The Deviant Code was born out of a desire to provide a place for both inexperienced explorers as well as veteran kinksters to learn and further educate themselves. In an age where misinformation regarding BDSM & kink flows abundantly, further compounded by various personal situations that complicate and hamper productive discussion around these topics, The Deviant Code is designed to foster healthy discussion and education for those wishing to explore the darker side of love. Support this po ...
…
continue reading
The Deviant Code Podcasts
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading

1
Episode 216: Who’s Watching the Watchers?
43:44
43:44
Play later
Play later
Lists
Like
Liked
43:44Feeling watched? Join us as Vermont Attorney General Charity Clark breaks down the new reality of digital surveillance. From school apps to AI scams, we dive into how companies collect your data and how to take control of your online privacy. The war for privacy is real—and it's a fight you can't afford to lose. Learn more about your ad choices. Vi…
…
continue reading

1
Episode 215: They Targeted His Mom, He Went Full CIA
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41A fake Microsoft pop-up cost Ken Westbrook’s mom her life savings. But they scammed the wrong family. Westbrook is former CIA. These days he’s sounding the alarm on how foreign crime rings steal billions from Americans with smishing campaigns, scareware, and gift cards. We talked about solutions. Learn more about your ad choices. Visit megaphone.fm…
…
continue reading

1
Episode 214: DEF CON Redux with Rachel Tobac!
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adcho…
…
continue reading

1
Episode 213: Inside DEF CON’s Social Engineering Village
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34At DEF CON’s Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megapho…
…
continue reading

1
Episode 212: How to Talk to a Cybercriminal
42:39
42:39
Play later
Play later
Lists
Like
Liked
42:39Kurtis Minder knows the dark web better than most—and he’s not just watching from the sidelines. As a ransomware negotiator, he’s helped victims talk their way out of seemingly impossible situations. This week, we explore how cybercriminals operate, what makes them tick, and what you need to know to avoid becoming their next target. Learn more abou…
…
continue reading

1
Episode 211: The Coldplay Couple and the End of Anonymity
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36A not-entirely innocent moment at a concert set the internet on fire. But what if that was just a symptom of a bigger problem? New York Times journalist Kashmir Hill, author of Your Face Belongs to Us, helps us explore the chilling reality of ambient surveillance, and how facial recognition could be the end privacy as we know it. Learn more about y…
…
continue reading

1
Episode 210: Cracking the Code of Fraud with AARP's Kathy Stokes
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Online fraud isn't just annoying; it's a national crisis. Last year alone, it may have siphoned $158 billion from the U.S. economy. This episode features AARP's Kathy Stokes, who reveals how fraud has morphed into a sophisticated, global operation and what's being done to fight back against this evolving threat. Learn more about your ad choices. Vi…
…
continue reading

1
Episode 209: Unmasking the North Korean IT Scam
42:29
42:29
Play later
Play later
Lists
Like
Liked
42:29Fortune Magazine's Amanda Gerut offers a deep dive into the secret army of remote IT workers funding North Korea's nuclear ambitions. Explore the hidden world of laptop farms, the criminal identity theft targeting freelancers, and the shocking human cost. It's a chilling scheme with law enforcement and freelancers trapped in the crossfire. Learn mo…
…
continue reading
Join Ben Winters, director of AI and Privacy at the Consumer Federation of America, for a front-row seat to the chaotic world of AI regulation where dirty data, aggressive lobbying, and public confusion drive a "winner takes all" vibe. From shady therapy bots to data-fueled discrimination, Ben reveals the urgent need to create guardrails for AI bef…
…
continue reading

1
Episode 207: Kristen and the Phantom Puppy
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17Kristin got scammed because she didn't want to give a puppy mill her business. This classic digital scam has it all: fake breeders, phony shipping agents, and a non-existent air-conditioned crate. Kristen reveals how her scammers used trust, urgency and emotion, to close the deal. Listen to her story and what you can do to avoid getting duped yours…
…
continue reading

