{"id":2037472,"date":"2024-11-25T00:00:33","date_gmt":"2024-11-25T05:00:33","guid":{"rendered":"https:\/\/sharedsecurity.net\/?p=101974"},"modified":"2024-11-25T00:00:33","modified_gmt":"2024-11-25T05:00:33","slug":"deepfake-fraud-data-brokers-tracking-military-personnel","status":"publish","type":"post","link":"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/","title":{"rendered":"Deepfake Fraud, Data Brokers Tracking Military Personnel"},"content":{"rendered":"<p>In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue Sky, and Mastodon, discussing user experiences and migrations. The episode wraps up with a humorous and radical suggestion for dealing with data brokers. Tune in for an engaging discussion on security, privacy, and the impact of emerging fraud technologies.<\/p>\n<p><strong>** Links mentioned on the show **<\/strong><\/p>\n<p><strong>One Deepfake Digital Identity Attack Strikes Every Five Minutes<\/strong><br \/>\n<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/deepfake-identity-attack-every\/\">https:\/\/www.infosecurity-magazine.com\/news\/deepfake-identity-attack-every\/<\/a><\/p>\n<p><strong>Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany<\/strong><br \/>\n<a href=\"https:\/\/www.wired.com\/story\/phone-data-us-soldiers-spies-nuclear-germany\/\">https:\/\/www.wired.com\/story\/phone-data-us-soldiers-spies-nuclear-germany\/<\/a><\/p>\n<p><!-- notionvc: fc12dc07-4fad-4bf7-af27-608e52408c03 --><\/p>\n<p><!-- notionvc: acf4c416-cc6b-426a-b4cd-4c9f66df6cb6 --><\/p>\n<p><!-- notionvc: 88a160a5-1f28-444a-aacb-c577fab234c7 --><!-- notionvc: 4c797aac-e61c-4709-bfde-9b44b7533e21 --><\/p>\n<p><!-- notionvc: 9c5c40e5-5031-4e60-8b50-66bc37374346 --><\/p>\n<p><!-- notionvc: f403c979-1a0d-4041-9f6c-1d9d477f473e --><\/p>\n<p><strong>** Watch this episode on YouTube **<\/strong><\/p>\n<div class=\"jetpack-video-wrapper\">\n<div class=\"fitvids-video\"><iframe loading=\"lazy\" title=\"Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/VyttgAKIadI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div>\n<p><strong>** Become a Shared Security Supporter **<\/strong><\/p>\n<p>Get exclusive access to ad-free episodes, bonus episodes, listen to new episodes before they are released, get access to our private Discord server, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Support the show for as little as $3! Become a supporter today! <a href=\"https:\/\/patreon.com\/SharedSecurity\">https:\/\/patreon.com\/SharedSecurity<\/a><\/p>\n<p><strong>Get our new Shared Security Podcast glitter stickers!<\/strong><br \/>\n<a href=\"https:\/\/sharedsecurity.net\/stickers\">https:\/\/sharedsecurity.net\/stickers<\/a><\/p>\n<p><strong>** Thank you to our sponsors! **<\/strong><\/p>\n<p><strong>SLNT<\/strong><\/p>\n<p>Visit <a href=\"https:\/\/www.avantlink.com\/click.php?tt=cl&amp;merchant_id=364b46a6-e620-4c44-bb24-6b4d59b0af40&amp;website_id=430328bd-a1b1-499e-a241-f5aa426345c2&amp;url=https%3A%2F%2Fslnt.com\">slnt.com<\/a> to check out SLNT&#8217;s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code &#8220;sharedsecurity&#8221;.<\/p>\n<p><strong>Click Armor<\/strong><\/p>\n<p>To find out how \u201cgamification\u201d of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor\u2019s gamified awareness training platform, visit: <a href=\"https:\/\/clickarmor.ca\/sharedsecurity\">https:\/\/clickarmor.ca\/sharedsecurity<\/a><\/p>\n<p><strong>** Subscribe and follow the podcast **<\/strong><\/p>\n<p>Subscribe on YouTube: <a href=\"https:\/\/www.youtube.com\/c\/SharedSecurityPodcast\">https:\/\/www.youtube.com\/c\/SharedSecurityPodcast<\/a><\/p>\n<p>Join us on Reddit: <a href=\"https:\/\/www.reddit.com\/r\/SharedSecurityShow\/\">https:\/\/www.reddit.com\/r\/SharedSecurityShow\/<\/a><\/p>\n<p>Watch and Subscribe on Odysee (YouTube alternative)<br \/>\n<a href=\"https:\/\/odysee.com\/@SharedSecurity:c\">https:\/\/odysee.com\/@SharedSecurity:c<\/a><\/p>\n<p>Follow us on Mastodon: <a href=\"https:\/\/infosec.exchange\/@sharedsecurity\">https:\/\/infosec.exchange\/@sharedsecurity<\/a><\/p>\n<p>Follow us on Bluesky: <a href=\"https:\/\/bsky.app\/profile\/sharedsecurity.bsky.social\">https:\/\/bsky.app\/profile\/sharedsecurity.bsky.social<\/a><\/p>\n<p>Visit our website: <a href=\"https:\/\/sharedsecurity.net\/\">https:\/\/sharedsecurity.net<\/a><\/p>\n<p>Subscribe on your favorite podcast app: <a href=\"https:\/\/sharedsecurity.net\/subscribe\">https:\/\/sharedsecurity.net\/subscribe<\/a><\/p>\n<p>Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: <a href=\"https:\/\/shared-security.beehiiv.com\/subscribe\">https:\/\/shared-security.beehiiv.com\/subscribe<\/a><\/p>\n<p>Leave us a rating and review: <a href=\"https:\/\/ratethispodcast.com\/sharedsecurity\">https:\/\/ratethispodcast.com\/sharedsecurity<\/a><\/p>\n<p>Contact us: <a href=\"https:\/\/sharedsecurity.net\/contact\">https:\/\/sharedsecurity.net\/contact<\/a><\/p>\n<p>The post <a href=\"https:\/\/sharedsecurity.net\/2024\/11\/25\/deepfake-fraud-data-brokers-tracking-military-personnel\/\">Deepfake Fraud, Data Brokers Tracking Military Personnel<\/a> appeared first on <a href=\"https:\/\/sharedsecurity.net\/\">Shared Security Podcast<\/a>.<\/p>\n\n<p class=\"syndicated-attribution\">*** This is a Security Bloggers Network syndicated blog from <a href=\"https:\/\/sharedsecurity.net\/\">Shared Security Podcast<\/a> authored by <a href=\"https:\/\/securityboulevard.com\/author\/0\/\" title=\"Read other posts by Tom Eston\">Tom Eston<\/a>. Read the original post at: <a href=\"https:\/\/sharedsecurity.net\/2024\/11\/25\/deepfake-fraud-data-brokers-tracking-military-personnel\/\">https:\/\/sharedsecurity.net\/2024\/11\/25\/deepfake-fraud-data-brokers-tracking-military-personnel\/<\/a> <\/p>","protected":false},"excerpt":{"rendered":"<p>In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue [\u2026]<\/p>\n<p>The post <a href=\"https:\/\/sharedsecurity.net\/2024\/11\/25\/deepfake-fraud-data-brokers-tracking-military-personnel\/\">Deepfake Fraud, Data Brokers Tracking Military Personnel<\/a> appeared first on <a href=\"https:\/\/sharedsecurity.net\/\">Shared Security Podcast<\/a>.