security Gaps Hackers Exploit
    2025/05/14

    Scammers aren’t just phishing your inbox anymore—they’re impersonating your voice, your face, and even your coworkers. Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to infiltrate businesses, breach accounts, and dismantle trust at scale. What used to take a hacker hours and expensive tools can now be done in minutes by anyone with a Wi-Fi connection and a little malicious intent.

    Our guest today is Aaron Painter, CEO of Nametag, a company leading the charge in next-generation identity verification. Aaron’s background includes 14 years at Microsoft and executive roles in cloud tech across Europe and Asia. After witnessing firsthand how easily identity theft could unravel lives—especially during the shift to remote everything—he founded Nametag to answer a critical question: how can we know who’s really behind the screen? With Nametag, Aaron is building real-time, high-security ID checks that are already reshaping how help desks and businesses protect users.

    In this conversation, we unpack the difference between authentication and identity, why traditional methods like security questions are dangerously outdated, and how mobile tech and biometrics are changing the game. Aaron also shares practical tips on protecting your most valuable digital asset—your email—and what consumers and companies alike can do to stay ahead of evolving threats. This one’s packed with insight, and more relevant than ever.

    Show Notes:
    • [00:54] Aaron is the CEO of Nametag. A company he started 5 years ago that focuses on identity verification at high-risk moments.
    • [01:37] He spent 14 years at Microsoft working on product including at Microsoft China. He also ran a cloud computing company that was AWS's largest partner in Europe.
    • [02:12] When everything went remote in 2020, he discovered that there were identity verification issues over phone lines.
    • [03:03] He began building technology that will help accurately identify people when they call in to support or help desks.
    • [04:22] Most of what we think of as identity is really just authentication.
    • [07:41] A common new challenge is the rise of remote work and people having to connect remotely. The rise of technologies that make it easier to impersonate someone is also a problem.
    • [10:38] Knowing who you hire and who you're working with matters.
    • [11:03] Deep fakes and voice cloning has become so much easier.
    • [15:47] How platforms have a responsibility to know their users.
    • [18:11] How deep fakes are being exploited in the corporate world.
    • [19:30] The vulnerability is often the human processes. Back doors and side doors are deleting ways that companies are breached.
    • [23:53] High value accounts and companies that know they have something to protect our early adopters of Aaron's technology.
    • [24:50] Identity verification methods including using mobile phones. The device has cryptography.
    • [27:07] Behavioral biometrics include the way we walk or the way we type.
    • [29:56] If you're working with a company that offers additional security tools, take them up on it.
    • [34:04] Dating sites are starting to do verification profiles.
    • [43:07] We all need to push for more secure ways to protect our accounts.
    • [43:48] The importance of protecting your email.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Aaron Painter - LinkedIn
    • Nametag
    • Aaron Painter - Facebook
    • LOYAL: A Leader's Guide to Winning Customer and Employee Loyalty
    続きを読む 一部表示
    51 分
  • Cyber Warfare
    2025/05/07

    Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today's battleground is just as likely to be online as on the ground. That science fiction scenario is now a critical, constant threat-the kind that affects us all globally.

    I'm really excited to introduce you to Dr. Chase Cunningham. He's a retired Navy chief cryptologist with a wealth of experience in cyber operations for the NSA, CIA, FBI—and more. He's the one who pioneered zero-trust security strategies and advises top decision-makers in government and private industry. That gives him a front-row seat to how digital warfare is evolving—and what that means for all of us. He's also the author of Cyber Warfare and the gAbriel Series, where his real-world expertise comes to life in stories that are chillingly plausible.

    We talk about how cyber conflict is already playing out in Ukraine, how different threat actors operate—and why critical infrastructure is such a tempting target. Chase shares practical advice on what individuals and small businesses can do to better protect themselves. We also look at what governments are doing to defend against these growing threats. That conversation is eye-opening-and urgent. You won't want to miss it.

    Show Notes:
    • [01:21] Chase is a retired Navy Chief and a cryptologist. He also worked at the NSA. He also put Zero Trust in the formal practice at Forrester research.
    • [03:24] We learn how Chase got involved with computer work and cryptology.
    • [05:29] We're seeing cyber war play out in real time with Russia and Ukraine.
    • [07:13] We talk about the future of war and drones.
    • [08:31] Cyber warfare is just the natural evolution of conflict in the digital space. It's the bridge between espionage and kinetic activity.
    • [09:40] Chase talks about the different actors in the cyber warfare space and their primary targets.
    • [12:05] Critical infrastructure includes oil and gas, piping, water systems, healthcare, and even schools.
    • [14:12] Some of the unique issues with dealing with the attacks from cyber criminals.
    • [19:20] How the CCP plays 3D chess.
    • [22:26] Reducing risk and protecting ourselves includes following best practices.
    • [25:10] What the government is doing to try to mitigate cyber risk.
    • [27:23] Chasing money and finding cyber crime.
    • [32:04] A lot of valuable assets are being developed in the context of war.
    • [35:06] Chase talks about some of the things he covers in his book.

    Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

    Links and Resources:
    • Podcast Web Page
    • Facebook Page
    • whatismyipaddress.com
    • Easy Prey on Instagram
    • Easy Prey on Twitter
    • Easy Prey on LinkedIn
    • Easy Prey on YouTube
    • Easy Prey on Pinterest
    • Chase Cunningham - Dr. Zero Trust
    • Dr. Chase Cunningham - LinkedIn
    • Cyber Warfare – Truth, Tactics, and Strategies
    • gAbrIel: A Novel in the gAbrIel Series
    • Unrestricted Warfare: China's Master Plan to Destroy America
    続きを読む 一部表示
    37 分