1
Episode 206: Chris Hutchins’s Travel Hacking Gets Hacked
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55If you have never listened to Chris Hutchins explain how to get free travel, you’ve probably been paying too much for your vacations. Turns out, a threat actor was listening to him and stole his miles. Download this week’s episode to hear how he hacked the situation to score even more points. (This episode originally airdropped September 26, 2022.)…
…
continue reading

1
Episode 205: Cybersecurity Girl Caitlin Sarian Tries to Delete Herself Online
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42Every part of life that comes in contact with the Internet is tracked, packed and sold to a a seemingly infinite network of data brokers. Caitlin Sarian AKA Cybersecurity Girl joined us this week to discuss why scrubbing your information is trickier than it sounds and what you can do about it. Learn more about your ad choices. Visit megaphone.fm/ad…
…
continue reading

1
Episode 204: Nicole Perlroth Says All the Things that Keep Adam Up at Night
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:04Nicole Perlroth’s book This Is How They Tell Me the World Ends is a masterpiece on the topic of cyberwar and the zero-day hacks that make it deadly. Join us as we explore with Perlroth a cyberscape where mistakes are weaponized, backdoors abound and we all have zero degrees of separation from spies and the people they spy on. Learn more about your …
…
continue reading

1
Episode 203: Jack Rhysider Exposes Our Digital Secrets
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30What if your digital footprint made you a target? Jack Rhysider, host of "Darknet Diaries," shares how a fan turned his online presence into a personal puzzle—revealing just how easily your privacy can be pieced together and exploited. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy DeleteMe
…
continue reading

1
Episode 202: Shannon Edwards Reveals the Student Data Free-for-All
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26As technology is integrated deeper into classrooms, the lines between education and data privacy have been destroyed by for-profit data miners. This week, privacy advocate Shannon Edwards reveals how educational apps harvest sensitive information from children, commodify their data, and what parents can do to fight it. Learn more about your ad choi…
…
continue reading

1
Episode 201: Keren Elazari Decrypts the Ransomeware Nightmare
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41Ransomware is a type of malware that allows hackers to commandeer data on a device or an entire network. Increasingly, the threat actors behind these crimes set their sites on mission critical targets. We talked about it with renowned cybersecurity expert Keren Elazari this week. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 200: The Wild West of the Loophole Economy
48:13
48:13
Play later
Play later
Lists
Like
Liked
48:13We’ve all been there. You see something perfect online, you do all the clicks and then think, “Wait, was that legit?” Scam-lite transactions are the way of the web these days, whether it’s direct-from-manufacturer or super-sticky subscriptions, we have your back. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 199: CISA Director Jen Easterly Stands Watch in the Cyberwars
43:11
43:11
Play later
Play later
Lists
Like
Liked
43:11From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story abou…
…
continue reading

1
Episode 198: Cory Doctorow Makes Us Wonder if Everything’s a Scam
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19Think you’re too savvy to get scammed? Author and activist Cory Doctorow explains how we’re all one muffaletta and a malfunctioning jet door away from falling prey to the most basic of cons. He joins us this week to talk about that and to fill us in about his new book, “The Bezzle.” Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 197: FBI Operative Eric O’Neill: Cybercriminals Are Spies—Not Hackers
48:00
48:00
Play later
Play later
Lists
Like
Liked
48:00What if the biggest threat to your privacy wasn’t some hacker in a hoodie—but a spy trained to infiltrate your life? Former FBI operative Eric O’Neill, the man who took down spy Robert Hanssen, explains how digital spies target us, offering along the way real-world tips to protect ourselves in a world where everyone’s a potential target. Learn more…
…
continue reading

1
Episode 196: Max Lebow Battles a Cyber PsyOps Nightmare
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43Learn more about your ad choices. Visit megaphone.fm/adchoicesBy DeleteMe
…
continue reading