<\/p>\n","protected":false},"author":7115,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13571,308,651,5,21129],"tags":[369,13399,50662,14066,43379,1443,65500,35519,65940,79822,483,13882,13400,900,13032,29882,12633,83019,10524,1037,13396,104341,14252,13402,82257,345,444,79823],"class_list":["post-2037472","post","type-post","status-publish","format-standard","hentry","category-data-security","category-identity-access","category-iot-ics-security","category-sbn","category-threats-breaches","tag-biometrics","tag-cyber-security","tag-cyber-threat","tag-cybersecurity","tag-data-brokers","tag-data-privacy","tag-deepfake","tag-deepfakes","tag-digital-privacy","tag-episodes","tag-fraud","tag-germany","tag-information-security","tag-infosec","tag-location","tag-location-data","tag-military","tag-pirates","tag-podcast","tag-podcasts","tag-privacy","tag-privateers","tag-scams","tag-security","tag-strava","tag-surveillance","tag-technology","tag-weekly-edition"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deepfake Fraud, Data Brokers Tracking Military Personnel - Security Boulevard<\/title>\n<meta name=\"description\" content=\"In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deepfake Fraud, Data Brokers Tracking Military Personnel\" \/>\n<meta property=\"og:description\" content=\"In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-25T05:00:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1524\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tom Eston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@securityblvd\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\",\"url\":\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\",\"name\":\"Deepfake Fraud, Data Brokers Tracking Military Personnel - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"datePublished\":\"2024-11-25T05:00:33+00:00\",\"dateModified\":\"2024-11-25T05:00:33+00:00\",\"author\":{\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/030066c18a7793d50e062d9affc85b9d\"},\"description\":\"In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Promo\",\"item\":\"https:\/\/securityboulevard.com\/category\/promo\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/securityboulevard.com\/category\/promo\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Deepfake Fraud, Data Brokers Tracking Military Personnel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/030066c18a7793d50e062d9affc85b9d\",\"name\":\"Tom Eston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e875badca32f5603c5b01482d401e95?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e875badca32f5603c5b01482d401e95?s=96&d=mm&r=g\",\"caption\":\"Tom Eston\"},\"sameAs\":[\"https:\/\/sharedsecurity.net\"],\"url\":\"https:\/\/securityboulevard.com\/author\/tom-eston\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Deepfake Fraud, Data Brokers Tracking Military Personnel - Security Boulevard","description":"In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/","og_locale":"en_US","og_type":"article","og_title":"Deepfake Fraud, Data Brokers Tracking Military Personnel","og_description":"In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.","og_url":"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_published_time":"2024-11-25T05:00:33+00:00","og_image":[{"width":1524,"height":512,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2018\/01\/TwitterLogo-002.jpg","type":"image\/jpeg"}],"author":"Tom Eston","twitter_card":"summary_large_image","twitter_creator":"@securityblvd","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/","url":"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/","name":"Deepfake Fraud, Data Brokers Tracking Military Personnel - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"datePublished":"2024-11-25T05:00:33+00:00","dateModified":"2024-11-25T05:00:33+00:00","author":{"@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/030066c18a7793d50e062d9affc85b9d"},"description":"In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Promo","item":"https:\/\/securityboulevard.com\/category\/promo\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/securityboulevard.com\/category\/promo\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Deepfake Fraud, Data Brokers Tracking Military Personnel"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/030066c18a7793d50e062d9affc85b9d","name":"Tom Eston","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7e875badca32f5603c5b01482d401e95?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e875badca32f5603c5b01482d401e95?s=96&d=mm&r=g","caption":"Tom Eston"},"sameAs":["https:\/\/sharedsecurity.net"],"url":"https:\/\/securityboulevard.com\/author\/tom-eston\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p91vu9-8y2s","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/7115"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=2037472"}],"version-history":[{"count":1,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037472\/revisions"}],"predecessor-version":[{"id":2037473,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/posts\/2037472\/revisions\/2037473"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=2037472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/categories?post=2037472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/tags?post=2037472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}