1
Episode 195: Can AI Commit the Perfect Crime?
45:05
45:05
Play later
Play later
Lists
Like
Liked
45:05AI is everywhere – in the news, on our devices, assisting us, making life easier for us, and for criminals, too, harnessing AI to swindle people more efficiently. What’s next? We dive into the dark side of AI and ask two experts: Could AI commit the perfect crime? Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 194: Karen Johnson’s Scam Project Is a Teachable Moment for AI
35:00
35:00
Play later
Play later
Lists
Like
Liked
35:00Karen Johnson is a catfisher-turned-scam avoidance coach turned–you guessed it–catfishing victim. The scam that got her is a classic, opening the door to a Pandora’s Box of the usual advice about avoiding the most common scams out there. But the thing that really got us thinking is the role AI played in almost every aspect of this week’s show. Lear…
…
continue reading

1
Episode 193: Roy Wood, Jr. Exposes the Loch Ness Monster Gun Lobby Conspiracy
37:23
37:23
Play later
Play later
Lists
Like
Liked
37:23As a Daily Show correspondent, comedian Roy Wood, Jr. knows a thing or two about fake news and truthiness as well as the truth-and-a-half that is comedy. By skewering the media and the people in the news, he has special insight into how misinformation affects the way we think about the world and what we know. Learn more about your ad choices. Visit…
…
continue reading

1
Episode 192: Max McCoy Investigates $47 Million That Isn’t in Kansas Anymore
48:54
48:54
Play later
Play later
Lists
Like
Liked
48:54Max McCoy stumbled on a $47 million swindle that starts just north of the Oklahoma panhandle and bounces to Australia before things get really confusing in a haze of small town corruption, secretive law enforcement and competing theories. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 191: Erin West Puts the Bad Guys to Shame
41:18
41:18
Play later
Play later
Lists
Like
Liked
41:18Erin West is the Deputy District Attorney in Santa Clara County, California, and the founder of Project Shamrock. Whether she’s prosecuting eye-popping SIM-swap money grabs or putting large-scale pig butchering operations out of business, her stories and experience can help you stay safer. Learn more about your ad choices. Visit megaphone.fm/adchoi…
…
continue reading

1
Episode 190: Dick Gephardt Wants a Safer Internet
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35Former House Democratic Leader Dick Gephardt is on a mission to kill Section 230, the legal shield that lets social media giants profit from chaos. If engagement-driven algorithms are fueling harmful content for the sake of profit, is it time for the U.S. to take bold action to rein in the Internet? (You know the answer, but this is a must listen!)…
…
continue reading

1
Episode 189: Kara Swisher Calls Out the Man Babies of Big Tech
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Kara Swisher has been covering Silicon Valley since the early days, and she’s made a ton of enemies the old fashioned way (by telling the truth about the new robber barons of our digital lives). In a new memoir called Burn Book, she pulls the curtain back on a world run by powerful babies. Learn more about your ad choices. Visit megaphone.fm/adchoi…
…
continue reading

1
Episode 188: Jen Caltrider Unwraps Hidden Privacy Nightmares
44:18
44:18
Play later
Play later
Lists
Like
Liked
44:18Privacy expert Jen Caltrider reveals how those shiny new AI gadgets with their mind-bending tech—not to mention the social media apps capturing every moment—are a privacy nightmare. Is going analog the only safe option? Learn how to protect your data from the prying eyes of Big Tech. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 187: Al Franken Holds a Mock Senate Hearing on Privacy with Siri and Alexa
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44No deep fake here. This week, Al Franken does his own impersonations of Bernie Sanders, Mitch McConnell, Chuck Grassley, Sherrod Brown and Susan Collins in this mock Senate Hearing featuring Siri (played by the actual voice-over talent Susan Bennett) and Al’s fellow SNL alum Laraine Newman playing the part of Alexa. Learn more about your ad choices…
…
continue reading

1
Episode 186: Vermont Attorney General Charity Clark Hates Scammers More than We Do
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38Ever wonder why facial recognition is so accurate? Well, one reason is the shocking amount of personal data it needs (think: all the world’s snapshots), and that’s why Vermont Attorney General Charity Clark is taking aim at the industry behind that technology. We also review Charity’s top scams to watch for this year, and other topics near and dear…
…
continue reading

1
Episode 185: Senators Blackburn and Blumenthal Join Us to Discuss the Kids Online Safety Act (KOSA)
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37From cyberbullying to harmful algorithms, the risks are real. This week, Senators Marsha Blackburn and Richard Blumenthal join us to discuss their bipartisan bill—the Kids Online Safety Act (KOSA). Together, they’re taking on Big Tech to ensure the safety of children online. Tune in to hear how KOSA could change the digital world for the better. Le…
…
continue reading

1
Episode 184: Kristin Bride Lost Her Son and Now She’s on a Mission
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38Kristen Bride’s 16-year-old son died by suicide after being cyberbullied on Snapchat. Setting her sites on anonymous messaging apps that intentionally traumatize children, Bride heads to Washington DC to fight for change. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy DeleteMe
…
continue reading

1
Episode 183: Ava Smithing Battles Big Tech and the Algorithm Trap
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20Ava Smithing was eleven when she saw a swimsuit on Pinterest that she liked. That innocent click turned into an eating disorder. How? This episode explores the most dangerous thing children face today: Algorithms. On a mission to hold Big Tech accountable, Ava shares her journey as an activist with us, including her recent role providing Congressio…
…
continue reading

1
Episode 182: The Most Scary, Interesting, and Important Stories of 2024
50:08
50:08
Play later
Play later
Lists
Like
Liked
50:08We look back at the internet’s scariest moments, the boldest defenders, and the most surprising tech twists of 2024—groundbreaking legislation, international scam-rings, and the growing fight to make the internet a safer place for everyone. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 181: Bob Sullivan Discovers a Scam That Strikes Twice
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36Chester Frilich lost everything to scammers, and he didn’t just lose his money—he lost hope, too. Bob Sullivan joins us to recount this devastating case, revealing the IRS’s unintentional role in punishing victims, and how advocacy and legislation could turn things around. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Episode 180: Amy Neville Fights Snapchat’s Drug Dealer Problem
43:08
43:08
Play later
Play later
Lists
Like
Liked
43:08What happens when social media platforms prioritize engagement over safety? How do drug dealers exploit apps like Snapchat to target teens? Amy Neville lost her son Alex to counterfeit Oxycodone pills that were laced with Fentanyl. He bought them from a Snapchat user. She talked with us about this hidden crisis and her mission to reform social medi…
…
continue reading

1
Episode 179: Tarah Wheeler and Deviant Ollam Reveal Security’s Weakest Link
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Tarah Wheeler lost her security badge. Deviant Ollam picked his way into "secure" spaces. Together, they show how humans make or break security and why layering defenses is key to surviving inevitable mistakes. What happens when security fails because of us? Two experts dive into the blind spots in physical, digital, and human security—and why fixi…
…
continue reading

1
Episode 178: Jack Rhysider Exposes Our Digital Secrets
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30What if your digital footprint made you a target? Jack Rhysider, host of "Darknet Diaries," shares how a fan turned his online presence into a personal puzzle—revealing just how easily your privacy can be pieced together and exploited. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy DeleteMe
…
continue reading

1
Episode 176: Jen Caltrider Unwraps this Season's Hidden Privacy Nightmares
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:33This holiday season, privacy expert Jen Caltrider reveals how those shiny new AI gadgets under your tree with their mind-bending tech—not to mention the social media apps capturing every moment—are a privacy nightmare. Is going analog the only safe option? Learn how to protect your data, and your holidays, from the prying eyes of Big Tech. Learn mo…
…
continue reading

1
Episode 175: FBI Operative Eric O’Neill: Cybercriminals Are Spies—Not Hackers
48:00
48:00
Play later
Play later
Lists
Like
Liked
48:00What if the biggest threat to your privacy wasn’t some hacker in a hoodie—but a spy trained to infiltrate your life? Former FBI operative Eric O’Neill, the man who took down spy Robert Hanssen, explains how digital spies target us, offering along the way real-world tips to protect ourselves in a world where everyone’s a potential target. Learn more…
…
continue reading

1
Episode 174: Dick Gephardt Wants a Safer Internet
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35Former House Democratic Leader Dick Gephardt is on a mission to kill Section 230, the legal shield that lets social media giants profit from chaos. If engagement-driven algorithms are fueling harmful content for the sake of profit, is it time for the U.S. to take bold action to rein in the Internet? (You know the answer, but this is a must listen!)…
…
continue reading

1
Episode 173: CISA Director Jen Easterly Stands Watch in the Cyberwars
46:41
46:41
Play later
Play later
Lists
Like
Liked
46:41From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story abou…
…
continue reading

1
Episode 172: Our Spookiest Episode Ever: Smart Devices and You
49:23
49:23
Play later
Play later
Lists
Like
Liked
49:23Adam, Beau, and Travis are joined by Mozilla’s Jen Caltrider to uncover the hidden dangers of the Internet of Things (IoT), showing how everyday devices—like smart glasses, baby monitors, and even toasters—have become a gateway for hackers, companies, and even stalkers to exploit your personal data. Learn more about your ad choices. Visit megaphone…
…
continue reading

1
Episode 171: Gretchen Peters Fights the Digital Underworld in Congress
49:54
49:54
Play later
Play later
Lists
Like
Liked
49:54Gretchen Peters, co-founder and executive director of the Alliance to Counter Crime Online, knows better than most how criminal networks flourish on social media platforms. From drug trafficking to child exploitation, we focus on something from 1996 called Section 230 that makes many crimes possible. Learn more about your ad choices. Visit megaphon…
…
continue reading

1
Episode 170: Max Lebow Battles a Cyber PsyOps Nightmare
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43When Max Lebow received a chilling Instagram message detailing intimate information about him, he found himself pulled into a cyber nightmare. In this episode, Max shares his battle with a mysterious hacker who knew enough about him to coerce him into a terrifying journey of digital manipulation, paranoia, and, finally, survival. Learn more about y…
…
continue reading

1
Episode 169: Ava Smithing Battles Big Tech and the Algorithm Trap
40:20
40:20
Play later
Play later
Lists
Like
Liked
40:20Ava Smithing was eleven when she saw a swimsuit on Pinterest that she liked. That innocent click turned into an eating disorder. How? This episode explores the most dangerous thing children face today: Algorithms. On a mission to hold Big Tech accountable, Ava shares her journey as an activist with us, including her recent role providing Congressio…
…
continue reading

1
Episode 168: Senators Blackburn and Blumenthal Join Us to Discuss the Kids Online Safety Act (KOSA)
41:37
41:37
Play later
Play later
Lists
Like
Liked
41:37From cyberbullying to harmful algorithms, the risks are real. This week, Senators Marsha Blackburn and Richard Blumenthal join us to discuss their bipartisan bill—the Kids Online Safety Act (KOSA). Together, they’re taking on Big Tech to ensure the safety of children online. Tune in to hear how KOSA could change the digital world for the better. Le…
…
continue reading

1
Episode 167: CISA Director Jen Easterly Stands Watch in the Cyberwars
43:51
43:51
Play later
Play later
Lists
Like
Liked
43:51From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story abou…
…
continue reading

1
Episode 166: Ken’s Duplicate Driver’s License Cost Him $8,000
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38By the time Ken understood what happened, his similar-looking identity thief had walked off with $8,000. In this episode, we learn about a vulnerability courtesy the DMV and what an enterprising identity thief was able to do with it. Eva Velasquez from the Identity Theft Resource Center offers tips on safeguarding yourself. Plus: the pros and cons …
…
continue reading